As it attempts to shake off a years worth of internal issues and economic problems, security giant Network Associates Inc. is readying new products it claims will offer a simple, single security scheme to serve a variety of enterprise platforms. NAIs PGP Security division will unveil several new and updated products, including a new version […]
As committees and working groups scramble to overhaul the various wireless standards to provide better security, some vendors are jumping into the fray with products designed to deliver enhanced security and mobility using existing protocols. Two companies, Columbitech AB and Symbol Technologies Inc., next month will unveil products that approach the problem of securing wireless […]
While DDOS attacks have become more prevalent and more varied, users defenses have changed little—shut off the flow of traffic, call your service provider and ask for filters, then hold your breath and hope it works. But a new breed of tool is being prepared to help enterprises thwart attacks by stepping away from simple […]
Looking to repair the real and public-relations damage done by Code Red worms during the last few weeks, Microsoft Corp. last week released a security tool designed to lock down Internet Information Services servers and prevent further large-scale attacks on the machines. However, the tool is receiving less-than-enthusiastic reviews in the security community. Known as […]
Plumbing the depths of its downward spiral, Baltimore Technologies plc. is once again in the throes of a reorganization that will have the security vendor banking on wireless PKI and managed services, two areas with long-term promise but few immediate rewards. The Dublin, Ireland, company last week said it is cutting 220 more jobs and […]
Russ Cooper has been on the Internet security scene for more than 20 years and has never been afraid to speak his mind. In the wake of the recent Code Red attacks, Cooper, surgeon general at TruSecure Corp., in Reston, Va., and moderator of the NTBugtraq mailing list, is advocating a new approach to releasing […]
Recent threats such as the Code Red and Leave worms are proof that virus writers and hackers are pooling resources to produce hybrid weapons that can cause tremendous damage. Now, a group of security companies is following suit, hoping that by combining their efforts, theyll be better able to combat the new, sophisticated attacks. McAfee, […]
As the Code Red II worm tore through the Internet last week, infecting servers at Microsoft Corp. and causing outages around the country, security experts worried that this latest attack is just a dry run for crackers gearing up for something far worse. The worm, which first appeared Aug. 4, uses the widely publicized .ida […]
As the Internet community scrambled to prepare for the re-emergence of the Code Red worm last week, security experts said the worm presages more widespread and damaging attacks of this kind. More importantly, it illustrates how the point of attack is moving from the network to the application. While most administrators and security specialists have […]
In the wake of the massive infection of Web servers by the Code Red worm, systems administrators and security experts are doing a lot of finger-pointing over who is to blame for one of the Internets most far-reaching security events. Many feel that the responsibility belongs to the administrators who failed to heed repeated warnings […]