[ Technology Blogs Articles News Reviews ]

 
Google
www Technoclicks.com
Post Tech Blog Article News Reviews

Top Articles

Posted by iNext on 2005-11-04       Article Source : Messaging Pipeline

Voltage Security Inc., Palo Alto, CA, yesterday said it has enhanced its SecureMail Gateway and SecureMail Desktop offerings with the ability to add branding elements to encrypted e-mail, enhanced rules-based encryption functionality, and an audit and log capability to meet compliance requirements.

The new "clientless secure messaging" environment features the Voltage Zero Download Messenger which eliminates the requirement for downloads of any kind, the company said. Applets, clients, scripts or any other type of code are downloaded with the Voltage-delivered secure message.

Read More...  
Posted by inet on 2005-11-03       Article Source : TechWeb News

As part of the Windows Live services that Microsoft touted Tuesday, the Redmond, Wash.-based developer rolled out a beta version of a free Web service that scans for and removes viruses, removes unnecessary files from the hard drive, and schedules a disk defragmentation. Some users may be uneasy about using the service, however, since by default the virus scanner transmits information about the PC and its applications to Microsoft.
Windows Live Safety Center is a free, albeit advertising-supported site. It takes its

Read More...  
Posted by iTech on 2005-11-03       Article Source : CRN

Symantec extended its goal of integrating security and e-mail archiving to the enterprise space with updates to its Email Security and Availability solution and a new, single-license enterprise product bundle.

Along with upgrades to its e-mail security and archiving products being released this month, Symantec on Nov. 29 plans to launch a new licensing scheme for enterprise customers that’s slated to simplify product bundling, said Chris Miller, director of product management at the Cupertino, Calif.-based vendor.

Symantec Mail Security Enterprise

Read More...  
Posted by inet on 2005-11-03       Article Source : VARBusiness

Symantec's much-debated acquisition of Veritas has at least temporarily cut into the company's bottom line.

On Tuesday, the security vendor reported GAAP net loss for its fiscal second quarter was $251.3 million, or 21 cents per share, owing primarily to the write-off of $284 million in expenses associated with the Veritas purchase. In the same quarter last year, Symantec posted a net profit of $135.6 million.

GAAP revenue for the quarter was $1.056 billion and non-GAAP revenue was $1.192 billion.

Read More...  
Posted by iNext on 2005-11-03       Article Source : CRN

Trend Micro is beefing up its security product line with the launch of a stand-alone antispyware product for enterprise customers.

The Anti-Spyware Enterprise Edition is the latest release that builds on Trend Micro’s May acquisition of InterMute. Trend Micro released a stand-alone antispyware product targeted at small and midsize businesses in June. The enterprise edition, originally slated for an August release, is available now and costs $11.55 per user for a 501-user license.

The antispyware product is integrated with

Read More...  
Posted by iNext on 2005-11-03       Article Source : Messaging Pipeline

Company backs up release 6.5 of IMAuditor with 100-percent guarantee against the proliferation of IM-borne threats.

FaceTime Communications, Foster City, Calif., is backing the new release of its IMAuditor instant messaging security software with guaranteed protection against worms propagating through all major public IM systems.
 
IMAuditor 6.5's "worm-free guarantee" offers unspecified compensation upon a single instance of an IM worm propagating in the customer’s environment. FaceTime attributes its enhanced level of confidence in the program to new patent-pending technology

Read More...  
Posted by inet on 2005-11-02       Article Source : TechWeb News

Trend Micro on Monday started a campaign, dubbed "Worry-Free Security Initiative" for small businesses, backed by new product features that automatically stymie new threats, the company said.

Trend Micro touted Client Server Security for SMB 3.0 and Client Server Messaging Security for SMB 3.0, updates to long-available small- and mid-sized business security software, as having "zero administration" and additional automation, traits the company claims is necessary for the SMB market.

"Our 'Worry-Free' initiative is based on research into the behavior

Read More...  
Posted by inet on 2005-11-02       Article Source : TechWeb News

Microsoft's patching problems resurfaced again when a researcher published a paper last week detailing how the Redmond, Wash.-based developer failed to really fix a vulnerability disclosed in April 2005.

The goof, claimed security researcher Cesar Cerrudo, chief executive of Argeniss Information Security, forced Microsoft to release another security bulletin in October.

