Vendors/Products - Page 39

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Microsoft ordered to stop selling Word

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A judge on Tuesday ordered Microsoft to stop selling Word, one of its premier products, in its current form due to patent infringement. Judge Leonard Davis of the US District Court for the Eastern District of Texas issued a permanent injunction that "prohibits Microsoft from selling or importing to the United States any Microsoft Word products that have the capability of opening .XML, .DOCX or DOCM files (XML files) containing custom XML", according to a statement released by attorneys for the plantiff, i4i.

11 security companies to watch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nice summary and slideshow of the top companies we should be watching for the second half of the year. Our annual look at new security companies worth keeping an eye on. Are there others worth noting? Got experience with any of these companies? Leave your thoughts in our comments section.

What will Google's Chrome OS watch you do?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google has a long history of tracking user activity, and the introduction of its Chrome operating system later this year is sure to follow suit. While we know that it's being built off of Linux, one big thing we don't know is how its terms of service will differ from those found in other Google products, and what kinds of user data it will be collecting. Based on the company's track record of watching and monetizing user data, it could be anything from which applications you're using, to all the information that's coming in and out of your computer.

Does Google's OS decrease or increase security risks?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wednesday's two big technology stories--Google's Chrome-based operating system and cyberattacks against U.S. and South Korean government Web sites are oddly related. The stories are connected because if Google does well at gaining market share for its browser, we could see fewer successful attacks. Or maybe we'll see more attacks.

SourceForge Grows Up - and Out

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SourceForge is keenly aware of its roots in the open source community, and its strategies for growth encompass ways to better serve its base. Among its goals are a transformation of the Sourceforge.net Web site into "a world-class development environment," said Jon Sobel, SourceForge's group president of media.

Mozilla releases security fixes for Firefox

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Firefox web browser has been patched for security flaws, four of which were identified as "critical" by Mozilla. A total of nine security flaws were fixed in the new release. The patches include a fix for flaws such as one that allows scripts from page content to run with elevated privileges. With this, an attacker could cause an object such as a browser sidebar to interact with web content so that an attacker's code had elevated privileges.

Google Native Client grows out of research phase

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Has anyone used this yet, or have a review of how well it performs in the real world?Satisfied that its security underpinnings are solid, Google has promoted its open-source Native Client technology to accelerate Web applications out of its research phase and is taking steps to build it into the Chrome Web browser. "Based on our experience to date, we believe that the basic architecture of our system is sound and the implementation is supportable. So now we are undertaking a number of tasks to transition Native Client from a research technology to a development platform," said Brad Chen, Google's Native Client engineering manager, in a mailing list announcement Wednesday.

Fedora 11: Leonidas is Hardly a Spartan Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New Fedora release today, promoting improved desktop and server features, and better virtualization security.Frields added that Fedora 11 also includes something called sVirt which is SELinux (Security Enhanced) containment for virtual guests. SELinux is an access control technology that has its roots in the NSA (National Security Agency) and has been part of Fedora for years. By extending SELinux to virtual guests, Fedora is enhancing the security of its virtualization technologies. Fedora 11 also includes what Frields described as better authentication for its virtualization manager software (virtmanager).

Hacking Tool Lets A VM Break Out And Attack Its Host

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

'Cloudburst' memory-corruption exploit released with Immunity's new version of Canvas penetration testing software. Researchers for some time have demonstrated the possibility of one of virtualization's worst nightmares -- a guest virtual machine (VM) infiltrating and hacking its host system. Now another commercial tool is offering an exploit that does exactly that.

Review: Malware-fighting firewalls miss the mark

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many of today's UTM boxes have their roots in Linux. Which perform best?The InfoWorld Test Center attacks Astaro, SonicWall, WatchGuard, and ZyXel firewalls, and only one puts up a fight. Indeed, a rapidly growing number of small and mid-size companies are opting for the administrative and operational simplicity of the single-box solution. And so we decided that UTMs aimed at the mid-size company were the perfect group to use for the rollout of InfoWorld's new firewall and UTM test protocols. When we began this process well over a year ago, we asked for input from virtually every firewall and UTM vendor we knew, and we invited every UTM vendor we could find to send us an appliance to test. In the end, four vendors answered the call. Astaro, SonicWall, WatchGuard, and ZyXel submitted units for this first set of tests.

Linux-ready networking SoCs scale to 40 cores

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LinuxDevices has a neat article describing a new $275 processor that works well in UTM, crypto, intrusion detection, and other security-related applications.Netronome announced new multi-core "network flow processors" that are backward-compatible with Intel's IXP28xx, but claimed to offer over twice the MIPS. The Linux-compatible NFP-32xx system-on-chips scale from 16 to 40 cores, offer 20Gbps throughput, and provide a programmable dataplane, virtualization, and security processing, says the company.

UltraDNS service knocked offline by attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NeuStar, a provider of highly-available DNS services, experienced a coordinated DDoS the other day: "Early this morning, our monitoring systems detected a significant denial of service attack, which affected a small subset of our customers, in some cases for as long as a few hours," the Reston, Va. company said in a statement. "While we continue to investigate the cause, the extent, and the duration of the attack, service was completely restored by 10 a.m. EST."

Securing Mashups With SSL

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new startup, out of the University of Texas at San Antonio, is trying to address mashup risks: SafeMashups' new technology lets applications authenticate with one another using the Secure Sockets Layer (SSL) protocol before they "mash up" -- or basically blend their data and functionality. To date, most enterprises have been uneasy about adopting mashups given the difficulty of establishing trust among online applications sharing data and functionality via a browser.

Small Companies Lax About Computer Security, Report Finds..

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Large companies are valuable targets for cyber criminals, but what about the small fry? Software security firm McAfee took a gauge of opinions, finding that some small and medium-size businesses don't seem that concerned about potential hacks. At least that's what its recent survey suggested. Are not enough small companies taking computer security seriously? Do you think Linux can be a solution to these companies security needs? This article studies the role of computer security in small companies.

Popular Open Source Spam Filter Gets Boost

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SpamAssassin, popular open source spam-filtering software, will have deadlier aim thanks to an add-on tool that is being offered free of charge to small businesses and individuals by MailChannels. The tool -- called Traffic Control 3 -- is an e-mail traffic-shaping package that slows down the transmission of spam into corporate e-mail systems. (Compare Messaging Security products.) MailChannels officials say Traffic Control 3 will reduce spam volumes by 50% to 75% for SpamAssassin users. Traffic Control 3 uses a tarpitting technique that greatly reduces the speed at which spam can be transmitted to its target, hitting spammers at their one great vulnerability - their pockets. Reduced speed means less money, and spammers just aren't willing to make the compromise. What have you heard about Traffic Control 3 - anyone else know any good open source spam tar pits?

Prediction: The RSA Conference Will Shrink Like a Punctured Balloon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week was the RSA Conference, easily the largest information security conference in the world. More than 17,000 people descended on San Francisco's Moscone Center to hear some of the more than 250 talks, attend I-didn't-try-to-count parties, and try to evade over 350 exhibitors vying to sell them stuff. Talk to the exhibitors, though, and the most common complaint is that the attendees aren't buying. Schneier makes an interesting comparison of anti-lock brakes to security products near the end of the article that sheds new light on how the security industry is evolving. Do you feel this is for better or worse?