Open Source Security Tools and Applications News
January 09, 2017
Truffle Hog utility roots out and detects text blobs with enough entropy to be secret keys -- even those buried deep in old Git repositories -- to prevent exploits.
January 03, 2017
A low-severity vulnerability dating back to 1995 in libpng, the official reference library implementation for PNG, may have enabled remote DoS attacks.
September 30, 2016
The cure for a low-severity OpenSSL vulnerability proves worse than the disease, as it opened a new, critical flaw, forcing the OpenSSL Project to rush out a new set of patches.
June 10, 2016
Mozilla created the Secure Open Source Fund to help developers perform security audits on software in an effort to reduce the potential of another Heartbleed or Shellshock.
Open Source Security Tools and Applications Get Started
Bring yourself up to speed with our introductory content
Pretty Easy Privacy (pEp) is an open source encryption tool designed to make it simple for users to protect their online communications. Continue Reading
Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available. Continue Reading
A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Open Source Security Tools and Applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The open source architecture has its detractors in terms of its security, but Apple's unencrypted iOS 10 kernel raises new questions. Expert Michael Cobb explains the pros and cons. Continue Reading
Before using open source security software, enterprises should consider the security risks. Expert Mike O. Villegas discusses what to do before using open source software. Continue Reading
The OSVDB closed down after 10 years due to lack of support from the open source community. Expert Nick Lewis explains the possible effects on the security industry. Continue Reading
Manage Open Source Security Tools and Applications
Learn to apply best practices and optimize your operations.
OpenPGP uses asymmetric encryption and symmetric encryption for different parts of its process. Expert Michael Cobb explains the purpose of hybrid encryption in message security. Continue Reading
Don't assume that your open source Web apps are secure. Expert Kevin Beaver explains the common vulnerabilities and how to include these systems in your security testing. Continue Reading
Enterprises should have a diverse set of open source security tools in their arsenal. Here are three factors that can help guide them in building the right security toolkit. Continue Reading
Problem Solve Open Source Security Tools and Applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Duo Labs discovered a flaw in the Redis tool that led to Fairware ransomware attacks on Linux servers. Expert Nick Lewis explains the security measures that enterprises can take. Continue Reading
Is it possible to build software speedily but safely? Startup CEO Mark Curphey thinks so, and he's using big data analytics to make open source code safe for developers everywhere. Continue Reading
Microsoft open sourced its .Net framework recently, and enterprises are concerned. Expert Michael Cobb explores if the fears of open source .Net are warranted. Continue Reading