Email Alerts
-
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Article
-
Open source ID projects link up with Microsoft
Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program. Article
-
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Reader, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. Article
-
Comodo Firewall: An intelligent way to protect against application attacks
Looking for a solid firewall replacement? Contributing editor, Scott Sidel, recommends Comodo Firewall, an open source tool that can prevent application attacks. Tip
-
What enterprise tools can scan files for sensitive data?
Given the many recent high-profile data breaches, organizations seem keen on securing their sensitive data, including credit card and social security numbers. In this expert Q&A, SearchSecurity.com's Mike Chapple reviews tools that can scan text-base... Ask the Expert
-
Google Code Search -- Finding security flaws has never been easier
While Google Code Search may offer a number of benefits that will help improve application security, hackers have learned how to use the search giant's code-finding engine to exploit security weaknesses. In this tip, Ed Skoudis examines how malicious... Tip
-
KeePass -- Keeping passwords under lock and key
Can't remember all of your passwords? Contributing Editor, Scott Sidel, recommends KeePass, an easy-to-use open source password manager. Tip
-
Nessus can spot some monster security problems
If given the choice of only one vulnerability scanner, Contributing Editor Scott Sidel would use Nessus. Find out why in this Guest Commentary Tip. Tip
-
Information security freeware has its benefits
Before committing a significant portion of your 2007 budget to expensive new security tools, it might be wise to consider freeware tools instead. Ed Skoudis reveals how using information security freeware tools can not only help an organization cope ... Tip
-
For asset management systems, is there a tool more comprehensive than Nmap?
If you're looking for a network discovery tool, consider Nmap. There are other options for your asset management system, however, and Michael Cobb reviews them in this expert Q&A. Ask the Expert
Security Management Strategies for the CIO