Vendors/Products - Page 59.95
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Mr. Hornik discovered remote vulnerability in OpenSSL package provided by RedHat. Because of nature of this bug some other vendors can be vulnerable too. This vulnerability is inside SSLv2 server code and allows . . .
Micael S. Mimoso submits Recently disclosed vulnerabilities in OpenSSL could leave systems open to denial-of-service attacks at the minimum and, at worst, remote compromises. Experts recommend that users of affected systems upgrade to OpenSSL 0.9.7c or 0.9.6k. Other . . .
This three-part article will focus on identifying and exploiting vulnerabilities and poor configurations in Cisco routers. We will then discuss the analysis of the router configuration file and will attempt to leverage this access into other systems. Additionally, we will cover . . .
A tiny network security device running embedded Linux has earned Innominate the Wolfsburg AG Competence Prize, this year awarded for the IT category in the field of "Network Embedded Systems." Judges in the 25,000 Euro annual prize for industry co-sponsored by Volkswagon and the city of Wolfsburg praised Innominate for building a security device on an open architecture. . .
Escalating threats of hacking and viruses prompt explosive growth, says IDC. Spending on security and business continuity will grow at twice the rate of other IT categories to reach $116bn by 2007.. . .
Microsoft's Security Response Center in Redmond, Wash., is the computing equivalent of a hospital emergency ward. When a problem comes in the door the center's director, Kevin Kean, and his staff must swiftly make an assessment: Is the security weakness detected in a Microsoft software product only minor?. . .
A report claiming that Microsoft's operating system "monopoly" poses a critical security risk to users has drawn harsh criticism from technology professionals. While the group of researchers claimed intellectual and financial independence from outside parties, as well as from their own parent companies. . .
Intel has announced it was taking steps to ensure that its design for the next generation of computer security components, code-named LaGrande, will be accepted and not vilified by the industry. . .
A security flaw in Linux editions of IBM's DB2 database could allow unauthorized users to seize control of a database's contents, Big Blue has revealed. IBM said that the problem affects version 7 of its DB2 database for Linux.. . .
OpenSSH 3.7 has just been released. It will be available from the mirrors listed at OpenSSH shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. . .
Jan Kanclirz submits Make Secure BGP, paper describing different security meassures one can take to better secure BGP environment. Using authentication, encryption and filtering technigues on Cisco platform. . .
Reading through responses to an article I wrote about Mad Hatter and the broader subject of auto-immune code, and since I am working on a project for a client that involves Sun products in a security context, it begs me to ask the question - are twenty security vulnerabilities in one month an acceptable number for Sun customers?. . .
Despite a renewed focus on IT security, 28 percent of senior executives and IT managers in Ireland are unable to name a security software brand. That finding is in the results of a research report from IDC, which polled 327 executives . . .
POSIX® certification is about to take another step forward. The Open Group and The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) will offer a program to certify products to the 2003 edition of IEEE 1003.1TM-2001, "Standard for Information Technology-Portable . . .
The SH7710 32bit RISC microprocessor features an IPsec accelerator for fast encryption and communication processing. The device also offers two on-chip Ethernet controllers that enable connection to two Ethernet LANs. Both peripherals make it suitable for security-enabled devices designed . . .
Seizing the opportunity to criticize a competitor and promote its own operating system, Sun Microsystems on Wednesday opened up early registration for its Project Mad Hatter. Designed to compete with Microsoft, Project Mad Hatter is being positioned by Sun as . . .
The Application Flow model may be best described as an automatic analysis of content. Based on how a user interacts with an application over time, policies are designed to allow the user leeway to accomplish their task. Generating policies of . . .
Security will move farther from the fallible hands of users and closer to the heart of the computer with a deal announced by Intel (Nasdaq: INTC) and Wave Systems (Nasdaq: WAVX) . The deal will help bridge the gap between . . .
The Apache Software Foundation and The Apache Server Project are pleased to announce the release of version 1.3.28 of the Apache HTTP Server ("Apache"). This Announcement notes the significant changes in 1.3.28 as compared to 1.3.27. . .
The Apache Software Foundation on Monday released a new version of its open-source Web server project to plug four potentially serious security holes. The latest update to the Apache 2.0 HTTP Server (version 2.0.47) is described as a security and bug . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.