Vendors/Products - Page 47
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Last week we met with Martin Roesch, the creator of Snort, the de facto standard for intrusion detection/prevention. Presented here is the entire story of Snort in his words that covers seven years of development that made this tool one of the most important security software titles ever developed.
We've launched a new wiki-based site to collect and organize information and resources about the new EnGarde Secure Linux 3.0. This site is designed to become the standard repository for FAQs and HOWTOs about EnGarde, and we welcome any and all community input. Visit the new site at .
Red Hat yesterday announced the availability of a new security certification for IT professionals: Red Hat Certified Security Specialist (RHCSS). The announcement of the RHCSS certification is the Company's latest milestone in its "Security in a Networked World" initiative lanched in August.
The source code of one of the world's most popular free security tools will no longer be available to all, its creator has announced, saying the software's open-source license was fueling competition.
Flash memory pioneer SanDisk has embedded DRM and copy protection functions into several flash card form factors. "TrustedFlash" will allow users to buy music, movies, and games on flash cards for use interchangeably in mobile phones, PDAs, laptops, and other devices, according to the company.
RealNetworks has patched the Linux media players that were susceptible to a zero-day attack for much of last week.
First came all the praise about Firefox 1.0 being more secure than Internet Explorer (IE). Then came headlines about mega-downloads chipping away at Microsoft's market share. Then came months of uncovered flaws and security updates that now has Firefox up to version 1.0.7.
Realtime's Risk Management Tool, APM, has been installed over 150 times to SAP customers and our bioLock is well established in the SAP world as the first SAP certified biometric identity management solution. These were enough reasons for SAP to approach realtime to include us in an educational movie about Sarbanes-Oxley. We facilitated an interview with Professor Paul Foote, (a Harvard educated Accounting Professor in California and Sarbanes-Oxley expert), that has built a biometric research center around the bioLock technology. SAP decided to make an additional movie about the bioLock technology to point out the powerful capabilities of biometrics, when it comes to complying with mandatory regulations. Both movies were shown on SAP TV worldwide.
Peter Zelezny has discovered a vulnerability in Firefox, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the shell script used to launch Firefox parsing shell commands that are enclosed within backticks in the URL provided via the command line. This can e.g. be exploited to execute arbitrary shell commands by tricking a user into following a malicious link in an external application which uses Firefox as the default browser (e.g. the mail client Evolution on Red Hat Enterprise Linux 4).
"Guardian Digital is shortly going to be announcing the next major release of its award-winning EnGarde Secure Linux platform, and we'd like to offer the engarde-users community a first-glimpse at this release. Within this new release, codenamed Rapier, you'll find: Linux 2.6 kernel featuring SELinux Mandatory Access Control; Guardian Digital Secure Network features free access to all system and security updates; support for new hardware, including 64-bit AMD architecture; web-based management of all functions...."
At Novell's Brainshare user conference in Barcelona last week, the software supplier said it had strengthened its identity and access management security products, Novell Identity & Access Management. Novell also claimed significant customer gains in Europe with its open source SuSE Linux desktop and enterprise server.
Red Hat is accusing Microsoft of getting its facts wrong in its latest attack on Linux security. In an update on security at Microsoft's recent world-wide partner conference, the company's security head Mike Nash took aim at Linux to single out Red Hat. Nash says between January and June this year, Microsoft released 38 security bulletins for Windows Server 2003, while in the same period 234 were issued for Red Hat's Enterprise Linux 3.
Two vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or bypass certain security restrictions.
A security flaw in Adobe Systems' popular Acrobat and Reader applications could be used to shut down or hijack vulnerable PCs. By crafting a malicious PDF file, a remote attacker could cause the applications to crash or possibly commandeer the target computer, Adobe said in a security advisory published on Tuesday. The San Jose, Calif.-based software maker has updates available to fix the problem.
Comodo owned Trustix, developers of the world’s most secure Linux and inventors of the world’s first WYSIWYG firewall, today announced that the latest version of Trustix Enterprise Firewall will be available at no charge. The decision enables administrators to protect their networks for free with a firewall developed and maintained by Trustix’s highly skilled firewall developers
Companies that sell software and hardware around the Linux open-source operating system have known for some time that they've tapped into a gold mine, an area of the IT market with plenty of customer interest and enormous growth potential. The growth will continue as long as Linux and other open-source software are considered secure and are sold and serviced as bundles rather than as individual products.
Red Hat has unveiled an initiative dubbed 'Security in a Networked World' at the LinuxWorld tradeshow in San Francisco. As part of the programme, the Linux vendor showcased its Red Hat Certificate System that allows organisations to manage security certificates used to sign emails, or authenticate users for online banking applications. It also supports authentication through the use of smartcards. Red Hat has been working with the Apache Foundation to add support for the Firefox browser and Thunderbird email client through the use of Apache's open source Network Security Service Libraries.
Flaws have been found in MySQL Eventum 1.5.5 and prior that allow malicious users to conduct cross-site scripting and SQL injection attacks.
A bug discovered in an operating system that runs the majority of the world's computer networks would, if exploited, allow an attacker to bring down the nation's critical infrastructure, a computer security researcher said Wednesday against threat of a lawsuit. Michael Lynn, a former research analyst with Internet Security Solutions, quit his job at ISS Tuesday morning before disclosing the flaw at Black Hat Briefings, a conference for computer security professionals held annually here.
3Com this week is expected to launch a program that offers cash to members of the security community in return for information on potentially damaging Internet-based security threats. Its Zero Day Initiative is an attempt to prompt the disclosure of security vulnerabilities quicker by giving independent security researchers incentive for pointing out holes in software and hardware products that could lead to network attacks. Some observers call the program a positive step toward making networks safer, while others question how such a payoff system would work, or whether third-party vendors -- including 3Com competitors -- would react negatively to a system under which 3Com gives money to individuals for information about product vulnerability before the affected vendors know about them.