dcsimg

Applications - Article Archives - Page 7

10 Open Source Pentest Tools

December 11, 2015 |

Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source.

READ MORE

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 08, 2015 |

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

READ MORE

TrueCrypt Travails Continue

October 26, 2015 |

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

READ MORE

Using Hadoop to Reduce Security Risks

October 13, 2015 |

Using Hadoop and advanced analytics is one option for detecting and deflecting cyber attacks.

READ MORE

Why Microsoft Wants to Improve Open Source Security [VIDEO]

August 20, 2015 |

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

READ MORE

5 Free Tools for Compliance Management

July 27, 2015 |

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.

READ MORE

Will Red Hat Enter the Security Market?

June 30, 2015 |

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

READ MORE

Bringing Secure Boot to the Core of Containers [VIDEO]

May 29, 2015 |

VIDEO: Matthew Garrett, principal security engineer at CoreOS, discusses his efforts to bring a root of trust from bare metal all the way to the operating system level.

READ MORE

Why All Linux (Security) Bugs Aren't Shallow

February 20, 2015 |

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.

READ MORE

How Secure Is Android if Google Won't Patch?

January 13, 2015 |

A security researcher alleges that Google won't patch its older Android software for a new vulnerability. Luckily, users have options to boost security for older versions of the OS.

READ MORE

The Trouble with Tor

December 16, 2014 |

Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.

READ MORE

Google Brings Open Source Security Gifts

November 24, 2014 |

Google isn't just about search anymore. In recent weeks it has announced multiple security projects including Santa for Mac.

READ MORE

Is Shellshock a Feature, not a Bug?

November 05, 2014 |

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

READ MORE

VeraCrypt a Worthy TrueCrypt Alternative

October 13, 2014 |

VeraCrypt, a popular open source encryption alternative to TrueCrypt, is at a crossroads as its primary contributor lacks the time to maintain it on his own.

READ MORE

An Open Source Solution to Shellshock

October 01, 2014 |

An open source tool can mitigate risks associated with Bash shell attack.

READ MORE

No Silver Bullet for Use-After-Free Flaws [VIDEO]

September 22, 2014 |

Bromium's chief security architect discusses modern security flaws and warns about dangerous malvertising threat.

READ MORE

TrueCrypt Getting a New Life

September 18, 2014 |

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014 |

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

READ MORE

Are Anti-Malware's Days Numbered?

May 30, 2014 |

Anti-malware software can't spot all malicious code. Is  isolating end-user tasks through virtualization a better approach to security?

READ MORE

Heartbleed Especially Risky for SMBs

April 14, 2014 |

Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.

READ MORE