Vendors/Products - Page 66.4

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Flash Flooded By Security Flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Macromedia has warned that its Flash Player, a ubiquitous application for playing multimedia files, has a vulnerability that could allow attackers to run malicious code on Windows and Unix-based operating systems. . .

SSL defeated in IE and Konqueror

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A colossal stuff-up in Microsoft's and KDE's implementation of SSL (Secure Sockets Layer) certificate handling makes it possible for anyone with a valid VeriSign SSL site certificate to forge any other VeriSign SSL site certificate, and abuse hapless Konqueror and Internet Explorer users with. . .

Bell Labs Unveils New Authentication Software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The software, which the company said will not require a Web site to alter its existing authentication process, works with Linux, Solaris, Unix and Windows, among other operating systems. The software, which the company said will not require a Web site to alter its existing authentication process, was originally written for the Plan 9 operating system, a Unix-like OS. However, it works with a host of other operating systems as well, including Linux, Solaris, Unix and Windows.. . .

NMap 3.00 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers . . .

OpenSSH trojaned!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Copies of OpenSSH packages on popular download sites have been trojaned, developers have warned. Overnight it was realised that the tarball for OpenSSH 3.4p1 on the main openBSD (ftp.openbsd.org) mirror was compromised, after developers noticed that the checksum of the . . .

OpenSSH Trojaned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OpenSSH was trojaned yesterday. There is not little authoritative information on the situation. What is known is that the original file was exchanged with a trojaned file and was discovered because it had a different MD5 checksum. . .

Analysis: Symantec rattles security landscape

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"[With the acquisitions we are] going to just leapfrog over [security competitors] with a commanding lead in the marketplace," said a confident Hamilton. "Our intent is not to be number two or three. We want to be number one." However, fallout from Symantec's feeding frenzy is drawing criticism that the task of integrating the triage of dissimilar security technology into a cohesive and affordable unit for customers will prove difficult to pull off.. . .

eWeek: Who's Watching Whom?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The long-running dispute over when to release vulnerability information escalated last month into a bitter turf war among several security companies, all of which claimed to have their customers' best interests at heart. And while it might have started by coincidence, . . .

Apache Worm Barely Squirms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A program designed to infect vulnerable computers running the open-source Apache Web server application apparently hasn't made it very far, security experts said Monday. As first reported. . .

Anti-hacker product draws start-up money

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Columbia company that invented what it calls the world's most widely deployed technology to detect computer hackers announced yesterday that it received $7.6 million in venture capital to develop and market a commercial version of its product. Sourcefire, a 30-employee, privately held company, uses Snort, a detection technology developed by the company's founder, Martin Roesch.. . .

Apache Worm?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the wake of the Apache Chunk Encoding vulnerability, the fun just doesn't seem to end. There seems to be another worm on the loose. The details of it are still being investigated. Currently, there is a thread on . . .

Bug Watch: Developers at fault

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In my line of work it is inevitable, but always shocking, to see the number of high-risk security flaws developers have left behind. Most worryingly, a major proportion of vulnerabilities are due to a basic misunderstanding of the internet protocol and . . .