[ Technology Blogs Articles News Reviews ]

 
Google
www Technoclicks.com
Post Tech Blog Article News Reviews

Top Articles

Posted by iMark on 2005-11-12       Article Source : CRN

Software works with Enterprise SmartDefense Service to protect against spyware
 
Check Point Software Technologies has ratcheted up endpoint security for the enterprise—adding integrated antispyware, secure automatic downloads, instant message (IM) safeguarding and support for the SUSE Novell Linux Desktop to its Integrity software.

That combination gives enterprises client and server software working together to detect, quarantine and remove spyware with centralized policy management.

The updated Integrity 6.5 also gives partners new revenue opportunities, said Phil

Read More...  
Posted by iMark on 2005-11-12       Article Source : TechWeb News

RealNetworks patched its Real Player yet again on Thursday to fix multiple critical flaws in the popular media software.

According to eEye Digital Security, which uncovered the bugs and reported them to RealNetworks, two separate vulnerabilities affect multiple versions of RealPlayer for Windows, Mac OS X, and Linux. Both were classified as a "High" threat by eEye, a ranking that means attackers could use the flaws to remotely execute code on compromised computers.

One of the vulnerabilities could allow an

Read More...  
Posted by inet on 2005-11-12       Article Source : Networking Pipeline

The analyst firm Info-Tech Research Group has recommended that enterprises ban the use of Skype on their networks, citing security problems with the VoIP software.

Info-Tech analyst Ross Armstrong claims that "even a mediocre hacker could take advantage of a Skype vulnerability."

The firm cites these vulnerabilities and issues with Skype:


It claims that Skype's encryption is closed source and vulnerable to "man-in-the-middle attacks," and says it is unclear how well the encryption keys are managed.

Read More...  
Posted by iTech on 2005-11-12       Article Source : AP

Three infections have so far been identified by antivirus companies. The software triggers the cloaking feature of Sony's antipiracy technology to remain undetected.
  
 A controversial copy-protection program that automatically installs when some Sony BMG audio CDs are played on personal computers is now being exploited by malicious software that takes advantage of the antipiracy technology's ability to hide files.

The Trojan horse programs - three have so far been identified by antivirus companies - are named

Read More...  
Posted by iNext on 2005-11-11       Article Source : TechWeb News

A dozen Arizona residents have been arrested and charged with using stolen credit and debit card numbers obtained from overseas phishers, Tucson police said as an indictment was unveiled earlier this week.

The gang -- 17 were named in the indictment, but the remaining five are still at large -- used the card numbers and other personal information supplied by foreign phishers to make counterfeit bank or credit cards, said police and the U.S. Secret Service. They then wired $300,000 -- half

Read More...  
Posted by iNext on 2005-11-11       Article Source : VARBusiness

Two of the security sector's leading vendors have stepped up their efforts to educate partners and users about the rapidly growing threat of phishing.

Trend Micro and Symantec have each launched formal and informal efforts to describe the seriousness of this issue, the potential effects and what people can do to slow its pace. Phishing occurs when spammers send legitimate-looking e-mail to customers of trusted vendors, like banks or credit-card companies, requesting passwords or other personal information under the guise of straightening out

Read More...  
Posted by iNext on 2005-11-11       Article Source : Messaging Pipeline

Users of Yahoo's instant messaging service are being warned of a new phishing attack which sends IM users a message telling them their account will be blocked unless they respond to a terms of service violation.

The warning which came from the IMlogic Threat Center said the new attack, dubbed IM.Marphish.Yahoo, sends a message that appears to be from the Yahoo "abuse department" informing users that they are in violation of their agreement. To prevent their account from being deactivated, users are

Read More...  
Posted by iMark on 2005-11-11       Article Source : TechWeb News

Days after Macromedia posted fixes to its Flash player, Microsoft late Wednesday posted a security advisory directing users of its Windows XP, XP SP2, 95, 98, and Me to the third-party patches.

"Microsoft recommends that customers who use Macromedia Flash Player follow the guidance documented in Macromedia’s Security Bulletin to help protect themselves," a Microsoft spokesperson said in an e-mail to TechWeb.

