Archive

Archive for December, 2005

XMS: Secure Mobile Messaging Service

December 21st, 2005
Comments Off on XMS: Secure Mobile Messaging Service

The partnership signed between TM Net and Network Security Solutions resulted in the launch of the first mobile software XMS, that enables end-to-end security and trust in mobile messaging. XMS is expected to be suitable for celebrities, enterprises and government agencies.
Read more…

Articles

Privacyware Upgrades its Intrusion Prevention Software

December 21st, 2005
Comments Off on Privacyware Upgrades its Intrusion Prevention Software

Privacyware, a provider of desktop and host security data solutions, today released an upgrade of its intrusion prevention solution ThreatSentry 3.0. Key enhancements to ThreatSentry 3.0 include increased protection from zero-days attacks and expanded administrative features to manage malicious activity within the host environment.
Read more…

Articles

Fortify Secures Oracle Code

December 21st, 2005
Comments Off on Fortify Secures Oracle Code

Source code security technology start-up Fortify Software was chosen by Oracle to seek out potential security holes in Oracle’s database and middleware software. Oracle with over 30 million lines of code is the first top-tier commercial software to sign as a Fortify customer.
Read more…

Articles

VLAN to Enhance Network Security

December 21st, 2005
Comments Off on VLAN to Enhance Network Security

Organisations need to build several layers of security into each port on the IP-enabled corporate network if they are to fully protect themselves from DOS and DDOS attacks.
Read more…

Articles

Securing Wireless Technology: Communication, Part II

December 20th, 2005
Comments Off on Securing Wireless Technology: Communication, Part II

The beauty of wireless communication is that it frees the user from the limited reach of wires or a dock. Mobile data systems pass information from mobile devices in remote locations to the enter¬prise data center via radio waves in “free space.” This area in the middle, between the device and host, is where the information is transported or communicated. This layer must be secured as well.
Read more…

Articles

Security against credit card fraud

December 20th, 2005
Comments Off on Security against credit card fraud

Some attacks of this type also use exploits on fraudulent websites, taking advantage of a vulnerability to download keylogger Trojans that steal confidential user information.
Read more…

Articles

Security against credit card fraud

December 20th, 2005
Comments Off on Security against credit card fraud

In the Middle Ages, the Knights Templar invented a system to enable pilgrims to travel to the Holy Land without having to carry ‘real’ money with them. This system would perhaps be an equivalent to the bank cards we carry with us today.
Read more…

Articles

Security Risk Assessment in Web Application Security

December 20th, 2005
Comments Off on Security Risk Assessment in Web Application Security

Session management. Another factor one should consider when developing a security risk management plan is that many Web applications do a poor job of managing unique user sessions. This can include using weak authentication methods, poor cookie management, failure to create session timeouts, and other session weaknesses. This often leads to session hijacking and other compromises of legitimate user identities. A security risk assessment can determine whether this is a potential problem for your organization.
Read more…

Articles

Security Risk Assessment in Web Application Security

December 20th, 2005
Comments Off on Security Risk Assessment in Web Application Security

Even though the Intranet server has greater vulnerability, the value of the asset creates a lower relative risk value than the e-commerce server. Performing an overall security risk assessment this way allows organizations to make wise decisions when it comes time to deploy scarce resources to optimize the protection of their assets. Security risk management is a process of managing an organization’s exposure to the threats to its assets and operating capabilities. The goals of the security risk management process are to provide the optimal level of protection to the organization within the constraints of budget, law, ethics, and safety.
Read more…

Articles

Security Risk Assessment in Web Application Security

December 20th, 2005
Comments Off on Security Risk Assessment in Web Application Security

Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily: from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of government regulations aimed to ensure the confidentiality, integrity, and availability of many types of financial and health-related information also is increasing IT risks and making a comprehensive security risk assessment a modern day corporate necessity.
Read more…

Articles