Fahmida Y. Rashid

Eagle Laptop from Rugged Notebooks Takes a Beating

Eagle Laptop from Rugged Notebooks Takes a Beating by Fahmida Y. Rashid Straight Out of the Box The Eagle notebook’s hard metal case is shockproof, and a rubber Guard Protection System protects the LCD. The protection makes it a little hefty in size and weight, though. The Eagle, Opened The 14.1-inch touch-screen display is protected […]

Malware Infects More than 1.2 Million Web Sites: Dasient

More than 1.2 million Websites were infected by malware in the third quarter of 2010, according to security firm Dasient. This includes legitimate sites belonging to government agencies and malvertisements, or malicious advertisements. In the third quarter of 2009, there were 560,000 Websites infected. While Dasient’s researchers had expected the number to increase, the fact […]

Invincea Uses Virtualization to Protect PCs from Malicious PDFs

Invincea is taking the idea of sandboxing one step further, by moving all PDF files into a virtual appliance. Invincea Document Protection, introduced Nov. 22, runs as a virtual machine on the user’s desktop. Whenever a PDF file is opened, Invincea Document Protection takes control away from the installed PDF reader, such as Adobe Reader, […]

Claims China Hijacked ’15 Percent’ of Web Traffic Are ‘Overhyped,’ Experts Say

The furor over a Chinese Internet service provider hijacking Internet traffic in April is in danger of being overhyped and obscuring real security issues, according to security experts. The hijacking incident occurred for 18 minutes on April 8, when China Telecom, China’s largest Internet service provider, published a set of instructions under the Border Gateway […]

Hackers Target Black Friday, Cyber Monday Search Terms

Attackers have set their sights on holiday shoppers searching for leaked Black Friday ads, creating malicious sites that appear on search engine result pages, according to a Nov. 18 alert by SonicWall. The security warning comes as shoppers prepare for the 2010 holiday shopping season. Security experts at SonicWall UTM Research discovered “polluted” results appearing […]

Enterprise IT Departments Struggle with Security, Network Downtime: Solera

Despite recent studies indicating that IT executives consider information security a high priority for their organizations, many organizations are not prepared to “adequately respond” to security incidents, according to a recent study from Solera Networks. Almost all the respondents, or 96 percent, considered employee Web activity, such as browsing to a malicious Website, a threat, […]

Hostway FlexCloud Servers Offer Scalable Cloud Infrastructure

Web hosting provider Hostway has released FlexCloud Servers, a pay-as-you-grow enterprise-grade cloud platform. Designed to be flexible, reliable and easy to use, FlexCloud Servers can be self-provisioned 24 hours a day. IT managers have full administrator access and control to add or modify individual systems and have access to servers within minutes, according to Hostway, […]

CA Technologies Study Finds Mainframes Critical to Cloud Strategy

Even with organizations shifting business-critical applications to the cloud, mainframes remain as relevant as ever, but organizations are struggling to find skilled IT workers familiar with the technology, according to a survey by CA Technologies. CA presented the study results during a panel discussion that was Webcast on Nov. 17. Years after the mainframe was […]

CompTIA Study Finds IT Managers Struggle to Solve Emerging Threats

IT managers are ranking information security as high IT priority within their organizations, but more training and better policies are necessary to protect them from new threats, according to survey results released by CompTIA on Nov. 18. CompTIA’s Global Security Trends, an annual report examining information security in its eighth year, surveyed 1,400 IT and […]

InfoSec Cracks Open ZeroAccess Rootkit to Find Unique Features

Researchers at InfoSec Institute deconstructed ZeroAccess, a sophisticated and advanced rootkit that downloads even more malware onto affected systems. The step-by-step instructions for reverse engineering ZeroAccess were posted by InfoSec to expose the weaknesses that the “good guys” can use to design security products that can “detect and remove” the rootkit from compromised systems, Jack […]