The arrests of two men in connection with the recent Zotob worm followed an intensive investigation by Microsoft Corp., which was aided by a trail of online clues left by the men, those familiar with the investigation said. The FBI last week confirmed the arrests of Farid Essebar, 18, of Morocco, and Atilla Ekici, 21, […]
RSS is the darling of bloggers and Internet news sites. But enterprises have had little use, so far, for the XML-based content syndication technology. That may change in coming months as companies begin building security and content signing features into RSS, opening the door to enterprise adoption of RSS as a medium for everything from […]
McAfee is expanding its managed security services offerings to include a line of new carrier-grade security products and services and a new network access control product for enterprises. The company next week will announce a program it is calling McAfee Clean Pipes. The initiative will provide McAfee Inc. technology to service providers to help them […]
Symantec Corp. is investigating a report of a security hole in a version of its corporate anti-virus product that could expose sensitive username and password information, the company acknowledged. The reported security hole affects Symantec Anti Virus Corporate Edition Version 9 and could allow an attacker or nonprivileged user to obtain sensitive server log-in information. […]
RSS has been the darling of Webloggers and news hounds since it first began appearing in the late 1990s as a way to syndicate Web content. Up to now, however, there have been few applications for the technology within enterprises. That may be changing. Two enterprise RSS providers are teaming with XML security company Reactivity […]
Multimedia company Creative acknowledged that 3,700 of the companys Zen Neeon MP3 players that shipped from a company factory in late July contain a Windows worm. The 5GB Neeon digital audio players contain a copy of W32.Wullik.B, according to a statement posted on Creative Technology Ltd.s Japanese language Web site. The worm file doesnt pose […]
Turkish officials have identified 16 more suspects this week in a continuing crackdown on illegal online activity that stems from the arrest of two men in connection with the Zotob Internet worm. The 16 individuals are believed to be connected to a credit card theft and identity theft ring, but not directly involved with the […]
Microsoft is investigating another critical hole in its Internet Explorer Web browser. The hole, if left unpatched, could allow remote attackers to take control of Windows XP machines running Service Pack 2 and Internet Explorer 6 using silent attacks that are launched from malicious Web pages. The remotely exploitable hole can be used to compromise […]
Chip maker Intel Corp. and networking equipment maker Cisco Systems Inc. are joining up in a deal to combine Intels chip-based Active Management Technology with Ciscos Network Admission Control architecture and are collaborating to make their respective wireless LAN products work better together. Intel and Cisco used the Intel Developer Forum in San Francisco last […]
After being stung by high-profile cases of data theft, prominent colleges and universities are at the forefront of efforts to improve network security while preserving the openness and unhindered use that have long characterized campus computing environments. The techniques that schools are adopting may soon become commonplace on corporate networks, as well, as traditional network […]