Free tool reduces risk posed by lost, stolen devices

Open Source Security Tools and Applications

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Will new Sulley framework take fuzzing to next level?

    Pedram Amini, head of TippingPoint's security research group, has been busy with Aaron Portnoy, touting a new tool for functional protocol testing (also known as "black-box testing" or "fuzzing,"). He co-wrote the recently-released book "Fuzzing: Bru... 

  • Sourcefire acquires open source ClamAV

    Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. 

  • Immunity releases new exploit-writing tool

    Pen testing company Immunity says its Debugger tool offers researchers a new way to write exploits, analyze malware and reverse engineer binary files. 

  • Is a merger or acquisition in Sourcefire's future?

    It's been a busy year for Sourcefire Inc. founder and Chief Technology Officer Martin Roesch, creator of the widely popular Snort open source IDS tool. In November he announced that Sourcefire had filed with the U.S. Securities and Exchange Commissio... 

  • Security Wire Weekly -- May 30, 2007

    Snort creator and Sourcefire founder Marty Roesch talks about last year's failed Check Point acquisition and his decision to take Sourcefire public. Also, a summary of this week's news. 

  • Sourcefire, Nmap deal to open vulnerability scanning

    Sourcefire and have inked an agreement to develop open source vulnerability scanning tools based on Insecure's Nmap scripting engine. 

  • Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. 

  • Open source ID projects link up with Microsoft

    Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program. 

  • Bug Briefs: OpenOffice vulnerable to attack

    Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Reader, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. 

  • Podcast: Tor peer-to-peer privacy could be hacked

    In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities.