Vendors/Products - Page 70
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Web application security firm KaVaDo beefed up its line of products on Tuesday when it announced a new vulnerability-assessment tool for Web applications called ScanDo. ScanDo approaches and probes Web applications the same way that an attacker would. In doing so, . . .
Update: Project founder responds below. "SmoothWall does not use shadowed passwords in their firewall implementation. While this is not inherently dangerous as firewall systems are not designed as multi-user, an unauthorized user gaining access to the system via exploitation . . .
Dan Burcaw of the Yellow Dog Linux distribution announced today that several security vulnerabilities were inadvertantly not announced as they were released. These advisories include fixes for squid, diffutils, openssh, sendmail, printtool, ucd-snmp, and tetex. Several bugfix advisories have been announced as well.. . .
Developers will find that implementing security has never been as easy as with FileCrypt SDK, Veridis' library allowing them to add strong encryption compatible with PGP to their applications.. . .
SSH Communications Security, a world-leading developer of Internet security solutions, today announced the next-generation of its leading encryption software, SSH Secure Shell 3.1, a product designed to protect end users, businesses and developers from the most common break-in method used by . . .
On the surface, it was just another turn of the endless cycle of software release, hole discovery, and patching: operating system vendor Red Hat issued an advisory Tuesday warning the world about a serious security hole in a file transfer program . . .
With concerns about computer security running high, German electronics and technology giant Siemens believes it has a simple, mouse-based alternative to the PC passwords and log-in codes that are so easy for users to forget -- and in some cases, too . . .
Joubert Berger writes, "HP's new product, HP Secure OS Software for Linux, will help businesses secure their Linux environments by offering intrusion prevention, real-time protection against attacks, and damage containment.". . .
Have you ever heard of a Linux vendor that tried to deny a security flaw in their open source product? "A number of Unix vendors have been alerted to a security flaw, but Sun Microsystems is refusing to acknowledge that any problem exists. Six vendors, including IBM, Hewlett-Packard and Sun, have been alerted to a vulnerability that ships with several Unix systems, which could allow a malicious attacker to take control of an affected system.. . .
Guardian Digital, Inc., sponsors of LinuxSecurity, today released the enterprise edition of its highly successfuly EnGarde Secure Linux server operating system. EnGarde Secure Professional is a comprehensive software solution that provides all the tools necessary to build a complete online presence.. . .
Guardian Digital, Inc., sponsors of LinuxSecurity, today unveiled Guardian Digital Secure Network, a central location for receiving product information, support, and system software services. "New Commerce Services and Systems Management Solution Delivers Secure and Affordable System Support.". . .
Fuel for those following the full disclosure vs. no-disclosure debate started by Microsoft recently. "Microsoft has admitted that it knew about a security hole in Internet Explorer (IE) a full week before it accused a security firm of acting irresponsibly for publicly disclosing details of the exploit.. . .
A small Australian company has released a Linux-based security tool it hopes will help speed corporate acceptance of the open-source operating system. InterSect Alliance has developed the first security auditing system for Linux, beating much larger organizations to the punch. . . .
We all know how Microsoft likes to bully its many 'partners', so it comes as no surprise that the Beast has decided to apply its partnership muscle to silence the software and network security research community. The company is currently . . .
Further information on why open source leads to a more secure environment. Bruce Schneier comments in this article why he thinks Microsoft wants a closed-door policy on security vulnerability disclosure. "Security firms, [Scott Culp] says, can just whisper the problems to Microsoft, which will promptly patch the hole.. . .
Red Hat downplayed a security expert's report today of potential security problems with the latest release of its popular operating system software. The company confirmed that two files distributed with Red Hat Linux 7.2 lack digital signatures used for determining their . . .
Microsoft Office XP and Internet Explorer version 5 and later are configured to request to send debugging information to Microsoft in the event of a program crash. The debugging information includes a memory dump which may contain all or part of . . .
Novell moves into the enterprise security market with an announcement of a new single sign-on product. Novell has updated its iChain single sign-on security product as the start of a new strategy for enterprise security that it will detail this week. . . .
Intrusion.com, Inc. (Nasdaq:INTZ) ("Intrusion") today announced that it will change the company's name to Intrusion Inc. Intrusion is a leader in the intrusion detection market and offers complementary security appliances and vulnerability assessment solutions. The company intends to complete the . . .
A security processor startup with a design team composed of engineers from Compaq Computer Corp.'s former Alpha operation has introduced a new encryption chip that it claims will shatter the current standards for high-end encryption. In this young field, where new . . .