The advisory was called for, the spokesperson said, because Flash is re-distributed by Microsoft in several of those

Read More...  
Posted by iMark on 2005-11-11       Article Source : InformationWeek

TransUnion will review its data handling processes after loss of desktop system with information on more than 3,600 consumers
  
With federal legislators mulling over options for fighting identify theft and fraud, TransUnion LLC, one of three companies that maintain consumer credit histories, provided the latest scare Wednesday, revealing that a password-protected PC containing personal credit information on more than 3,600 consumers was stolen from a regional sales office in California last month.

TransUnion's disclosure follows a string

Read More...  
Posted by iNext on 2005-11-11       Article Source : Small Business Pipeline

Arxceo Corporation announced a new addition to its line of network security appliances for small and mid-sized businesses (SMBs) that is designed to deliver affordable zero-day network security defense with anomaly-based intrusion prevention technology.

The Ally ip100T provides preemptive protection against both zero-day worm attacks as well as hackers. The inline Ally ip100 supports up to 100Mbit throughput and provides the same enterprise-class anti-reconnaissance, anomaly, and behavior-based attack detection and prevention capabilities as Arxceo's gigabit throughput products. It is designed for perimeter

Read More...  
Posted by iTech on 2005-11-10       Article Source : TechWeb News

Sony BMG Music Entertainment on Tuesday re-issued the patch that reveals the copy-protection files some of its audio CDs install on PCs, but continued to be blasted by security experts outlining more details of the under-fire technology.

The revised patch, which Sony labeled "Service Pack 2a," differs from the original released last week only in size; it's a third as large, weighing in at 1.5MB compared to the first version's 3.6MB.

In other news on the Sony brouhaha, Mark Russinovich,

Read More...  
Posted by iMark on 2005-11-10       Article Source : TechWeb News

The suit claims that Global Information Group, based in Temple Terrace, Fla., used various schemes in making thousands of attempts to gather customer information. The alleged ploys included impersonating Verizon Wireless employees and customers.

The suit was filed Nov. 2 in a Hillsborough County, Fla., court, which issued an immediate temporary restraining order prohibiting the defendants from any further attempts to obtain confidential information from Verizon Wireless, and any further contact with the company's customer service centers. In addition, the defendants were

Read More...  
Posted by iTech on 2005-11-10       Article Source : Networking Pipeline

It probably comes as no surprise that the spyware and adware scourge is only getting worse. However, a new study by Webroot Software reveals the full magnitude of the problem affecting a large proportion of enterprise PCs.

Calling the problem a global pandemic, Webroot notes that 48% of enterprise PCs are infected with adware. Although the actual percentage of infected PCs has, according to Webroot, has remained roughly stable, the scale of the infections has grown. The company found that the average

Read More...  
Posted by iNext on 2005-11-10       Article Source : TechWeb News

Nervous consumers using anti-spyware to avoid having their Web surfing tracked by marketers are lessening the accuracy of customer data gathered by online retailers and other companies, a research firm said Tuesday.

The biggest impact is on third-party cookies, tiny files an advertiser will plant in a visitor's browser in order to track which sites the person visits on the marketer's network, JupiterResearch said. Anti-spyware vendors are most aggressive in removing such cookies, while cookies set by the retailer itself, called first-party

Read More...  
Posted by iTech on 2005-11-09       Article Source : InformationWeek

With a shrinking budget, the Advanced Research Projects Agency's cyber-security arm has to leverage internal expertise with that of academia and industry to get research done and have products commercialized.

All last week, scores of American border agents were furiously typing Blackberry messages to their Canadian counterparts. They weren't sharing hockey scores. The 40 agents were taking part in a secure-messaging project, just one of many technology projects coming out of the Homeland Security Department's Advanced Research Projects Agency's cyber-security arm. Read More...  

[Prev]

6 7 8 9 10 11 12 13 14 15 16 17 18

[Next] [Last Page]

 

Jump To Page > 3 6 9 12 15

Recent Articles



 

Home | | Members | Search | Upadtes | RSS | Tags | Site Map | Tags | Conact

© Technoclicks.com - All rights reserved.