By Serdar Yegulalp Last week, Google unveiled proof that it had successfully created a collision attack against the SHA-1 hash algorithm, a security weakness long suspected to be exploitable with modern computing …read more Source:: OpenSource
Tag: about
6 key points about Intel’s hot new Linux distro
by
•By Serdar Yegulalp The great thing about Linux is is that anyone possessing the wherewithal and dedication can produce a distribution to satisfy their own needs. That’s also the bad thing, as it …read more Source:: OpenSource
Red Hat needs to get real about the cloud
by
•By Matt Asay Red Hat ended 2016 with a precipitous 12 percent drop in its stock price, courtesy of its CFO’s departure and lighter-than-expected revenues. Losing a CFO to a grass-is-greener …read more Source:: OpenSource
Why enterprises struggle with agile software development, and what they can do about it
by
•Tear up outdated processes and watch how startup and internet companies do it, McKinsey experts advise. …read more Source:: it-priorities
A new OpenSuse Linux is coming to town, and it’s all about stability
by
•By Katherine Noyes Linux users come in many shapes and sizes, but those in the business world typically steer clear of the bleeding edge. That’s why the OpenSuse project recently switched to a …read more Source:: OpenSource
Cloud computing is everywhere, and so are frayed nerves about security
by
•Fear of the unknown: Intel’s latest survey of 1,200 IT decision makers finds most don’t know what vulnerabilities exist with their cloud providers and services. …read more Source:: it-priorities
Zero Day Weekly: IBM says block Tor, Google undermines ATS, much ado about Windows 10
by
•Notable security news items for the week ending August 28, 2015. Covers enterprise, application and mobile security, reports and more. …read more Source:: it-priorities
This tool can alert you about evil twin access points in the area
by
•By Lucian Constantin A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found. The tool, called EvilAP_Defender, was designed specifically to …read more Source:: OpenSource