The fallout from the data breach at Monster.com is growing wider, as the company has confirmed that the companys databases have been targeted by hackers before. Monster copped to a large security breach Aug. 22, but is now admitting that the data leakage has been going on for longer and could involve more customers than […]
Remote access to corporate e-mail is a critical function in many enterprises. But doing it securely is where the challenges lie, and, as always is the case, that means a combination of user awareness and effective technology. To that end, vendors such as Symantec and Messageware are delivering services and third-party add-ons to tighten security […]
Symantec has added new shields against malware and Web vulnerabilities in the latest versions of Norton Internet Security and Norton AntiVirus software. The 2008 versions of the products include a feature called Browser Defender, a behavioral-based technology that defends against drive-by downloads and other threats targeting vulnerabilities in Internet Explorer. “The notion behind the technology […]
Symantec CEO John Thompson said his company has plans to deliver more of its technology as a service to meet the needs of customers and SMBs. Calling the companys live update service for its Norton products a core part of Symantecs business, Thompson said the corporation plans to provide more of its offerings in the […]
A group of vendors led by Imperva are teaming up to help customers create a more effective framework for security and compliance. Dubbed Imperva OpenSphere, the effort will allow enterprises to deploy Impervas SecureSphere technology together with pre-integrated third-party products, content and information feeds, delivery platforms, and best practices. The first members of OpenSphere are […]
Security pros are warning that distributors of the Storm Trojan are now using a YouTube video to lure users. Contained in e-mails with subject lines such as “sheesh man what are you thinking,” the malicious link claims to go to YouTube.com, but actually goes to a URL harboring exploit code. “This is the first [YouTube] […]
Varonis Systems has enhanced its DataPrivilege data entitlement management software, adding granular levels of access control right down to who, when and for how long. With DataPrivilege, the responsibility of managing data entitlements in the enterprise falls squarely on the owners of the data, as opposed to on IT administrators who may not have an […]
Security industry watchers say organizations need to take a layered approach to VOIP security. Voice-over-IP deployments are expected by some to be targeted by attackers more as the number of organizations utilizing the technology increases, with phone phishing in particular becoming a greater threat. An example of a phone phishing scam would be an attacker […]
Officials at WebLOQ, based in Monterey, Calif., say they can offer businesses a digital safe haven for their e-mail communications with a new service that protects the transit channel rather than the perimeter. The service, also named WebLOQ, is enabled by a downloadable application and operates as a subset of normal e-mail transmission channels, company […]
Hackers have set their sights on security vendor Trend Micros ServerProtect. Several security researchers have noted a massive increase of activity over TCP port 5168 connected with ServerProtect, an anti-virus software product for servers that had a number of vulnerabilities publicly disclosed earlier the week of Aug. 20. All of the vulnerabilities, which could lead […]