Vendors/Products - Page 70

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Red Hat Denies Security Flaw in `Enigma'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat downplayed a security expert's report today of potential security problems with the latest release of its popular operating system software. The company confirmed that two files distributed with Red Hat Linux 7.2 lack digital signatures used for determining their . . .

Novell make a move into security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Novell moves into the enterprise security market with an announcement of a new single sign-on product. Novell has updated its iChain single sign-on security product as the start of a new strategy for enterprise security that it will detail this week. . . .

Intrusion.com, Inc. Changes Name to Intrusion Inc.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intrusion.com, Inc. (Nasdaq:INTZ) ("Intrusion") today announced that it will change the company's name to Intrusion Inc. Intrusion is a leader in the intrusion detection market and offers complementary security appliances and vulnerability assessment solutions. The company intends to complete the . . .

The Big *BSD Interview

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This isn't a security article, but you will find it interesting. "Matt Dillon, not the famous actor but the kernel/VM FreeBSD hacker also well known for writting the Dice C compiler for the Amiga, is here with us today for . . .

IBM clamps down on wireless security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM is expected to launch on Monday new services and software aimed at making wireless networks and communications more secure and widely used, the company said Sunday. IBM, based in Armonk, N.Y., said it put together a broad-based offering by its services division, Global Services, that helps companies assess, plan and implement ways to make their wireless applications and transactions more secure.. . .

MS Security Plan: OK, Kind Of

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's newest security initiative is drawing jeers and a few cheers from industry experts. Many experts said Microsoft's Strategic Security Protection Program plan announced Wednesday is nothing more than a half-hearted attempt to assuage increasing demands from government, industry and consumers . . .

Microsoft confronts security fears

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft on Wednesday launched a major security initiative intended to address concerns that its software is prone to security problems and virus attacks. The world's largest software maker is looking to allay fears over ongoing security problems and recent worm . . .

NSA Secure Linux hits the shelves

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency (NSA) has released its second public version of the Security Enhanced Linux operating system. Although still in prototype, the Linux Security Modules based OS is designed to be an almost uncrackable development of the open source platform, . . .

Tool copies hackers to detect flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New online tool uses AI to mimic hackers, but some experts question how effective it can really be. UK firm ProCheckUp has developed an online tool to expose network security flaws by using artificial intelligence (AI) to mimic the actions of a hacker. However, experts question how successful the software will be at detecting security holes.. . .

Security software: blind lead blind

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's incredible that in this day and age some of the most popular security products, products that are marketed as protecting you from the evils of computers, are so badly designed. CheckPoint's FireWall-1, the leading firewall by market share, had . . .

Secure the Wireless Network firmware

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security issues surrounding wireless networking can be addressed without upgrading hardware, Intel said today. The future ubiquity of wireless networking has been a key theme of the IDF this week, with much talk of a mobile computing future where laptop . . .

HP to sell its own Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hewlett-Packard will sell a secure version of Linux, a product that marks a departure for computer makers that traditionally have favored partnerships with companies such as Red Hat that sell Linux. HP Secure OS Software for Linux, which will be announced Wednesday, will cost about $3,000, said Roberto Medrano, general manager of HP's Internet Security division.. . .

Virus fighters form anti-DDoS alliance By Dennis Fisher

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recent threats such as the code Red and Leave worms are proof that virus writers and hackers are pooling resources to produce hybrid weapons that can cause tremendous damage. Now, a group of security companies is following suit, hoping that by combining their efforts, they'll be better able to combat the new, sophisticated attacks.. . .

GroupWise users fight mystery bug

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just a reminder why we love open source the way we do. "Network managers who administer Novell's newest version of GroupWise are scrambling to fend off a bug that can severely compromise network security and e-mail systems. However, Novell is not telling administrators what the bug is or how to duplicate it, saying that it wants to give customers time to patch their systems before anyone can exploit the vulnerability.. . .

Wireless networks wide open

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new way to attack wireless networks underscores the lack of security for PC owners using the airwaves to connect their computers, said security experts speaking at the Black Hat Briefings conference. On Thursday, Tim Newsham, a researcher for security . . .