One month after it announced the acquisition of firewall maker Tiny Software, Computer Associates International scooped up another small security company—anti-spam vendor Qurb. CA acquired Qurb in an all-cash transaction for an undisclosed sum. CA plans to use Qurbs software to extend the reach of its eTrust software on corporate desktops, according to officials. CA […]
A former Internet Security Systems Inc. researcher sued by Cisco Systems Inc. and ISS after he revealed the details of a serious flaw in Ciscos Internet Operating System responded to the lawsuit Thursday, saying that he was complying with a Federal District Court order to stop talking about the flaw but did not regret breaking […]
A discussion of vulnerability in Cisco Systems Inc.s IOS provoked controversy at this years Black Hat Briefings conference in Las Vegas, after the San Jose, Calif., networking vendor forced conference organizers to physically remove notes on the strategy for remotely exploiting IOS systems from conference proceedings. The researcher, Michael Lynn, ultimately presented information on the […]
Cisco Systems and Internet Security Systems have asked a U.S. District Court to issue a restraining order against a former ISS researcher and Black Hat over the leak of information about security holes in Ciscos Internetwork Operating System. The two companies jointly filed an injunction and temporary restraining order Wednesday against researcher Michael Lynn and […]
One month after it announced the acquisition of firewall maker Tiny Software Inc., Computer Associates International Inc. scooped up another small security company: anti-spam vendor Qurb Inc. of San Mateo, Calif. CA acquired Qurb on July 20 in an all-cash transaction for an undisclosed sum. The Islandia, N.Y., company plans to use Qurbs software to […]
Network anomaly detection vendor Q1 Labs Inc. is getting into the security incident management game with the latest version of its QRadar product, QRadar 5.0. The new release, set to be announced next week, adds features for collecting, correlating and analyzing data from vulnerability scanners, firewalls and IDS (intrusion detection system) sensors to existing QRadar […]
A new program from 3Com Corp. will pay security researchers for information on software vulnerabilities. 3Com and its TippingPoint division announced the ZDI (Zero Day Initiative) this week. The program will pay researchers cash for data on vulnerabilities, which 3Com will pass along to affected vendors and use to beef up protections through its TippingPoint […]
Vulnerabilities in USB drivers for Microsoft Corp.s Windows could allow an attacker to take control of locked workstations by using a specially programmed USB device, according to an executive from SPI Dynamics Inc., a security vendor whose researchers discovered the security hole. The vulnerabilities that could let an attacker circumvent Windows security and gain administrative […]
If there was any doubt about the power of blogs, consider the case of Michael Gee. A part-time journalism professor at Boston University, Gee was fired recently after he posted comments in a blog about the looks of a female student in his course. Writing on the Web site SportsJournalists.com July 5, Gee, a well-known […]
Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device, according to an executive from SPI Dynamics, which discovered the security hole. The buffer-overflow vulnerabilities could enable an attacker to circumvent Windows security and gain administrative access to a users machine. […]