Archive

Archive for January, 2007

SurfControl Enhances Software Delivery of Worldwide Internet Threat Protection with Akamai Technologies

January 17th, 2007
Comments Off on SurfControl Enhances Software Delivery of Worldwide Internet Threat Protection with Akamai Technologies

SurfControl (London: SRF), the leading provider of global on-demand, network and endpoint IT security solutions, and Akamai Technologies, (Nasdaq: AKAM), the leading global service provider for accelerating content and business processes online, today announced that SurfControl has moved its product download and threat list updates to Akamai’s infrastructure.
Read more…

Releases

SurfControl E-mail Security Wins Coveted Checkmark Certifications

January 17th, 2007
Comments Off on SurfControl E-mail Security Wins Coveted Checkmark Certifications

SurfControl has announced that SurfControl’s MailControl has been awarded Anti-Spam Premium Checkmark Certification from West Coast Labs. This level of certification is awarded to solutions that have a spam capture rate of more than 97 percent and SurfControl MailControl successfully identified over 99 percent.
Read more…

News

Malware creates new challenges for anti virus vendors

January 17th, 2007
Comments Off on Malware creates new challenges for anti virus vendors

Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines on high risk infectors we are still seeing an increasing overall number of malware infections, it is this new breed of malware that is costing industry millions every year – yet no-one seems to know about them.
Read more…

Articles

Security experts discuss vulnerability management

January 16th, 2007
Comments Off on Security experts discuss vulnerability management

StillSecure invited a who’s who list of vulnerability management gurus to come together and talk about the past, present and future of vulnerability management.
Read more…

News

New Year, New Threats?

January 10th, 2007
Comments Off on New Year, New Threats?

According to GFI, a leading provider of network security, content security and messaging software, every IT manager should make it part of their New Year’s Resolution to protect their networks from the following threats in 2007.
Read more…

News

US defences hacking attacks on the rise

January 10th, 2007
Comments Off on US defences hacking attacks on the rise

A recent report outlining the threat to US defence security reveals that hacking attempts have gone up by 43 per cent. The desire, of hackers, to obtain and thereby steal or corrupt technology design data could have terrifying results should this information fall into the ‘wrong hands’.
Read more…

News

Preventing a Brute Force or Dictionary Attack

January 10th, 2007
Comments Off on Preventing a Brute Force or Dictionary Attack

Administrative accounts are not the only problem: many Web applications and Web application frameworks create default users during installation. If the site administrator does not remove these default users or at least change their passwords, these accounts will be easy targets for a dictionary attack. Finally, when users are allowed to choose their own usernames, they often choose their email address, since it is easy to remember. Once again, the user’s laziness is a benefit to a hacker using a brute force attack. Armed with a list of email addresses (perhaps obtained from a spammer) and a dictionary of passwords (easily obtained anywhere), an attacker has an excellent chance of breaking into at least one user’s account.
Read more…

Articles

Preventing a Brute Force or Dictionary Attack

January 10th, 2007
Comments Off on Preventing a Brute Force or Dictionary Attack

To understand and then combat a brute force attack, also known as a dictionary attack, we must start by understanding why it might be an appealing tool for a hacker. To a hacker, anything that must be kept under lock and key is probably worth stealing. If your Web site (or a portion of it) requires a user to login and be authenticated, then the odds are good that a hacker has tried to break into it.
Read more…

Articles

The Consumerization of IT Demands Policy enforcement

January 5th, 2007
Comments Off on The Consumerization of IT Demands Policy enforcement

Throughout 2007 IT will need to prepare itself for an onslaught of unmanaged IP enabled devices as millions of users plug in new computers, USB drives, music/video players, handheld mobile devices, and even the stray game console into enterprise networks. In addition to new shiny objects, many users install applications like iTunes, VoIP, multi-player games, and all manner of non-compliant software on their enterprise-owned computers, all of which introduce significant security risks. And even if this wave of involuntary consumer technology adoption doesn’t bring actual harm, it will certainly complicate an organization’s ability to fully manage their IT environments against these products.
Read more…

Articles

Voice over IP under threat

January 5th, 2007
Comments Off on Voice over IP under threat

There has recently been considerable alarm about the possibility of a malicious code spreading via Skype. Skype is a system that allows voice communication over established Internet connections, in an environment very similar to that of telephone calls. It even allows calls to be made to telephones from a computer, with lower tariffs than that of a normal call.
Read more…

Articles