Vendors/Products - Page 36
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says. Launched Monday, the WPA Cracker service bills itself as a useful tool for security auditors and penetration testers who want to know if they could break into certain types of WPA networks. It works because of a known vulnerability in Pre-shared Key (PSK) networks, usually used by home and small-business users.
Novell this week will lay out an ambitious plan to secure applications across heterogeneous virtualization platforms at customer sites and off-premises, an effort designed to play off Novell's strengths in network and identity management.
Yesterday, Google launched its new Public DNS service. Among the benefits that Google is claiming for the new service is that it helps to secure DNS for users. Is that an accurate claim?
If you haven't installed the latest security update for Mac OS X, now would be a good time. A security researcher has released a proof-of-concept attack that exploits critical vulnerabilities that Apple patched on Thursday. The vulns stem from bugs in the Java runtime environment that allow attackers to remotely execute malicious code. Sun Microsystems patched the flaws early last month.
Security is among a broad mix of jobs expected to receive hiring attention from CIOs, according to the latest IT Hiring Index and Skills Report. Chief information officers are planning to increase hiring -- although at a low rate -- in the first quarter of 2010 with traditional jobs in networking, security, and application development most in demand, according to the latest IT Hiring Index and Skills Report from employment specialist Robert Half Technology.
See the 2010 average starting salary for IT positions, with regional differences in IT salary levels and the value of specialty tech skills including Chief Technology Officer, Information Technology Manager, Developer/Programmer Analyst, Lead Applications Developer, Software Engineer, Systems Administrator, Database Manager, Senior Web Developer, Network Engineer, Project Manager/Senior Consultant, Systems Security Administrator, and Help Desk Manager. As one commentator wrote, "In your opinion, does 2010 bode well for Systems Architects? Not wanting to shoulder the yoke of the played out title of analyst (and never being paid for the arduous research, understanding and wasted effort of architecting solutions in a very complex multi-business environment), I am wondering if this the "systems architect" direction is a wise direction."
Google's Chrome OS has many virtues. Based on a solid foundation of Ubuntu Linux, it uses the Chrome Web browser as its interface to any and all applications. Chrome OS is also not so much a Windows replacement, as it's an attempt to get rid of the entire traditional idea of a PC desktop. If Google is successful with this, one big reason will be its vastly improved security.
VMware has advised of a total of 93 vulnerabilities in several of its products, including ESX Server, Server, VirtualCenter and vCenter. Most of the vulnerabilities are in Java, Tomcat and the kernel and have been known for some time. Some of them can be exploited to compromise a system, however, the advisory notes that flaws in the Service Console kernel and JRE can only be exploited when an attacker has access to the Service Console network.
With most computers threatened by attacks coming through Web applications, it's no surprise that security would be a key piece of Chrome OS, Google's browser-based operating system that stores data in the cloud. Google showed off its new lightweight operating system designed for Netbooks and cloud computing on Thursday. As anticipated, it will rely on many of the same security features and concepts used by the Chrome browser.
T security and data protection firm Sophos is warning that a new virus attacking the users of jailbroken iPhones is the most serious to date, since it makes infected iPhones into zombies, joining them to a botnet.
Unless you live in a cave, don't care at all about technology or have been distracted by Sarah Palin's publicity tour, you've probably heard that Google showed its Linux-based Chrome operating system to the world yesterday.
Joe Faulhaber of the Microsoft Malware Protection Center has made the interesting claim that 64-bit Windows 7 is actually safer than ordinary, 32-bit Windows. He's right. "64-bit Windows [does] has some of the lowest reported malware infection rates in the first half of 2009." But, that's not the whole story.
Google today has officially open sourced its under-development Chrome OS operating system under the Chromium OS project. The code is available now at: - I'm currently in the process of trying to build a full system now (so more to come from me soon). Right now the gziped Tarball is 232 MB (pretty small for an OS) and the official build milestone number is 0.4.22.8.
Nearly five months after the release of PHP 5.3.0, the PHP developers have released the first maintenance update to the 5.3 branch of their popular programming language. The PHP 5.3.1 update focuses on stability and includes approximately 100 bug fixes, some of which are security related.
News Analysis: Google is new to the operating system market, so it has to demonstrate that it understands how to build and maintain a secure Web OS. The history of Windows security has shown there are many avenues of attack against a desktop operating system. There are even more potential attack strategies for an online OS. But whether Google has learned the many hard lessons of Web security is very much in doubt at this point.
Check out the info for links to the Google Chrome security blog, and other great information on keeping Chrome secure. Google has released an update to Google Chrome Frame that fixes several crashes and other bugs and one High-severity security issue.
Good news for devotees of ponytailed crypto guru of all our hearts Bruce Schneier: it's now possible to buy an officially endorsed "Bruce Schneier action figure". The action figure, which can be purchased here, comes with a range of costumes ("casual Bruce", "smart Bruce" and "head only"), and also features "scalp" options ("bald", "ponytail" or "cyborg").
Security service provider Secunia has discovered a critical vulnerability in the Wikipedia Toolbar extension for Firefox that can be exploited by an attacker to compromise a victim's system. According to the report the cause of the problem is due to the application using invalidated input in a call to eval() which can be exploited to execute arbitrary JavaScript code.
The sale of the Metasploit Project, and its highly respected pen-testing platform to vulnerability management vendor Rapid7 in October signals change for yet another major open-source project to a commercial company. In a wide-ranging interview, Metasploit founder H.D. Moore speaks about the evolution of the Metasploit Project, the threat environment it has grown in and what the acquisition means for the future of the project. Moore also talks about the latest Metasploit framework release (version 3.3), the project's open source exploit development and penetration-testing platform.
Microsoft said Friday that its inquiry confirms that a tool aimed to make it easier to load Windows 7 on a Netbook does in fact contain open-source code. "After looking at the code in question, we are now able to confirm this was indeed the case, although it was not intentional on our part," Microsoft's Peter Galli said in a blog posting.