Security vendor nCircle announced May 23 that it has completed the acquisition of Cambia Security, a company specializing in agent-less configuration auditing. Cambia makes Cambia CM, a tool that analyzes system configurations to ensure the configurations are in line with company policy and any applicable government regulations. According to officials at San Francisco-based nCircle, the […]
The recent news that a tool from SlySoft can bypass the newest Advanced Access Content System encryption scheme is the latest assault on digital rights management-and some are taking it as proof that the technology needs to change or wither away. “I dont think it has been easy, but nevertheless [the AACS] is being broken […]
Microsoft officials have released a much-anticipated tool to help protect Office 2003 from malware attacks. MOICE (Microsoft Office Isolated Conversion Environment) has gone live and is available for download. The free tool converts files from Office 2003 to the new Office 2007 Open XML format in a bid to strip out the exploit from the […]
The mammoth database system that would be needed under an immigration bill currently being discussed by Congress has security experts thinking about procedures, privacy and protection. The Secure Borders, Economic Opportunity and Immigration Reform Act of 2007 (PDF) is a controversial compromise reached by a bipartisan group of senators. The proposed legislation already has many […]
IronPort Systems has revised its Internet traffic monitoring Web site, a resource for IT staffers searching for a real-time view into security threats. This Web site, www.senderbase.org, provides e-mail administrators visibility into the e-mail and Web traffic coming into their networks and features a new graphical user interface company officials hope will make it easier […]
IBM officials hope a new feature aimed at increasing performance and availability of applications using Informix Dynamic Server “Cheetah” in a multi-node, blade server environment will separate the upcoming release from the pack. “Users can deploy a greater number of nodes—beyond only a primary and single secondary,” said Bernie Spang, director of IBM data servers. […]
Newly merged Alcatel-Lucent is warning thousands of employees and retirees that personal information such as Social Security numbers, names and addresses may have been exposed after a CD prepared by a vendor was reported missing. The unencrypted disc was crafted by one of the telecommunication companys vendors, Hewitt Associates. It contains names, addresses, Social Security […]
Symantec has fixed a serious vulnerability with an ActiveX control used by Norton Personal Firewall 2004 and Norton Internet Security 2004 that could allow a hacker to execute code remotely on a vulnerable system. According to Symantec officials, the company was notified of the problem by US-CERT. A buffer overflow can be triggered by an […]
Two vulnerabilities open to remote exploitation by hackers have been found in Java Development Kit, one of which could be used to take over a compromised system. JDK (Java Development Kit) is a software development tool made by Sun Microsystems specifically for Java users. The vulnerabilities were rated “critical” by FrSIRT (French Security Incident Response […]
Symantec officials have thrown the first punches in a legal battle against eight companies it has accused of distributing counterfeit Symantec software. The company has filed eight separate civil lawsuits, seeking a combined total of more than $55 million in damages, in U.S. District Court in California during the past several months. Among those named […]