Security and open source

Security problems in software are of course an extremely bad thing, regardless of the business model under which the software was written. I want to consider why anybody …

OpenSSH Remote Vulnerability Roundup

In a recent discussion about the Apache Chunk Handling vulnerability, which consisted of many debates and rants on how the reporting was done, ISS mentioned that they found …

TrueSign: Under the Hood

Electronic document exchange and digital signatures are often considered as systems both hard to understand and difficult to use for the end user. This fear is often caused by …

Apache Chunk Handling Roundup

Internet Security Systems and NGSSoftware found a security issue with chunk encoding in the popular Apache web server. The problems may lead to a remote compromise and denial …

Roundup on BIND Denial of Service

Short description (from Incidents.org Handler’s Diary): There is a Denial of Service vulnerability in ISC Bind (versions 9 up to 9.2.1) When this is exploited by a …

Understanding the Email-Borne Threat

In the past few years, email has become the predominant purveyor of viruses. This rapid communications technology outpaces the signature-based scanner updates, allowing …

Corporate Security Overview: 04-11 June 2002

A number of security companies send us their company press releases, which we republish in the press section of Help Net Security. This is an overview of interesting …

An Introduction to Snort

This is a presentation at the Houston ISSA Meeting in April by Ricard Bejtlich, a senior forensic consultant for Foundstone. Download the presentation in PPT format here.