Applications - Article Archives - Page 4

No Silver Bullet for Use-After-Free Flaws [VIDEO]

September 22, 2014 |

Bromium's chief security architect discusses modern security flaws and warns about dangerous malvertising threat.

READ MORE

TrueCrypt Getting a New Life

September 18, 2014 |

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014 |

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

READ MORE

Are Anti-Malware's Days Numbered?

May 30, 2014 |

Anti-malware software can't spot all malicious code. Is  isolating end-user tasks through virtualization a better approach to security?

READ MORE

Heartbleed Especially Risky for SMBs

April 14, 2014 |

Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.

READ MORE

Review: GreenSQL Database Security

January 30, 2014 |

Business databases are the holy grail for hackers. Matt Sarrel reviews some products from GreenSQL that help protect databases.

READ MORE

Securing Apps Starts with Code: Sonatype

January 28, 2014 |

Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.

READ MORE

Linux Foundation Aims to Secure Internet of Things

December 10, 2013 |

The key to securing the Internet of Things could be in making sure that everything isn't actually connected to the Internet.

READ MORE

Is Docker the Future of Virtualization Security?

December 04, 2013 |

Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.

READ MORE

Oracle Patches 89 Security Flaws in July

July 17, 2013 |

Oracle's July Critical Patch Update includes 89 patches, which seems like a lot. Is it?

READ MORE

Inside the Bluebox Android Master Key Vulnerability

July 10, 2013 |

Are you at risk for an Android vulnerability that involves the verification process for the popular OS? Find out!

READ MORE

Can You Completely Secure Linux?

June 13, 2013 |

Top Linux security engineers address whether complete security can ever be achieved with the open source operating system.

READ MORE

What's Next for Mozilla Firefox Security?

May 29, 2013 |

What's new and what's coming that will secure the open source browser

READ MORE

OpenStack Hardening Security for Open Source Cloud Platform

April 19, 2013 |

OpenStack Security Group makes progress securing the open source cloud platform, but lots of work remains.

READ MORE

Making Enterprise Penetration Testing Less Mysterious

April 12, 2013 |

With its Metasploit 4.6 Pro release, Rapid7 aims to make penetration testing less of a dark art and more accessible for enterprises.

READ MORE

Snort Founder Still Supports Open Source Security [VIDEO]

March 29, 2013 |

Hundreds of millions of dollars after building a commercial security vendor, Sourcefire founder Martin Roesch hasn't forgotten his open source roots.

READ MORE

Is Cloud PaaS Safe?

March 06, 2013 |

Security researchers from Trustwave take aim at Platform-as-a-Service and find security controls to be lacking

READ MORE

SSL Certificate Authorities Team up to Boost Web Security

February 14, 2013 |

SSL Certificate Authorities claim a 99.995 accuracy rate, despite headline-making Web security breaches in the last two years.

READ MORE

Metasploit Goes Phishing

December 11, 2012 |

Leading open source penetration testing framework adds phishing attacks to its arsenal. What can and should an enterprise do?

READ MORE

Is OpenStack Cloud Platform Secure?

October 19, 2012 |

Security efforts are ramping up as adoption of the OpenStack cloud platform grows.

READ MORE