SonicWALL Inc. has entered into an agreement to purchase Aventail Corp., a Seattle-based provider of SSL VPN remote access products. The acquisition, made for roughly $25 million in cash, is expected to close in about 25 days. The move helps both companies firmly establish themselves as leaders in the SSL (secure sockets layer) VPN (virtual […]
IBM released on Tuesday the Informix Dynamic Server 11, a new data server company officials expect to give them a leg up in the global database market. IDS 11, code-named “Cheetah,” offers significant cost savings with support for cluster tools and, through a feature code-named “Mach 11,” provides failover recovery from any node to ensure […]
Websense is integrating its Web threat protection technology into the newest version of its data leak prevention software in a bid to both thwart data breaches and help companies create sound policies. The software, Websense Content Protection Suite v6, marries Websenses URL database and ThreatSeeker malicious content classification technology to new context-based data recognition capabilities […]
CA has patched two flaws in its anti-virus engine that would have allowed hackers to remotely compromise a vulnerable system. The first flaw centers on a boundary error in vete.dll files that occurs when processing CAB archives. A specially-crafted CAB archive with overly long file names can trigger a stack-based buffer overflow. In addition, an […]
Researchers at eEye Digital Security are reporting multiple vulnerabilities in Yahoo Messenger they say hackers can use to remotely execute code. Yahoo spokesperson Terrell Karlsten confirmed the company is looking into a buffer overflow issue in an Active X control. “Upon learning of the issue, we began working on a fix,” she told eWEEK. She […]
A vulnerability was uncovered in the way Windows Graphics Device Interface handles icon image files that leaves systems open to denial-of-service attacks. GDI+ is an application programming interface that allows programmers to display information on screens and printers, as well as process ICO image files. /zimages/1/28571.gifClick here to read about which Web server distributes the […]
Oracle has released the newest installment in its Database Lite 10g product line, which is intended to help the mobile work force securely exchange data with a corporate database. Comprised of a mobile server and a mobile relational database, the latest release, Oracle Database Lite 10g Release 3, features automatic synchronization and support for a […]
IBM announced plans to acquire Massachusetts-based software vendor Watchfire in a bid to beef up compliance testing and security for Web applications as they are being developed. Financial terms of the deal, which is subject to regulatory approval, were not disclosed. The acquisition is expected to close in the third quarter of 2007. Watchfire specializes […]
Microsoft officials have outlined plans for a unified security product they say will allow users to centrally manage security across an entire IT infrastructure from a single console. Code-named Stirling, the product is designed to enable IT managers to centrally set policy, configure, deploy and manage security within their IT environments. When it is officially […]
Business leaders rank the importance of securing their own data above securing their customers data, according to a recent survey of IT executives. Customer data ranks third on the list of items business leaders worry about protecting from data breaches, according to a poll of 649 IT executives for a study (PDF) by the Ponemon […]