Cerrudo published his paper, "Story of a dumb patch," with details of how Microsoft slapped a Band-Aid on a bug rather than really plug the vulnerability outlined in MS05-018,

Read More...  
Posted by iNext on 2005-11-02       Article Source : TechWeb News

Several government agencies, including the FBI, joined forces with private firms Monday to launch an anti-fraud campaign aimed at nervous online consumers.

The U.S. Postal Inspection Office, the National White Collar Crime Center's Internet Crime Complaint Center (IC3), and the FBI led the "LooksTooGoodToBeTrue" initiative, with corporations including Target and Monster.com supporting the campaign.

"Law enforcement is challenged by Internet schemes because they cannot be confined within national boundaries or investigative jurisdictions," said Louis Reigel, assistant director of the FBI's

Read More...  
Posted by inet on 2005-11-02       Article Source : Networking Pipeline

One in four enterprises have been victimized by intrusions into their networks and servers in the last two years, according to a VanDyke Software-commissioned survey. More than 40% of these companies reported that the intrusions were successful.

Out of the 360 enterprise IT security professionals surveyed, nearly 93% had installed a network firewall. Half of those surveyed use a network analyzer, turn off non-secure protocols, and installed a user-based firewall. More than 40% implemented WiFi security.

"In the final quarter

Read More...  
Posted by iNext on 2005-11-01       Article Source : CRN

Combating viruses and malware has become second nature to solution providers, and fending off viruses is no longer the complex chore it once was. Yet many solution providers are overwhelmed by the plethora of security software choices flooding the market today. With the introduction of its WebAdmin Antivirus suite, Glendale, Calif.-based Panda Software aims to equip solution providers with one-stop shopping for a variety of security products. Panda has combined a malware-protection client with a Network Operations Center and browser-based management console to give

Read More...  
Posted by iNext on 2005-10-31       Article Source : TechWeb News

IBM announced the availability of encryption software and plans for enhanced encryption security for Automatic Teller Machines.
Encryption Facility for z/OS version 1.1 supports encryption and decryption of certain file formats on z/OS, the IBM mainframe's flagship operating system. The company announced the feature's availability Friday.

It leverages the centralized key management capabilities provided by functions of z/OS and features of the IBM System z9 mainframe and zSeries to encrypt data stored on external taps and disk arrays. That will

Read More...  
Posted by iMark on 2005-10-30       Article Source : TechWeb News

Passwords that limit access to Oracle databases can be cracked with off-the-shelf hardware, a pair of security researchers claimed in a recently published paper.

The researchers, Joshua Wright of the SANS Institute and Carlos Cid, of the University of London, said that the password algorithm Oracle uses is weak -- Oracle doesn't preserve the case of the password, for example -- and provides attackers several ways to break into databases.

"An adversary with limited resources can mount an attack that

Read More...  
Posted by iNext on 2005-10-30       Article Source : TechWeb News

A worm spreading through America Online's Instant Messenger (AIM) network carries a dangerous rootkit, code designed to hide a hacker's work from anti-virus scanners, a security firm warned Friday.

Sdbot.add, said instant messaging security vendor FaceTime, includes the "lockx.exe" rootkit.

Rootkits are among the most dangerous types of malware, since they hide illegitimate processes and files, and can trick logging functions into not recording malicious activity. And they're becoming more common, say some experts. According to Moscow-based anti-virus developer Kaspersky

Read More...  
Posted by iNext on 2005-10-29       Article Source : AP

A coalition of anti-spyware vendors and consumer groups published guidelines Thursday to help consumers assess products designed to combat unwanted programs that sneak onto computers.

The Anti-Spyware Coalition released the guidelines for public comment and also updated a separate document that attempted to craft uniform definitions for "spyware" and "adware" in hopes of giving computer users more control over their machines.

According to the Pew Internet and American Life Project, Internet users have become more cautious online because of worries

Read More...  

[Prev]

8 9 10 11 12 13 14 15 16 17 18 19 20

[Next] [Last Page]

 

Jump To Page > 3 6 9 12 15

Recent Articles



 

Home | | Members | Search | Upadtes | RSS | Tags | Site Map | Tags | Conact

© Technoclicks.com - All rights reserved.