Paul F. Roberts

Symantec, SonicWall Unveil New Security Gear

Two new all-in-one security appliances from Symantec and SonicWall will offer customers of gigabit Ethernet performance a variety of security functions including firewall, antivirus protection, SSL VPN and even antispyware features. SonicWall Inc. will announce the Pro 4100 on Tuesday. The 10-port, gigabit UTM (unified threat management) appliance offers a wide range of security features, […]

Colleges Lead Charge for Secure, Open Networks

After being stung by high-profile cases of data theft, prominent colleges and universities are in the forefront of efforts to introduce effective security to networks, while preserving the openness and unhindered use that have long characterized campus computing environments. Security is moving to the forefront of campus IT efforts, after decades as an afterthought at […]

Intel, Cisco Team to Thwart Security Threats

Chip maker Intel Corp. and networking equipment maker Cisco Systems Inc. are joining forces to combine Intels chip-based Active Management Technology with Ciscos Network Admission Control architecture. The two companies used the Intel Developer Forum in San Francisco on Tuesday to announce the new arrangement. The deal will allow Cisco NAC devices to interoperate with […]

NIST Database Tracks Software Weaknesses

The Federal Government, often criticized for its slow response to security vulnerabilities and attacks, has launched a new database of software flaws designed to help IT administrators stay ahead of attacks that use those holes. The NVD (National Vulnerability Database) was launched Aug. 11 by the National Institute of Standards and Technology and already contains […]

Symantec to Acquire Sygate

Symantec Corp. continued its recent acquisition spree last week, buying Sygate Technologies Inc., one of a group of security vendors in the emerging endpoint security market. Symantec, of Cupertino, Calif., acquired Sygate for an undisclosed amount. The deal will combine Sygates software for enforcing network security policies and securing so-called endpoints, such as servers, laptops […]

Webroot: Spyware Rampant in the Enterprise

The number of Web sites distributing malicious software has quadrupled in the last year to more than 300,000, as the spyware problem continues to fester on the Internet, according to an upcoming report from Webroot , an antispyware software company. Webroot Software Inc.s State of Spyware Report for the second quarter of 2005, claims that […]

GreenBorder Updates Malicious Software-Protection Tool for IE

Buoyed by interest from enterprise software buyers who are fed up with critical security holes in Microsofts Internet Explorer Web browser, GreenBorder is preparing to release the first major update to its malicious software-protection suite. The Mountain View, Calif.-based GreenBorder Technologies Inc. will release GreenBorder Version 2.7 on August 22. The update will make that […]

Worms Exploit Plug and Play Vulnerabilities

In 2003, the blaster worm infected as many as 10 million computers just three weeks after Microsoft Corp. issued a patch for the hole the worm exploited. Today, IT administrators would love to have even a week to patch their systems before a worm appears to exploit a new flaw. A mob of malicious programs […]

Zotob, PnP Worms Slam 13 DaimlerChrysler Plants

A round of Internet worm infections knocked 13 of DaimlerChryslers U.S. auto manufacturing plants offline for almost an hour this week, stranding some 50,000 auto workers as infected Microsoft Windows systems were patched, a company spokesperson told eWEEK. Plants in Illinois, Indiana, Wisconsin, Ohio, Delaware and Michigan were knocked offline at around 3:00 PM on […]

Fast-Moving Worms Slam Media, Enterprise Networks

A gang of new, fast moving Internet worms spread quickly across the Internet on Tuesday and Wednesday, using a recently disclosed hole in Windows systems to infect computers belonging to leading companies, including the New York Times and Cornell University. At least 11 different kinds of malicious software have been identified that exploit a hole […]