Discover Server Security News

Take the Exclusive Tour of GitHub

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first thing you see upon arrival at GitHub's brand new San Francisco headquarters is Ryan Tomayko's Macbook Pro. This beat-up old laptop is where Tomayko, one of the company's first engineers, created the "pull request" -- the all-important way of contributing software code (and all sorts of other stuff) to projects housed on the company's web service, a contraption that has redefined the way the world builds things.

Meet the Next Open-Source Stars

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The world of open-source software, by design, is something of a collective. Instead of well-defined teams of developers working on a project for pay, open-source software is the result of an amorphous community making contributions

WordPress hardened with XSS, DoS and SSRF fixes

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With the second security and maintenance release of WordPress 3.5, the developers of the popular open source blogging software have closed 12 bugs, seven of them security issues. In their announcement, the developers "strongly encourage" all users to update all their installations of the software to version 3.5.2 immediately.

Can You Completely Secure Linux?

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How does Red Hat go about building and developing a secure Linux operating system? That question was asked and answered at the Red Hat Summit this week by Josh Bressers, who heads the Red Hat Product Security Team.