Archive

Archive for March, 2006

Redknee Protects Wireless Subscribers’ Privacy Concerns with Industry First Solution

March 29th, 2006
Comments Off on Redknee Protects Wireless Subscribers’ Privacy Concerns with Industry First Solution

Redknee Inc., a leading provider of innovative infrastructure software that monetises and personalises services and content for mobile users, today announced the general availability of its Unified Profile Server (UPS) for mobile network operators worldwide. UPS protects privacy concerns, allowing users to retain control over their wireless identity and have a higher comfort level with trying and using new mobile services more often. Eliminating this usage barrier, UPS paves the way for adoption of next generation wireless data services, while addressing current legal and future regulatory requirements.
Read more…

News, Releases

Wireless Cracking Tools

March 29th, 2006
Comments Off on Wireless Cracking Tools

By familiarizing yourself with following software, you will not only have a better understanding of the vulnerabilities inherent in 802.11 networks, but you will also get a glimpse at how a hacker might exploit them. These tools can even be used when auditing your own network as we will see later.
Read more…

Articles

EndPoint Security with GFI EndPointSecurity

March 28th, 2006
Comments Off on EndPoint Security with GFI EndPointSecurity

GFI has announced that GFI EndPointSecurity has now gone live. GFI´s endpoint security solution provides IT administrators with granular, network-wide controls for portable storage devices, removable media and a wide range of consumer electronic devices.
Read more…

News

Researcher: DRM technology fails in practice

March 28th, 2006
Comments Off on Researcher: DRM technology fails in practice

Digital rights management (DRM) technology has deep flaws despite the hope of content providers that encrypted files will deter illegal file sharing, a computer security researcher said Monday. DRM is a catch-all term for a variety of methods used to limit content sharing.
Read more…

News

Stealth Malware: Interview with Joanna Rutkowska

March 27th, 2006
Comments Off on Stealth Malware: Interview with Joanna Rutkowska

In this interview Joanna Rutkowska, and independent security researcher, discusses malware stealth techniques and its security ramifications. Joanna is focusing on discovering new infection techniques, as well as methods to protect against them.
Read more…

Articles

StillSecure Facilitates Adoption Of Freeware Intrusion Detection / Prevention System

March 27th, 2006
Comments Off on StillSecure Facilitates Adoption Of Freeware Intrusion Detection / Prevention System

StillSecure, provider of an award- winning, integrated suite of enterprise network security solutions, today announced that StillSecure Strata Guard Free, the company’s freeware IDS/IPS, is available as a VMware virtual appliance. End users can now access the pre-built, pre-configured and ready-to-run version of Strata Guard Free for Linux environments.
Read more…

Releases

Terrorist 007, Exposed

March 27th, 2006
Comments Off on Terrorist 007, Exposed

For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. The savvy, English-speaking, presumably young webmaster taunted his pursuers, calling himself Irhabi — Terrorist — 007. He hacked into American university computers, propagandized for the Iraq insurgents led by Abu Musab al-Zarqawi and taught other online jihadists how to wield their computers for the cause.
Read more…

News

Email attachment vector for IE createTextRange() Remote Command Execution

March 27th, 2006
Comments Off on Email attachment vector for IE createTextRange() Remote Command Execution

Just for the sake of clarity, there is an email attachment vector for this exploit that´s not widely reported. I have not seen any reports of it being used at this time. MS´s bulletin, in the FAQ´s, in Could this vulnerability be exploited through e-mail?, says it can be exploited if one open(s) an attachment that could exploit the vulnerability. ISS obliquely says attacks may occur by …simply embedding the required logic in specially crafted HTML emails..
Read more…

News

Unipalm to distribute Symantec endpoint security solutions

March 27th, 2006
Comments Off on Unipalm to distribute Symantec endpoint security solutions

Unipalm, the UK and Ireland´s specialist distributor of secure e-business solutions, has been selected by Symantec as a value added distributor for endpoint security solutions and its behaviour-based intrusion prevention technology.
Read more…

Releases

Sage Software Selects Citrix GoToMyPC and GoToMeeting to Deliver Fast, Easy and Secure Desktop Access and Online Meeting Solutions to SMBs

March 27th, 2006
Comments Off on Sage Software Selects Citrix GoToMyPC and GoToMeeting to Deliver Fast, Easy and Secure Desktop Access and Online Meeting Solutions to SMBs

Citrix Systems, Inc. (Nasdaq:CTXS), the global leader in access infrastructure solutions, announced today a marketing alliance with Sage Software, the leading provider of business management software and services to small and mid-sized business (SMBs) customers in North America. Sage Software is offering Citrix(R) GoToMyPC(R) remote access service and Citrix GoToMeeting(TM) web-conferencing service to Sage MAS ERP, Sage Accpac ERP, Sage BusinessWorks, Sage PFW, and Sage BusinessVision customers. The value-added services from Citrix will enable Sage Software customers to easily and securely access the full contents of their desktops and collaborate in real time to increase productivity and reduce operational costs.
Read more…

Releases