Archive

Archive for June, 2006

Service Providers Must Protect Customers from DDoS

June 29th, 2006
Comments Off on Service Providers Must Protect Customers from DDoS

The recent case of Blue Security, where the reverberations of attacks from criminal spammers brought down hundreds of ordinary web users and small internet companies, has highlighted the vulnerabilities within major internet services. Many service providers have not been fully equipped to deal with the high-level DDoS and DNS amplification attacks that are increasingly occurring.
Read more…

Uncategorized

Do you really need WEP or WPA?

June 29th, 2006
Comments Off on Do you really need WEP or WPA?

The wonderful thing that most SOHO wireless device manufacturers are promoting is encryption. WEP, being the most commonly used encryption method available, appears to be used in about 48% of most wireless installations, based on past experiences while wardriving–while 2% being WPA, and the rest being completely in the open. Thanks to WEP and WPA, you need to figure out what the key is in order to get on the network.
Read more…

Uncategorized

Exploring the x64-treme heights of the Internet

June 29th, 2006
Comments Off on Exploring the x64-treme heights of the Internet

Having released two major Windows versions for the x64 architecture (also known as ‘AMD64’), Microsoft has opened the door to inexpensive 64-bit computing for just about everybody. At the 2005 Virus Bulletin Conference I presented a paper on the x64 architecture, detailing how known 32-bit viruses and rootkits interact with it.
Read more…

Uncategorized

PHP Top 5 Attacks

June 29th, 2006
Comments Off on PHP Top 5 Attacks

PHP is a very popular language with many flawed security features. Every PHP developer and hoster should understand the primary attack vectors being used by attackers against PHP applications. This article is the underlying research behind the SANS Top 20 2005´s PHP section. The methodology used in the preparation of this article is to review all Bugtraq postings containing the word PHP and categorize each unique flaw.
Read more…

Uncategorized

Data Security Displacing Malware as #1 Concern Worldwide

June 29th, 2006
Comments Off on Data Security Displacing Malware as #1 Concern Worldwide

Data Security was the top concern of enterprise IT professionals according to the results of a recently released survey sponsored by Apani Networks, a provider of software that secures inside the network perimeter.
Read more…

Uncategorized

Arcot Systems Receives 2006 Digital Authentication & Security Product Innovation of the Year Award

June 29th, 2006
Comments Off on Arcot Systems Receives 2006 Digital Authentication & Security Product Innovation of the Year Award

Arcot Systems, Inc., a leading provider of multi-factor authentication, credential management, and digital signature solutions, today announced the company has won Frost & Sullivan´s Digital Authentication & Security Product Innovation of the Year Award. Frost & Sullivan, a global growth consulting company, recognized Arcot for its development of the ArcotID(R), a unique software-only solution for electronic strong authentication and digital signing.
Read more…

Uncategorized

Web-based Spyware Hits to Pass the Million a Year Mark

June 29th, 2006
Comments Off on Web-based Spyware Hits to Pass the Million a Year Mark

Finjan is advising enterprise CIO´s that web-based spyware is the number one threat to their businesses. Finjan´s Malicious Code Research Centre (MCRC) estimates – based on a number of security audits conducted at large organisations and businesses – that a single enterprise can expect on average over million instances a year of employees accessing Websites carrying spyware and other malicious content by 2007.
Read more…

Uncategorized

Bocada NOWTM Delivers Lowest Total Cost of Ownership Data Protection Management Platform

June 29th, 2006
Comments Off on Bocada NOWTM Delivers Lowest Total Cost of Ownership Data Protection Management Platform

Bocada, Inc., the widely recognised leader in data protection management software, today announced the launch of Bocada NOWTM, a revolutionary program that simplifies the acquisition and implementation of the company’s award-winning Bocada® Enterprise software. Bocada NOW is a unique marriage of a flexible, subscription pricing model, a streamlined customer engagement practice and a rapid deployment process uniquely enabled by the patented, agentless, multi-vendor architecture of Bocada Enterprise 4.
Read more…

Uncategorized

Low Assurance SSL-based Phishing Attacks Against Banks and Credit Unions accounted for 33% of all phishing attacks in May

June 29th, 2006
Comments Off on Low Assurance SSL-based Phishing Attacks Against Banks and Credit Unions accounted for 33% of all phishing attacks in May

Comodo Inc., a global Certification Authority and leading provider of Identity and Trust Assurance (ITA) Management solutions, announced today major expansion of the Comodo Mutual Authentication (MA) initiative to help consumers re-establish trust in online financial interactions through an innovative new PKI based mutual authentication verification solution.
Read more…

Uncategorized

Philadelphia Business Leaders Launch Lyrio – A Unique IP Phone Solutions Provider

June 29th, 2006
Comments Off on Philadelphia Business Leaders Launch Lyrio – A Unique IP Phone Solutions Provider

Philadelphia business leaders announced the establishment of Lyrio, a new business to deliver IP phone solutions to small and medium-sized businesses. Lyrio’s mission is to transform the DNA of the business workplace by delivering award-winning ShoreTel IP/PBX technology and enterprise-level customer service.
Read more…

Uncategorized