Server Security - Page 27
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A series of recently announced security flaws open Linux and related technologies to attacks ranging from denials of service and local exploits to the potential for remote system compromise. . . .
That seemed to be Wednesday's lesson from security information provider Secunia for the developers of the major internet browsers. The company released information on two common security issues with the tabbed browsing feature found in several flavours of the Mozilla Foundation's browsers, the Opera browser, the Konqueror browser for Linux and two third-party plug-ins that add the feature to Microsoft's Internet Explorer. . . .
Conectiva has fixed image loading vulnerabilities in versions 9 and 10 of the gdk-pixbuf library that could allow a specially crafted .bmp image to "hang applications in an infinite loop." . . .
This is the first in a series of articles on SSH in-depth. We start with looking at standard SSH host keys by examining the verification process to ensure you have not been the victim of an attack. . . .
Veritas Software recommends users of its Cluster Server apply newly-available patches to plug a "serious" security hole an attacker could use to launch malicious code with root privileges. . . .
Massachusetts Institute of Technology officials have issued security warnings regarding two serious vulnerabilities in the Kerberos computer authentication software, which is regularly used by Dartmouth and many other universities and businesses. . . .
EEye Digital Security has uncovered new security holes affecting a wide range of RealNetworks' media players, the latest desktop-based bugs set to worry IT managers. The flaws could be exploited via a malicious webpage or a RealMedia file run from a local drive to take over a user's system or delete files, according to RealNetworks. . . .
Security exploits are being created more easily and faster than ever, with attackers targeting e-commerce sites for financial gain, according to new research. . . .
Another highly critical image-based security hole has been found, sparking a flurry of patches from Linux vendors.Exploitation in GdkPixBuf can be used to caused a denial of service or provide remote system access. . . .
A bug in Usermin, a widely used administration console for Unix and Linux, could allow a hacker to run malicious code through a specially crafted email, reported security researchers. . . .
A bug in Usermin, a widely-used administration console for Unix and Linux, could allow an attacker to run malicious code via a specially-crafted email, according to security researchers. . . .
Those of you hung over from patching Windows XP SP2 can't sleep in just yet. More than 40 vulnerabilities have been reported for Oracle's flagship software products. Holes in the Database Server and its Listener element can . . .
Serious security flaws that potentially affect hundreds of email gateway products have been discovered in the widely deployed MIME (Multi-Purpose Internet Mail Extensions) protocol. . . .
Spammers seem to be always a notch ahead than all the efforts against their malicious intentions. According to a recent study by MX Logic Inc., a provider of email defense solutions for corporates, . . .
Linux users are at risk from serious security vulnerabilities in components used to view graphics and handle archives, according to researchers. The security holes, found in the imlib graphics library and the LHA archive tool, . . .
Open-source developers have warned of serious security holes in two Linux components that could allow attackers to take over a system by tricking a user into viewing a specially-crafted image file or opening an archive. Patches exist for the bugs, which affect LHA and imlib. . . .
U.S. residential Internet users are much more satisfied with the spam protection from their Internet service providers, but remain unhappy with their ISPs' defenses against hackers and viruses, J.D. Power and Associates said Wednesday. . . .
Linux software maker Red Hat Inc. on Tuesday launched an upgrade of the enterprise version of its product, which includes better security. The latest version of Red Hat Enterprise Linux includes features that protect against stack, . . .
Apache Software Foundation among developers shunning Microsoft anti-spam measure. Opposition to Microsoft's Sender ID anti-spam email scheme is growing in the open source community, which is complaining about the software giant's licensing terms. . . .
THE concept of work no longer means a set number of hours sitting at a desk in an office. While going to an office is still part of work, employees are now working in new ways and from many different locations--as a tele-worker, while travelling, . . .