Vendors/Products - Page 5

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Cisco Warns Its WLAN Security Can Be Cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The proprietary security system used by Cisco Systems Inc. to protect wireless LANs widely deployed by enterprises can be defeated by a "dictionary attack" designed to crack passwords. To counter the security threat, the company is warning customers to institute strong . . .

Symantec Security Report Highlights 'Blended' Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Motorola is putting Windows on cell phones, and 60 percent of banks say they are going to run their ATMs on Windows in the next few years," says Richard Stiennon, vice president of research for Gartner. "The insanity has got to stop." Symantec's latest report on Internet security paints a gloomy picture of the dark side of information technology. . .

New OpenSSL remote vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mr. Hornik discovered remote vulnerability in OpenSSL package provided by RedHat. Because of nature of this bug some other vendors can be vulnerable too. This vulnerability is inside SSLv2 server code and allows . . .

Exploiting Cisco Routers (Part One)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This three-part article will focus on identifying and exploiting vulnerabilities and poor configurations in Cisco routers. We will then discuss the analysis of the router configuration file and will attempt to leverage this access into other systems. Additionally, we will cover . . .

Innominate wins Wolfsburg prize for tiny embedded Linux security device

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A tiny network security device running embedded Linux has earned Innominate the Wolfsburg AG Competence Prize, this year awarded for the IT category in the field of "Network Embedded Systems." Judges in the 25,000 Euro annual prize for industry co-sponsored by Volkswagon and the city of Wolfsburg praised Innominate for building a security device on an open architecture. . .

To Fix Software Flaws, Microsoft Invites Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's Security Response Center in Redmond, Wash., is the computing equivalent of a hospital emergency ward. When a problem comes in the door the center's director, Kevin Kean, and his staff must swiftly make an assessment: Is the security weakness detected in a Microsoft software product only minor?. . .

OS dominance paper branded 'marketing by fear'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A report claiming that Microsoft's operating system "monopoly" poses a critical security risk to users has drawn harsh criticism from technology professionals. While the group of researchers claimed intellectual and financial independence from outside parties, as well as from their own parent companies. . .

OpenSSH 3.7 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OpenSSH 3.7 has just been released. It will be available from the mirrors listed at OpenSSH shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. . .

Make Secure BGP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jan Kanclirz submits Make Secure BGP, paper describing different security meassures one can take to better secure BGP environment. Using authentication, encryption and filtering technigues on Cisco platform. . .

How many security vulnerabilities a month are acceptable?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reading through responses to an article I wrote about Mad Hatter and the broader subject of auto-immune code, and since I am working on a project for a client that involves Sun products in a security context, it begs me to ask the question - are twenty security vulnerabilities in one month an acceptable number for Sun customers?. . .

Security software brand awareness low

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite a renewed focus on IT security, 28 percent of senior executives and IT managers in Ireland are unable to name a security software brand. That finding is in the results of a research report from IDC, which polled 327 executives . . .

RISC Processor Takes Network Security Onboard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SH7710 32bit RISC microprocessor features an IPsec accelerator for fast encryption and communication processing. The device also offers two on-chip Ethernet controllers that enable connection to two Ethernet LANs. Both peripherals make it suitable for security-enabled devices designed . . .

Magnifire TrafficShield

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Application Flow model may be best described as an automatic analysis of content. Based on how a user interacts with an application over time, policies are designed to allow the user leeway to accomplish their task. Generating policies of . . .