Brian Prince

Microsoft Preps 11 Security Bulletins for Patch Tuesday

Microsoft is planning to release 11 security bulletins Oct. 14 on Patch Tuesday. Four of the bulletins are rated “critical” and cover vulnerabilities that can lead to remote code execution. The critical flaws lie in Active Directory, IE (Internet Explorer), Microsoft HIS (Host Integration Server) and Microsoft Office Excel. According to Microsoft’s advisory, the IE […]

Microsoft Preps Security Patches for Windows, Office

Microsoft has plans for a small Patch Tuesday next week that will include just three security bulletins. Of the three, just one is rated “Critical,” while the other two are rated “Important.” The critical bulletin, as well as one of the bulletins classified as important, impacts Microsoft Windows. The other bulletin affects Microsoft Office. All […]

Palo Alto Networks Extends Firewall Protection

In a series of new releases, Palo Alto Networks has fixed its eyes on extending network security from remote workers to enterprise data centers. This week, the company upgraded its flagship PAN-OS product and announced the availability of new software called GlobalProtect, as well as the company’s new Palo Alto Networks PA-5000 Series appliances. Each […]

Teradata Acquisition of Aster Data Systems Bolsters Big Data Capabilities

With the challenge of managing and analyzing big data growing ever-larger, Teradata is acquiring Aster Data Systems, a move analysts say is a good one. “Acquiring Aster Data won’t give Teradata additional market share to battle Oracle, IBM and Microsoft, as well as EMC and HP, but it does provide the company with additional technological […]

Twitter, Spam and User Behavior

Ever wonder how your Twitter usage matches up with the general public? How about an attacker? According to Barracuda Networks, the differences between attackers and the average user can be pronounced, making behavioral analysis an important part of distinguishing between legitimate users and bad actors. In its report, which analyzes 26 million accounts during December […]

Google, Mozilla Patch Browsers Before Pwn2Own Hacker Contest

Mozilla and Google are getting a head start on next week’s Pwn2Own contest by patching flaws in their respective browsers. Mozilla rolled out patches Tuesday for 10 security flaws in Firefox, including eight rated “critical.” The other two vulnerabilities were rated “High” and “Moderate,” respectively. The move by Mozilla follows Google’s patching of 19 flaws […]

Gazzang Pushes MySQL Database Encryption, Cloud Security

Gazzang wants to make cloud computing safe for enterprises-a goal that for the company begins with encrypting data. Its product, ezNcrypt, is used to encrypt MySQL database transactions and data. In its latest edition, ezNcrypt now includes public/private key encryption and integration with leading HSM (hardware security module) technologies, as well as OpenSSL engine support. […]

Google Android Malware Threat Targets App Market

Google has removed numerous applications laced with malware from the Android app store, underscoring the threat of rogue applications infiltrating the company’s mobile marketplace. According to Lookout Mobile Security, more than 50 applications released under the developer names “Myournet,” Kingmall2010″ and “we20090202″ were infected with the DroidDream Trojan and removed by Google. A complete list […]

Facebook Plans to Permit Developer Access to User Phone, Address Info Move Forward

In a letter to two U.S. congressmen (PDF), Facebook reaffirmed its plans to enable application developers to get access to user phone and address information. Facebook initially implemented the idea in January, but scuttled the change after a few days due to public outcry. At the time, Facebook Director of Developer Relations Douglas Purdy stated […]

Google Buys Security Firm Zynamics

Google has acquired security firm Zynamics for its software analysis tools. Founded in 2004 by CEO Halvar Flake (Thomas Dullien), Zynamics builds reverse-engineering tools for offensive and defensive security that help find security vulnerabilities within applications. According to Zynamics, its tools can be used to help understand security updates, identify FOSS (free and open-source software) […]