Vendors/Products - Page 3

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Red Hat Fixes Vulnerabilities In Four Areas

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Micael Mimoso submits Red Hat recommends users upgrade to updated packages that address security vulnerabilities in PostgreSQL, stunnel, XFree64, and Zebra. The consequences of the vulnerabilities include denial of service, execution of arbitrary code and privilege escalation. . .

SSL networking heats up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The market is heating up for products that allow secure access to corporate networks based on a widely used browser security technology known as secure sockets layer encryption. Cisco Systems became the latest company to introduce a virtual private network (VPN) . . .

Oracle Row Level Security: Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this short paper I want to explore the rather interesting row level security feature added to Oracle 8i and above, starting with version 8.1.5. This functionality has been described as fine grained access control or row level security or virtual . . .

A VA Scanner Geeks Will Love

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks are dynamic, constantly changing with the addition of new devices and services--each with vulnerabilities and risky configurations. Vulnerability assessment tools that take snapshots don't reflect this ceaseless flux. That's where Tenable Network Security steps in, taking a completely passive approach . . .

Security Considerations for Layer 3 Switches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Heightened awareness of security issues on the part of IT administrators is, for the most part, a good thing. But there is a downside -- it has pushed vendors to integrate security into products ad infinitum. In the switching world, newly added features of layer 3 routing switches are starting to make these products resemble firewalls.. . .

Devil-Linux 1.0: The (hell)firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Today, Halloween, marks the debut of Devil-Linux 1.0, a runs-from-CD (or USB flash device) firewall/router distribution designed to give you a large amount of security in return for very little setup work. The Halloween release date and the 'Devil-Linux' name . . .

Security firm takes trusted Linux onboard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Linux operating system and software provider Trustix was today acquired by internet security company Comodo. Financial terms of the deal were not disclosed. Comodo, which is best known as a certification authority for SSL certificates, said that the deal will . . .

Vendors face security calls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sun's chief security officer last week said that vendors should bear legal responsibility for any security vulnerabilities found in their software, and should work harder to build more secure platforms and applications.. . .

IBM expands wireless security service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Big Blue said its wireless intrusion detection service is designed to help customers protect themselves against security breaches on wireless local area networks. The service includes Linux-based sensors that detect irregularities in the wireless network and identify unauthorized or unsecured access . . .

Smart cards get really smart

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers at the University of Pennsylvania have developed smart credit cards with embedded microchips. What's new about is a technique which lets ordinary card users program in their own spending parameters.. . .

Cisco Warns Its WLAN Security Can Be Cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The proprietary security system used by Cisco Systems Inc. to protect wireless LANs widely deployed by enterprises can be defeated by a "dictionary attack" designed to crack passwords. To counter the security threat, the company is warning customers to institute strong . . .

Symantec Security Report Highlights 'Blended' Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Motorola is putting Windows on cell phones, and 60 percent of banks say they are going to run their ATMs on Windows in the next few years," says Richard Stiennon, vice president of research for Gartner. "The insanity has got to stop." Symantec's latest report on Internet security paints a gloomy picture of the dark side of information technology. . .

New OpenSSL remote vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mr. Hornik discovered remote vulnerability in OpenSSL package provided by RedHat. Because of nature of this bug some other vendors can be vulnerable too. This vulnerability is inside SSLv2 server code and allows . . .