Aruba Networks will buy privately held Avenda Systems to bolster its network security portfolio to help organizations protect personal devices being used in the enterprise. Aruba Networks will offer enterprises a single management console that can secure all devices being used within the enterprise and apply consistent security policies, Hitesh Sheth, chief operating officer at […]
Security experts expressed strong concerns about the provisions in the anti-piracy bill that would prevent Internet users from accessing certain Websites. The Stop Online Piracy Act was introduced last month by Rep. Lamar Smith, R-Texas, the chairman of the House Judiciary committee. The House Judiciary hearing on Nov. 16 invited various industry giants, including the […]
A panel of industry heavyweights testified at the House Judiciary Committee hearing on the Stop Online Piracy Act on Nov. 16. If passed, SOPA would require search engines, payment processors, Internet service providers and ad networks to sever ties with a “rogue Website” for hosting pirated content. If enacted, the law would empower any intellectual […]
Facebook has identified the perpetrators behind the massive spam attack that bombarded users with large volumes of violent and explicit content earlier this week and is pursuing legal action against them, according to a spokesperson for the social networking giant. The spam attack tricked unsuspecting users into copying malicious Javascript code into the URL bar […]
Salaries for IT security professionals are projected to increase by 4.5 percent in 2012, according to a new salary survey. The increasingly hostile threat landscape and growing demand for cloud computing has made security the hottest IT career in terms of salary growth, staffing firm Robert Half Technology said in its latest 2012 Salary Guide […]
The U.S. Department of Justice asked Congress to expand the federal law it relies on to prosecute computer crimes to cover more offenses and impose stronger penalties. The proposed changes will also make it possible to prosecute people for lying online. Congress needs to revise the Computer Fraud and Abuse Act (CFAA) and related legislation […]
The team behind the Duqu Trojan may have been working on the Trojan for at least four years, according to the latest analysis of the sophisticated malware. Kaspersky Lab researchers have identified the overall methods used by the authors of the Duqu Trojan and an approximate timeline of the attack, Alexander Gostev, chief security expert […]
Huawei Technologies will pay $530 million to buy out Symantec from the joint venture the two companies established in 2008 to sell storage and security products, the companies said Nov. 14. Huawei Symantec Technologies, based in Hong Kong, was established to integrate Symantec’s storage and security software into appliances built by Huawei Technologies to create […]
The infamous TDSS rootkit is known for its versatility, as it has been put to work in drive-by downloads and a wide range of malware-based targeted attacks. Now it appears to have been the delivery mechanism for the DNSchanger Trojan, according to Dell Secureworks. Researchers at Dell Secureworks Counter Threat Unit said Nov. 11 that […]
Intego VirusBarrier Mac-security firm Intego’s VirusBarrier application scans the iPhone, iPad and iPod Touch for malicious content. Unlike comparable Android products, the VirusBarrier application scans only files downloaded onto the device, such as email attachments and files downloaded from the Web. The sandbox technology used in iOS prevents VirusBarrier from being able to see what […]