×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Applications - Article Archives - Page 11

Metasploit Gains Further Commercial Adoption

February 18, 2010 |
Yet another commercial tool integrates open source metasploit for security testing – is this a good thing?
READ MORE

How to: Set Up TrueCrypt Disk Encryption, Part 1

February 17, 2010 |

Eric Geier gives step-by-step instructions for improving laptop security by protecting your data with TrueCrypt disk encryption.

READ MORE

Oracle Patches Two Dozen Flaws

January 13, 2010 |
First Oracle critical patch update of the year shows that databases are still very much at risk in 2010, though more so on Windows than on Linux.
READ MORE

Simple Data Security Solutions

December 23, 2009 |
If you prioritize data security--and who doesn't?--the Aegis Padlock portable hard drive offers a secure, affordable solution for Windows, Mac, and Linux that's simple enough for even non-IT pros to manage.
READ MORE

Mozilla Updates Firefox 3.5.6 for Three Critical Flaws

December 16, 2009 |
New version of open source browser tackles memory corruption and spoofing issues.
READ MORE

Metasploit, NeXpose Integrate for Enterprise Security Testing

December 02, 2009 |
Rapid 7 is now integrating popular open source exploit framework into a more enterprise-friendly suite for vulnerability scanning.
READ MORE

IBM's Virtual Server Security: 'Every Layer'

November 16, 2009 |
IBM newly released Virtual Server Security for VMware vSphere touts its protection of the entire infrastructure, from the hypervisor to server-based virtual desktops.
READ MORE

Windows and Online Banking: A Dangerous Mix

October 19, 2009 |
This security expert uses Windows for most functions, yet feels it’s not safe enough for the average user to trust for online banking.
READ MORE

WordPress Bloggers Tricked by 'Clever' Worm

September 09, 2009 |
Using an outdated version of WordPress blogging software can pose security challenges.
READ MORE

Black Hat Attendees Focus on Oracle, Mac

July 30, 2009 |
Experts at the Black Hat conference in Las Vegas show tools to automate penetration testing of Mac OS X and Oracle databases.
READ MORE

Open Source Hacking: Revealing Metasploit's Misdeeds

July 29, 2009 |
A new forensics platform will reveal whether a system has been compromised by the open source Metasploit.
READ MORE

Controversial 'Oracle Hacking' App to be Released

July 23, 2009 |
Oracle has released patches to guard against the open source Metasploit tool, but some companies may not have installed them.
READ MORE

How to Remove Malware (Part 2): Booting from a CD

June 16, 2009 |

Using a boot CD to remove malware can be more effective than simply running an anti-malware software program.

READ MORE

Adobe Issues Critical Patch for Reader and Acrobat

June 11, 2009 |
It's well worth upgrading your version of Adobe Acrobat and Reader.
READ MORE

Mozilla Security Stresses Testing

April 28, 2009 |
Johnathan Nightingale of Mozilla's security team argues that testing is key -- and that simply counting bugs isn't a good measure for security.
READ MORE

Adobe Acrobat for Windows, Mac is Patched

March 12, 2009 |
The Windows and Mac version of the ubiquitous PDF reader is patched, while the Linux version remains vulnerable.
READ MORE

Cell Phone Security Updates: Voluntary or Involuntary?

March 10, 2009 |
Should mobile carriers push out updated software to customers regardless of choice, or is it safer to have the users request the updates?
READ MORE

Firefox Gets Three Fixes

March 06, 2009 |
As the Firefox 3.1 update approaches, Mozilla takes care of a handful of security problems.
READ MORE

26 Open Source Security Apps with Commercial Support

January 26, 2009 |
For businesses, these apps offer the best of both worlds—the flexibility, security, and cost savings of open source combined with the peace of mind that comes with commercial support.
READ MORE

10 Patches, and More, for Firefox Users

December 18, 2008 |
Included in the patches are critical cross site scripting vulnerabilities.
READ MORE