The Librem 15 Linux laptop has surpassed the $250-thousand goal it needed to launch.
Showing results 1 to 20 of 1,832
Hackers named "CyberCaliphate" attack the Twitter account of U.S. Central Command (CENTCOM), and also claim to have released internal military files.
The anonymity service, attacked by hackers who brought down gaming services over Christmas, was never in any danger during this attack, experts say.
There was great news and there was awful news in the world of Linux and open-source software during 2014.
There are lots of Linux laptops, but none that have the Free Software Foundation's blessings. That may change.
Launching a counter-attack against hackers using another company's systems won't just break their agreement, but it's also illegal.
Sponsored by Redhat and Intel
Quality assurance (QA) is a critical aspect of software development, and Red Hat shares its best practices for testing Linux, KVM and OpenShift.
Red Hat Enterprise Linux 7 is still new, but there are even newer programming tools. Fortunately, with the latest Version of Red Hat Software Collection, programmers can keep up to speed.
New attack for Bash flaw sees hackers spreading a remote access control tool to spy on target systems.
Home Depot said it has added better encryption software and replaced 85,000 PIN pads following the attack that started in April.
Red Hat brings the latest programming tools to Red Hat Enterprise Linux 6.x and 7.
You can install any modern Windows or Linux version, desktop or server, using Hyper-V in Windows 8.1. But you'll need to bring your own license and software for the base OS. Here's how to get that OS cheap or even free.
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
The software support needed to make 64-bit ARM-based servers feasible for business gets a boost from the recently released Linux kernel.
In a rapidly shifting attack landscape against the backdrop of a hackers' black market worth billions, if you wait to pentest -- you lose.
The UK government's secure network has come under attack from hackers controlled by a foreign state.
The Chinese state media attack on US software and hardware continues, with China’s CCTV state network broadcasting a critical report suggesting that Windows 8 is being used to harvest data about the country’s citizens for use by the US government.
Red Hat has released its latest collection of up-to-date programming languages and database management systems for Red Hat Enterprise Linux developers.
It's really not a debate question, it's just the way it is. The world runs on Linux and open-source software.
What are we to make of Oracle announcing support for an open stack of cloud foundation software for its distribution of Linux and Xen? Are we seeing a culture clash?
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 31 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Best 10 smartphones at the close of 2014
- 5 Hands-on with Windows 10: Installing the latest Technical Preview