In more evidence of Microsofts increased interest in security technology, the software company said on Wednesday that it plans to acquire FrontBridge, a provider of secure messaging services, for an undisclosed sum. Microsoft Corp. plans to use its acquisition of FrontBridge Technologies Inc. to deliver a secure, highly availabile e-mail service that will be marketed […]
A group of leading technology firms that includes Microsoft Corp., IBM, Yahoo Inc. and Cisco Systems Inc. has submitted a new e-mail authentication standard to the Internet Engineering Task Force. The specifications for DKIM (DomainKeys Identified Mail) were submitted to the IETF last week for consideration as a new e-mail authentication standard. DKIM has been […]
Like pornography, spyware has been something that most people cant define but know it when they see it. But no longer. The Anti-Spyware Coalition, in Washington, has published a document that aims to define key terms and behaviors that characterize spyware. The list of uniform definitions is the first major contribution by the ASC, which […]
Like pornography, spyware has been one of those things that most people cant define but know when they see. No longer. The Anti-Spyware Coalition, an anti-spyware industry group, on Tuesday published a document that aims to put spyware in its place by defining key terms and behaviors that characterize spyware programs. The list of uniform […]
VeriSign Inc. said on Thursday that it has acquired security intelligence firm iDefense for $40 million in cash. iDefense specializes in developing security intelligence about software vulnerabilities and online threats. VeriSign said in a statement that it will use the Reston, Va., companys global network of researchers to improve its managed security services business. iDefense […]
Representatives from 37 e-mail technology companies used a one-day Summit in New York on Tuesday to exhort private sector administrators and online marketers to adopt e-mail sender authentication technology that helps block spam and phishing attacks. Around 500 people attended the E-Mail Authentication Implementation Summit and heard speeches by Internet luminary Esther Dyson, as well […]
With headlines about the compromise of hundreds of thousands of credit card numbers at CardSystems Solutions Inc. still fresh, the industry is implementing long-awaited data security rules for merchants and card processors. The Payment Card Industry Data Security Standard mandates IT security best practices such as firewalls and anti-virus software, as well as data encryption […]
New tools and features from two manufacturers of wireless security software will help network administrators sniff out rogue wireless systems and spot attacks that spread over wireless links. AirDefense Inc. and Newbury Networks Inc. each announced software in the past two weeks that gives administrators new ways to inventory authorized wireless devices; spot attacks; and […]
Millions of U.S. Military computers will be protected from spyware using software from Computer Associates International Inc., company officials said last week. The Defense Information Systems Agency awarded Science Applications International Corp. and CA a $6.9 million order to provide an enterprisewide Spyware Detection, Eradication and Protection product, which DISA calls SDEP. As part of […]
A group of leading technology companies that includes Microsoft Corp., IBM, Yahoo Inc. and Cisco Systems Inc. has submitted a new e-mail authentication standard to the Internet Engineering Task Force for consideration, eWEEK has learned. The specifications for DomainKeys Identified Mail, or DKIM, were submitted to the IETF on Monday for consideration as a new […]