Archive

Archive for December, 2006

StillSecure VAM v5.5 Features Faster Speeds and New Reporting Functionality for Increased Efficiency and Streamlined Security Administration

December 31st, 2006
Comments Off on StillSecure VAM v5.5 Features Faster Speeds and New Reporting Functionality for Increased Efficiency and Streamlined Security Administration

StillSecure®, provider of an award- winning, integrated suite of enterprise network security solutions, today announced VAM™ v5.5, the newest version of StillSecure’s vulnerability management platform. v5.5 features a dramatic increase in the number of users, devices, and scans that VAM can manage concurrently.
Read more…

Uncategorized

Stellar Data Recovery Products Are A Hit Among 97% Of Its Customers

December 31st, 2006
Comments Off on Stellar Data Recovery Products Are A Hit Among 97% Of Its Customers

Stellar Information Systems Ltd. today revealed that about 97% of its customers were satisfied or extremely satisfied with their data recovery product performance. Stellar conducted a survey and the overall objective of the study was to gain a strong understanding of how well are the Stellar products performing in the minds of their customers. The results were tabulated and analyzed using standard statistical criteria and display 97% overall satisfaction rate.
Read more…

Uncategorized

Silver Bullet for Compliance

December 30th, 2006
Comments Off on Silver Bullet for Compliance

Once again it´s down to the IT manager to manage the policies and ensure that they are followed whilst not hampering the productivity of users. Thankfully automated tools can now help in this task and can restrict the use of specific applications or services and track application usage on a by-PC basis.
Read more…

Uncategorized

Silver Bullet for Compliance

December 30th, 2006
Comments Off on Silver Bullet for Compliance

The rise of life-style technologies, such as the ubiquitous iPod, has also given birth to a new type of security threat via the USB port. MP3 players are in reality portable memory devices, which are capable of downloading and storing vast amounts of data from a corporate network – as is every laptop.
Read more…

Uncategorized

Silver Bullet for Compliance

December 30th, 2006
Comments Off on Silver Bullet for Compliance

No-one in business today can be unaware of the compliance challenges facing the IT team in protecting company assets and processes. The statistics are clear, abundant and all around us, leaping from headlines on a daily basis; massive financial losses associated with security non-compliance are commonplace, as are high-profile court cases about staff misuse of email where internal policies have failed, along with punitive fines for software license infringement.
Read more…

Uncategorized

HD-DVD anti-copy encryption cracked

December 28th, 2006
Comments Off on HD-DVD anti-copy encryption cracked

A programmer going on by the name muslix64 has posted a Java-based application that will free the encrypted video from its protection.
Read more…

Uncategorized

Akonix Security Center Publishes IM Threat Watch for July 2006

December 28th, 2006
Comments Off on Akonix Security Center Publishes IM Threat Watch for July 2006

Akonix Systems, the provider of the most deployed instant messaging (IM) security and compliance products in the world, today announced its Security Center (www.imsecuritycenter.com) researchers tracked 16 attacks against IM networks in July, bringing the total number of attacks during 2006 to 127.
Read more…

Uncategorized

The security risk in Web 2.0

December 28th, 2006
Comments Off on The security risk in Web 2.0

Web 2.0 is causing a splash as it stretches the boundaries of what Web sites can do. But in the rush to add features, security has become an afterthought, experts say. The buzz around the new technology echoes the ´90s Internet boom–complete with pricey conferences, plenty of start-ups, and innovative companies like MySpace.com and Writely being snapped up for big bucks.
Read more…

Uncategorized

Learning to Detect Phishing Emails

December 28th, 2006
Comments Off on Learning to Detect Phishing Emails

Phishers launched a record number of attacks in January 2006, as reported by the Anti-Phishing Working Group. These attacks often take the form of an email that purports to be from a trusted entity, such as eBay or PayPal. The email states that the user needs to provide information, such as credit card numbers, identity information, or login credentials, often to correct some alleged problem supposedly found with an account. Some number of users fall for these attacks by providing the requested information, which can lead to fraudulent charges against credit cards, withdrawals from bank accounts, or other undesirable effects.
Read more…

Uncategorized

Bypassing Oracle dbms_assert

December 28th, 2006
Comments Off on Bypassing Oracle dbms_assert

By using specially crafted parameters (in double quotes) it is possible to bypass the input validation of the package dbms_assert and inject SQL code. This makes dozens of already
Read more…

Uncategorized