Dennis Fisher

Software Enables Two-Factor Authentication for Apache

A Canadian cryptographic software vendor on Monday announced a new two-factor authentication solution designed specifically for the popular Apache Web server. CryptoCard Corp.s Crypto-Server 6.2 enables administrators to use virtually any form of two-factor authentication to log into their Apache servers through a browser interface. Software tokens, hardware tokens and smart cards all are supported […]

Veterans Day Sees a Phishing Frenzy

Veterans Day may have been a holiday for many U.S. companies, including banks and other financial institutions, but for Internet fraudsters it was one of the most productive days of the year. Beginning in the early-morning hours and continuing throughout Thursday and into Friday, phishing scammers launched an unprecedented number of unique new attacks against […]

Defeating DPA Attacks

If the practice of security is the black art of the IT world, requiring esoteric knowledge and the ability to employ a bag of tricks and specialized techniques to safeguard data, then cryptography is the highest expression of the art. Cryptographers spend their days immersed in the arcana of one-way functions and stream ciphers, dwelling […]

App-Firewall Vendors Challenge Rivals to a Test

Things are getting a bit testy in the application-security market. Saying that theyre fed up with some security vendors claiming that their products protect against application-level attacks, a group of application-firewall vendors on Tuesday will issue a challenge to Check Point Software Technologies Ltd., Symantec Corp. and others to prove that their offerings are truly […]

For Sale: Cisco Firewall Source Code

A group that earlier this year offered for sale the source code of a popular intrusion detection system now is selling what it says is a copy of the source code for a recent version of Cisco Systems Inc.s PIX firewall. A member of the Source Code Club, which first surfaced in July, posted a […]

Symantec Aims for Data Integrity

Symantec Corp. is launching a new corporate strategy fusing security and risk management, a concept that the company is calling information integrity. The strategy, unveiled at a series of simultaneous events around the world last week, is not entirely new and is, in part, a restatement of concepts that Symantec and other companies have been […]

Network-Based Security Grows

As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the burden off IT staffs entirely. A front-runner in the effort with its Internet Protect service is AT&T Corp. This week, the company will bolster the managed service with added capabilities that […]

CipherTrust Tool Puts Spammers Under Quarantine

Messaging security vendor CipherTrust Inc. on Monday released a new component of its IronMail appliances designed to stop spam messages before they get to customers networks. Known as Connection Control, the technology relies on the companys Spam Profiler system to identify the IP addresses of the most egregious e-mail abusers. It does this through the […]

Fast-Moving Bagle Worms Open PCs Backdoors

Two new versions of the venerable Bagle worm are on the loose, infecting PCs and opening backdoors as they go. The pair are virtually indistinguishable from one another and also are quite similar to most of the other Bagle variants. The main area of concern for enterprises is the fact that both Bagle.BC and Bagle.BD […]

Check Point Refines InterSpect

As vendors pour into the internal security market, Check Point Software Technologies Inc., among the first entrants in this space, continues to refine its line of InterSpect appliances with a host of new features. The company this week will release Version 2.0 of the appliances software, which now includes features that enable the boxes to […]