Brian Prince

New Worm Targets Portable Memory Drives

Researchers from security vendor Sophos say a new worm targeting removable drives is an example of a potential security threat for businesses. The SillyFD-AA worm searches for removable drives such as floppy disks and USB memory sticks and creates a hidden file called autorun.inf so that a copy of the worm runs the next time […]

Has Digg Dug a Legal Hole for Itself?

Call it the Internets version of a bloodless coup. A revolt by users of Digg.com led the administrators of the Web site to reverse a decision to remove stories containing code used to circumvent digital rights management for HD-DVDs. But the change of course by Digg.com has not settled anything; instead the latest flare up […]

Commtouch: Malware Writers Tactics Evolving

A new report by security vendor Commtouch claims attackers are increasingly spreading server-side polymorphic malware via e-mail in a bid to circumvent anti-virus tools. According to the report, which focuses on the first four months of 2007, malware writers are using speed, variation and social engineering techniques to mass-distribute their malicious code across the Web. […]

Trillian Vulnerabilities Open to Remote Exploitation

Cerulean Studios has patched multiple vulnerabilities in its popular chat application that could have been exploited remotely by attackers. Cerulean Studios are the makers of Trillian, an instant messaging consolidation application that supports IRC, ICQ, AIM and MSN protocols. In its latest version of Trillian, the company fixed three vulnerabilities in the IRC (Internet Relay […]

Four More Convicted in eBay Fraud Case

Four more defendants have pleaded guilty in federal court to selling more than $19 million in copyrighted software from Rockwell Automation over eBay, bringing the total number of convictions in the case to seven. Eric Neil Barber of Manila, Ark., Phillip Buchanan of Hampton, Ga., Wendell Jay Davis of Las Vegas and Craig J. Svetska, […]

IBM and Oracle Trade Barbs over Databases

Officials at IBM are throwing verbal haymakers at Oracle as Big Blue touts its successes in the database market. The two database heavyweights alternated between offensive and defensive postures recently after IBM questioned Oracles claims of database dominance. “The rapid adoption of DB2 9 would seem to call their claims into question and analysts are […]

RSA SecurID Expands Support for Mobile Platforms

RSA, the security division of EMC, announced April 30 that it has enhanced its two-factor authentication technology to support the Java Micro Edition Platform. Smart phones based on the platform can now be provisioned with an RSA SecurID Software Token, eliminating the need to carry a separate RSA SecurID hardware authenticator, company officials said. The […]

Phishers Use Call Forwarding to Mask Fraud

Researchers at SecureWorks have uncovered a new type of phishing attack that tries to trick victims into forwarding their telephone calls to the attacker to thwart attempts by a bank to detect fraud. The attack, found by the Atlanta-based security vendor this week, begins with an e-mail sent from the phisher telling the potential victim […]

Passlogix and RSA to Combine Authentication Technologies

Passlogix and EMC security division RSA have entered into a strategic partnership to combine RSAs two-factor authentication technology with Passlogixs single sign-on platform. The agreement represents a tactical shift in the relationship between the two security providers. About three years ago, before RSA was a part of EMC, RSA built upon New York City-based Passlogixs […]

Websense to Acquire Security Rival SurfControl

Websense announced April 26 that it will acquire fellow Web security provider SurfControl for $400 million. The deal is expected to close in about four months, pending approval from regulatory agencies in the United States and United Kingdom. If approved, the acquisition would mean enhanced products and a new organization with the scale to compete […]