Read more about open source
Bookmark and Share
  • Free 525-page eBook: Linux Device Drivers, 2nd Edition

    11.03.2014

    This 525-page book is for anyone who wants to support computer peripherals under the Linux operating system or who wants to develop new hardware and run it under Linux.

  • GnuTLS library flaw opens way for MitM attacks

    05.03.2014

    A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software and Linux distributions.

  • Cryptocat now available for iPhone

    05.03.2014

    Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple's App Store), as well.

  • Identity relationship management market to exceed $50 billion by 2020

    26.02.2014

    ForgeRock announced today that the identity relationship management (IRM) market, focused on managing customer interactions across any device or environment, will exceed $50 billion by 2020.

  • Free eBook: Linux Patch Management

    11.02.2014

    Linux Patch Management offers Linux professionals start-to-finish solutions, strategies, and examples for every environment, from single computers to enterprise-class networks.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //