Vendors/Products - Page 33

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Why open source won't prevent cloud lock-in

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of open source's promises is to minimize vendor lock-in. However, it's not so apparent that this value proposition holds when using software as a service (SaaS) or cloud-based platform services. The implication is clear: So-called open source cloud platforms, like the recently announced VMforce, are no more open than proprietary clouds -- and believing otherwise will trap you into unintended lock-in.

Security Patching: What Your Vendors Aren't Telling You

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In recent years, software manufacturers appeared to be increasing the transparency of communication about bugs. The Internet has allowed for rather rapid delivery of software patches, and Microsoft Corp. even releases details in its security bulletins and accompanying Webcasts. However, all is not what it seems...

New HTML Version Comes With Security Risks Of Its Own

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet Explorer 9 and Firefox 4 will support it, and Microsoft recently touted its advantages. But the upcoming version of HTML, which builds rich Internet application features into the Web programming language and shifts more Web functions to the client machine, also could open up new Web attack vectors.

Mac OS malware threat still low

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

No one is really focusing attacks on Mac and Linux, namely because there're not enough users," Steckler said in an interview. "Viruses, just like [those] in humans, need lots of hosts to propagate. Since there are very few Mac and Linux machines in the ecosystem, it's very difficult to propagate [and] to target."

Symantec Study Mischaracterizes Linux Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest MessageLabs Intelligence Report from Symantec Hosted Services is filled with interesting and useful information regarding the current state of malware and e-mail borne threats as well as the trends over time. Of particular interest to me is the assertion in the report that "any given Linux machine is five times more likely to be sending spam than any given Windows machine."

VoIP Security: Security goes digital

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Historically, cctv security has been a small and relatively specialised sector. Analogue technology has provided few opportunities to increase functionality beyond basic capture of images and sound, to be studied in real-time and stored on video tape or DVD.

Security: Red Hat announces beta of Enterprise Linux 6

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LEADING US LINUX VENDOR Red Hat has given the public a first look at the next version of its Enterprise Linux distribution. ... The new System Security Services Daemon (SSSD) feature allows for centralised identity management, while the SELinux sandbox feature lets administrators better tackle untrusted content.

Intel Powered High-Security Cloud Computing Platform Launched by Enomaly

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Marketing hype, or does this product provide value to Linux users? Enomaly, a leading provider of cloud computing platform software for telcos and other service providers, today announced the availability of the High Assurance Edition of the Enomaly Elastic Computing Platform. The new product enables telcos and service providers to offer their customers a cloud computing service with a higher level of security than has previously been available in Infrastructure as a Service (IaaS) offerings.

IPFire brings super secure Linux to the masses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most folk know if they want a secure gateway between the Internet and their home or business they should use Linux for maximum protection. The new IPFire distribution seeks to take security to the highest level while also making things a breeze for the less experienced to set up.

Firefox 3.6.3 closes a critical hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mozilla has announced the release of Firefox 3.6.3 to address a critical security hole used as part of a winning exploit at Pwn2Own 2010. The update comes just over a week after the release of Firefox 3.6.2 which addressed a different critical flaw.

Firefox 3.6.2 addresses critical vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mozilla released Firefox 3.6.2 late Monday to fix a critical security hole involving Web-based font technology. "We strongly recommend that all Firefox users upgrade to this latest release. If you already have Firefox 3.6 you will receive an automated update notification within 24 to 48 hours. This update can also be applied manually by selecting 'Check for Updates...' from the Help menu," Mozilla's director of Firefox, Mike Beltzner, said in a blog post..

Firefox zero-day fix set up for 30 March release

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mozilla confirmed the presence of an unpatched flaw in its browser on Thursday, with a post promising to release a fix at the end of the month. The flaw, discovered by security researcher Evgeny Legerov and reported by The Reg last month, creates a means to inject hostile code on vulnerable systems. The vulnerability is due to be fixed in version 3.6 of Firefox on 30 March.

Google patches 11 vulnerabilities in Chrome days before hacking contest

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google [1] has patched 11 vulnerabilities [2] in the Windows version of Chrome [3], including one that earned its finder the first $1,337 check from the company's new bug bounty program. Like Apple [4], which updated Safari last week [5], Google beefed up the security [6] of its browser just days before the Pwn2Own browser [7] hacking [8] contest was to kick off in Canada.

Ubuntu Q&A with Matt Asay

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OPEN source industry veteran Matt Asay joined Canonical, the commercial sponsor of Ubuntu Linux, as its chief operating officer last month. In his new post, Asay is responsible for aligning the company