Vendors/Products - Page 62.8
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Trapeze Networks, whose wireless LAN products launch on Monday, joins a crowd of established network vendors and start-ups pitching for the business-grade Wi-Fi market. Many companies have been reluctant to adopt wireless LANs thanks to security fears, and Trapeze aims . . .
Any tech magazine is likely to contain abundant references to Linux. What you will not see too often are articles about other widely used open source operating systems. But alternative OSes do exist, even if they do not command . . .
FreeBSD's Murray Stokely announces the availability of FreeBSD 4.8, the latest FreeBSD-stable release, which has dealt with known security issues, and added initial support for Firewire, HyperThreading, and other new hardware technologies. . .
The Apache Software Foundation has rushed out another update to the Apache 2.0 HTTP Server because of a significant denial-of-service vulnerability discovered and reported by security research firm iDefense. An announcement from the Foundation warned that prior Apache 2.0 versions . . .
Johannes Faustus submits A vulnerability in the default image viewer for one of the two major Linux desktop systems could allow an attacker to execute code on a computer running the Gnome software, security group Core Security Technologies said in an advisory on Friday. . .
Increases in cybercrime, widespread worm and virus outbreaks, the specter of catastrophic cyberterrorism, and regulatory requirements in HIPAA, Gramm Leach Bliley, and other government mandates have boosted the profile of computer security. Once the province of a few long-haired firewall gurus in the server room, computer security now merits its own C-level executives and has become an agenda item at board meetings.. . .
Several users welcomed the growing willingness of vendors and security researchers to work together to identify and fix software vulnerabilities in the wake of last week's disclosure of a major hole in a widely used e-mail protocol .. . .
A slick security product demonstration only serves to prove that vendors often don't think enough about what security managers need. How much money do you have in your budget? You have to be aware that this is very expensive software." . . .
Guardian Digital, Inc., the leading open source security company, today announced the availability of the Guardian Digital Secure Mail Suite, the industry's most secure and cost-effective email platform. Designed to meet the needs of small businesses, enterprise level companies, ISPs and ASPs looking to secure and manage corporate email operations, Secure Mail Suite is capable of managing all email functions within an organization. . . .
The most commonly used security system to protect passwords over the internet has been cracked by researchers at one of Switzerland's top technology universities. A team at the Federal Institute for Technology in Lausanne said they had been able to . . .
Network Associates Inc.'s Sniffer Technologies division on Monday introduced a new forensics analysis solution that has the ability to capture, inspect, reconstruct and replay network traffic. The solution is designed to allow administrators to delve into security events and other . . .
Bill Gates must be livid. Just after he publishes an e-mail letter to customers outlining Microsoft's progress on its Trustworthy Computing initiative, the SQL Slammer worm--376 bytes of code also known as Sapphire, w32.SQLexp.worm, and Helkern--exploits known vulnerabilities in Microsoft SQL 2000 servers. It creates a global Internet slowdown and another embarrassment for the chairman of the world's most powerful software company. And to top it off, Microsoft's own servers were Slammed.. . .
A streaming-media consortium set a schedule this week for finalizing technical specs for MPEG-4 security and rights management--components that are key to the open standard's adoption among content owners. The Internet Streaming Media Alliance (ISMA)--a global group of companies including Apple Computer, Cisco Systems and Sun Microsystems. . .
A critical vulnerability has been found in the Concurrent Versions System (CVS), which is used by the vast majority of open-source projects to update and maintain source code, according to an advisory from the Computer Emergency Response Team (CERT) Coordination Center. . . .
In an effort to step up wireless security in mobile devices, chipmaker AMD (NYSE: AMD) Latest News about AMD has released new flash memory technology designed to frustrate signal thieves and prevent fraudulent call billing. The 64-megabit page-mode flash memory . . .
Internet Security Systems Inc. on Thursday announced its plans to make a grab for the brass ring of security management: dynamically protecting networks and individual machines by tying threat data to vulnerabilities in real time. . .
The Rekonix LTD company have introduced today a new version of their popular strong authentication system STADRIN 1.1.5 targeting the Linux platform using PAM authentication schemes with a Vasco tokens backend. The new version makes the implementation process more easy and . . .
Trend Micro Inc. on Tuesday introduced technology and services designed to help companies do a better job of blocking a new generation of tougher, smarter viruses before they get into the enterprise, as well as cleaning up when viruses do get . . .
Chipmaker Transmeta has announced it will be the first company to release a mobile chip that includes security features built in at the processor level. The company said it has received designs for its Crusoe TM5800 processor, an x86 chip designed . . .
Despite being informed six months ago of a potentially serious security hole that may exist in Ethernet device drivers, many leading software and hardware manufacturers have yet to indicate whether their products contain the vulnerability. The vulnerability concerns the way . . .