Security

These Articles are indexed under Security and sorted by date published.

The Top 5 Most Overlooked Open Source Vulnerabilities for 2007

For year-end 2007, we have compiled the Top 5 Most Overlooked Open Source Vulnerabilities encountered during 2007. We came up with this list after reviewing over 300 million lines of code and…

Top Ten Security 2008

"Two weeks ago I was in L.A., jumping from meeting after meeting, and at the end of every meeting, I asked everyone what they saw in the Identity and Access Management road ahead. I got some great…

Breach Security's ModSecurity Open Source Web Application Firewall

Breach Security announced today that the Breach Security WebDefend web application firewall has earned certification by ICSA Labs, an independent division of Verizon. WebDefend is one of the first…

New Hardeware Monitoring and Security Tools from "Linux Firewalls"

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.18 (Version 3.0, Release 18). This release includes many updated packages and bug fixes, some feature…

IBM Lotus Notes for Linux Multiple Insecure File Permission Vulnerabilities

Multiple vulnerabilities have been identified in IBM Lotus Notes for Linux, which could be exploited by malicious users to bypass security restrictions and potentially compromise a vulnerable…

Linux Kernel Multiple Denial of Service Vulnerabilities

Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). The vulnerabilities are…

EnGarde Secure Linux 3.0.17 Released

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.17 (Version 3.0, Release 17). This release includes many updated packages and bug fixes, some feature…

Attacking Log analysis tools

Log Analysis (i.e. LIDS - Log-Based Intrusion Detection) can be a very powerful tool to complement NIDS/HIDS and improve network security. I pointed out some of its benefits in the following…

Linux is new phishing threat to eBay

eBay says online criminals are getting more organised and branching out from the Windows operating system to use the open-source Linux platform.

eBay recently did an in-depth analysis of…

Security drives open source technology deployment in Asia

The top most influential factor for deploying open source technology in Australia, Korea, India and the People's Republic of China is better protection against security breaches, according to a…