A patch has been widely released for a vulnerability in the OpenOffice.org productivity suite, a problem rated as "highly critical" by one security vendor.
Some vulnerabilities have been reported within the Linux kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).
When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. A more efficient approach is to configure a system securely from the start.
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox.
Eugene Teo has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges.
TEN WELL AIMED silver bullets would take care of 80 per cent of the world's spam, according to the anti-spam organisation Spamhause. According to Security Pro News, Spamhause thinks that there are only ten people that are responsible for most of the spam in the world.
A UK law has been passed that makes it an offence to launch denial of service attacks, which experts had previously called "a legal grey area."
Linux developer and Red Hat veteran Alan Cox urges caution to those who think Linux security is foolproof
A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root.
Some vulnerabilities have been reported in the Linux 2.6 Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).
This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.
In this guide you will learn how to tweak your Postfix/Amavisd setup to give better virus protection. If you want to achieve business grade virus protection you need to do a few small things so that there is less chance of the latest greatest script kiddie invention getting through. Therefore this tutorial shows how to install and use ClamAV, F-Prot, and McAfee UVScan.
Red Hat today announced its continuing commitment to superior security services with a new initiative, implemented by the National Institute of Standards and Technology (NIST), that enables members of the software industry to officially and publicly comment on vulnerabilities.
Nikto is an advanced web vulnerability scanner, which can help you expose the potential holes in your webserver (and thus allow you to fix them before malicious users attempt to exploit them). This guide will show you how to use its advanced scanning features to expose holes in your webserver which you never knew existed!
Your computer running Linux somehow ran into a hardware glitch and had to be hauled to the neighborhood Computer service center. And you are asked to leave the machine at the service center and come back after a couple of days so that the technician can have a good look at it. But you are a bit worried because the harddisk contains the blue prints of the most secret project you are currently working on.
OpenOffice.org has hit back at claims that the alternative office applications suite is riddled with security holes. Researchers at the French Ministry of Defense say that OpenOffice is subject to security weaknesses that make it at least as susceptible to computer viruses as the commercial, more widely used, Microsoft Office.
With Microsoft's Office suite now being targeted by hackers, researchers at the French Ministry of Defence say users of the OpenOffice.org software may be at even greater risk from computer viruses.
“The idea behind Blue Pill is simple,” says Joanna Rutkowska of invisible things. “Your operating system swallows the Blue Pill and it awakes inside the Matrix.”