Vendors/Products - Page 64
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The most commonly used security system to protect passwords over the internet has been cracked by researchers at one of Switzerland's top technology universities. A team at the Federal Institute for Technology in Lausanne said they had been able to . . .
Network Associates Inc.'s Sniffer Technologies division on Monday introduced a new forensics analysis solution that has the ability to capture, inspect, reconstruct and replay network traffic. The solution is designed to allow administrators to delve into security events and other . . .
Bill Gates must be livid. Just after he publishes an e-mail letter to customers outlining Microsoft's progress on its Trustworthy Computing initiative, the SQL Slammer worm--376 bytes of code also known as Sapphire, w32.SQLexp.worm, and Helkern--exploits known vulnerabilities in Microsoft SQL 2000 servers. It creates a global Internet slowdown and another embarrassment for the chairman of the world's most powerful software company. And to top it off, Microsoft's own servers were Slammed.. . .
A streaming-media consortium set a schedule this week for finalizing technical specs for MPEG-4 security and rights management--components that are key to the open standard's adoption among content owners. The Internet Streaming Media Alliance (ISMA)--a global group of companies including Apple Computer, Cisco Systems and Sun Microsystems. . .
A critical vulnerability has been found in the Concurrent Versions System (CVS), which is used by the vast majority of open-source projects to update and maintain source code, according to an advisory from the Computer Emergency Response Team (CERT) Coordination Center. . . .
In an effort to step up wireless security in mobile devices, chipmaker AMD (NYSE: AMD) Latest News about AMD has released new flash memory technology designed to frustrate signal thieves and prevent fraudulent call billing. The 64-megabit page-mode flash memory . . .
Internet Security Systems Inc. on Thursday announced its plans to make a grab for the brass ring of security management: dynamically protecting networks and individual machines by tying threat data to vulnerabilities in real time. . .
The Rekonix LTD company have introduced today a new version of their popular strong authentication system STADRIN 1.1.5 targeting the Linux platform using PAM authentication schemes with a Vasco tokens backend. The new version makes the implementation process more easy and . . .
Trend Micro Inc. on Tuesday introduced technology and services designed to help companies do a better job of blocking a new generation of tougher, smarter viruses before they get into the enterprise, as well as cleaning up when viruses do get . . .
Chipmaker Transmeta has announced it will be the first company to release a mobile chip that includes security features built in at the processor level. The company said it has received designs for its Crusoe TM5800 processor, an x86 chip designed . . .
Despite being informed six months ago of a potentially serious security hole that may exist in Ethernet device drivers, many leading software and hardware manufacturers have yet to indicate whether their products contain the vulnerability. The vulnerability concerns the way . . .
Some SSH clients and servers have buffer overflows in the key exchange initialization and startup code that may be exploitable by a remote attacker in a denial-of-service attack or, under some conditions, allow the execution of arbitrary code as the root . . .
Security software and hardware makers should not have to submit their products for mandatory performance testing, a federal advisory council said Wednesday. Members of the National Infrastructure Advisory Council (NIAC), a presidentially appointed panel, voted during a conference call Wednesday . . .
Security researchers have discovered a serious vulnerability that may be present in many Ethernet device drivers that is causing the devices to broadcast sensitive information over networks. . .
Theft happens. And in the case of notebook computers, it happens a lot. When preventive measures fail and a notebook is stolen, the focus then becomes recovery. One breed of recovery products tracks the machine via an agent that notifies . . .
Frank submits IP Security Validator is an experimental tool that allows validation of Virtual Private Network (VPN) configurations between two network interfaces. As with testing connectivity using the Ping program, IP Security Validator enables verification and validation of VPN . . .
Security researchers have discovered a set of vulnerabilities in several vendors' implementations of the SSHv2 protocol that could give an attacker the ability to execute code on remote machines. The new flaws are especially dangerous in that they occur before authentication . . .
Several vulnerabilities have been found in the MySQL database system, a light database package commonly used in Linux environments but which runs also on Microsoft platforms, HP-Unix, Mac OS and more. . .
Sigaba Corp. has extended a test of a secure instant messaging product to include more financial services, health care and government organizations. The company will unveil its Sigaba Secure Instant Messaging software in April 2003 but wants to make sure the . . .
I report on a lot of software vulnerabilities, and I try to weed out the unimportant ones. But there's no real way to know in advance which ones will be exploited and which ones cybervandals will essentially ignore. . .