Vendors/Products - Page 36

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

New cloud-based service steals Wi-Fi passwords

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says. Launched Monday, the WPA Cracker service bills itself as a useful tool for security auditors and penetration testers who want to know if they could break into certain types of WPA networks. It works because of a known vulnerability in Pre-shared Key (PSK) networks, usually used by home and small-business users.

Attack exploits just-patched Mac security bug

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you haven't installed the latest security update for Mac OS X, now would be a good time. A security researcher has released a proof-of-concept attack that exploits critical vulnerabilities that Apple patched on Thursday. The vulns stem from bugs in the Java runtime environment that allow attackers to remotely execute malicious code. Sun Microsystems patched the flaws early last month.

Security Pros In Demand: Report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is among a broad mix of jobs expected to receive hiring attention from CIOs, according to the latest IT Hiring Index and Skills Report. Chief information officers are planning to increase hiring -- although at a low rate -- in the first quarter of 2010 with traditional jobs in networking, security, and application development most in demand, according to the latest IT Hiring Index and Skills Report from employment specialist Robert Half Technology.

The 2010 IT Salary Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

See the 2010 average starting salary for IT positions, with regional differences in IT salary levels and the value of specialty tech skills including Chief Technology Officer, Information Technology Manager, Developer/Programmer Analyst, Lead Applications Developer, Software Engineer, Systems Administrator, Database Manager, Senior Web Developer, Network Engineer, Project Manager/Senior Consultant, Systems Security Administrator, and Help Desk Manager. As one commentator wrote, "In your opinion, does 2010 bode well for Systems Architects? Not wanting to shoulder the yoke of the played out title of analyst (and never being paid for the arduous research, understanding and wasted effort of architecting solutions in a very complex multi-business environment), I am wondering if this the "systems architect" direction is a wise direction."

Five reasons Google Chrome OS Security Wins

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google's Chrome OS has many virtues. Based on a solid foundation of Ubuntu Linux, it uses the Chrome Web browser as its interface to any and all applications. Chrome OS is also not so much a Windows replacement, as it's an attempt to get rid of the entire traditional idea of a PC desktop. If Google is successful with this, one big reason will be its vastly improved security.

Numerous vulnerabilities in VMware products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

VMware has advised of a total of 93 vulnerabilities in several of its products, including ESX Server, Server, VirtualCenter and vCenter. Most of the vulnerabilities are in Java, Tomcat and the kernel and have been known for some time. Some of them can be exploited to compromise a system, however, the advisory notes that flaws in the Service Console kernel and JRE can only be exploited when an attacker has access to the Service Console network.

Chrome OS security: 'Sandboxing' and auto updates

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With most computers threatened by attacks coming through Web applications, it's no surprise that security would be a key piece of Chrome OS, Google's browser-based operating system that stores data in the cloud. Google showed off its new lightweight operating system designed for Netbooks and cloud computing on Thursday. As anticipated, it will rely on many of the same security features and concepts used by the Chrome browser.

64-bits of protection?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Joe Faulhaber of the Microsoft Malware Protection Center has made the interesting claim that 64-bit Windows 7 is actually safer than ordinary, 32-bit Windows. He's right. "64-bit Windows [does] has some of the lowest reported malware infection rates in the first half of 2009." But, that's not the whole story.

Google Chrome OS goes open source in Chromium OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google today has officially open sourced its under-development Chrome OS operating system under the Chromium OS project. The code is available now at: - I'm currently in the process of trying to build a full system now (so more to come from me soon). Right now the gziped Tarball is 232 MB (pretty small for an OS) and the official build milestone number is 0.4.22.8.

PHP 5.3.1 Security Updates

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nearly five months after the release of PHP 5.3.0, the PHP developers have released the first maintenance update to the 5.3 branch of their popular programming language. The PHP 5.3.1 update focuses on stability and includes approximately 100 bug fixes, some of which are security related.

10 Lessons Google Must Learn About OS Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

News Analysis: Google is new to the operating system market, so it has to demonstrate that it understands how to build and maintain a secure Web OS. The history of Windows security has shown there are many avenues of attack against a desktop operating system. There are even more potential attack strategies for an online OS. But whether Google has learned the many hard lessons of Web security is very much in doubt at this point.

Official Bruce Schneier action figure steps onto market

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Good news for devotees of ponytailed crypto guru of all our hearts Bruce Schneier: it's now possible to buy an officially endorsed "Bruce Schneier action figure". The action figure, which can be purchased here, comes with a range of costumes ("casual Bruce", "smart Bruce" and "head only"), and also features "scalp" options ("bald", "ponytail" or "cyborg").

Vulnerability in Wikipedia Toolbar for Firefox

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security service provider Secunia has discovered a critical vulnerability in the Wikipedia Toolbar extension for Firefox that can be exploited by an attacker to compromise a victim's system. According to the report the cause of the problem is due to the application using invalidated input in a call to eval() which can be exploited to execute arbitrary JavaScript code.

H.D. Moore speaks about Metasploit Project deal, Release 3.3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The sale of the Metasploit Project, and its highly respected pen-testing platform to vulnerability management vendor Rapid7 in October signals change for yet another major open-source project to a commercial company. In a wide-ranging interview, Metasploit founder H.D. Moore speaks about the evolution of the Metasploit Project, the threat environment it has grown in and what the acquisition means for the future of the project. Moore also talks about the latest Metasploit framework release (version 3.3), the project's open source exploit development and penetration-testing platform.

Microsoft confirms Windows 7 tool used GPL code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft said Friday that its inquiry confirms that a tool aimed to make it easier to load Windows 7 on a Netbook does in fact contain open-source code. "After looking at the code in question, we are now able to confirm this was indeed the case, although it was not intentional on our part," Microsoft's Peter Galli said in a blog posting.