Paul F. Roberts

SonicWall Strengthens E-Mail Security

Security gear maker SonicWall said Feb. 8 that it has acquired e-mail security vendor MailFrontier for $31 million in cash. The deal will add MailFrontiers messaging security software and hardware to SonicWalls portfolio of security hardware and software products for small and midsize businesses, according to a statement from SonicWall. /zimages/6/28571.gifClick here to read about […]

Effects of Domain Hijacking Can Linger

Malicious hackers who are able to hijack an organizations Web domain may be able to steal traffic from the legitimate Web site long after the domain has been restored to its owner, according to a recent report. Design flaws in the way Web browsers and proxy servers store data about Web sites allow malicious hackers […]

Symantec to Buy Relicore for Config Management

Symantec said Feb. 7 that it reached an agreement to buy Relicore, which makes change and configuration management software for corporate data centers. Terms of the deal were not disclosed. Relicore, of Burlington, Mass., makes Clarity, which is software that can scan a companys servers. Symantec plans to use Relicores technology with its server management […]

Juniper Releases SSG Security Appliance

Juniper Networks unveiled a new integrated router and security appliance on Feb. 6: the Secure Services Gateway 500 Series. The SSG is a LAN/WAN router that sports an integrated firewall, VPN, and will eventually support anti-virus, anti-spam and Web filtering features, according to Adam Conway, product line manager for Junipers Security Products Group. The SSG […]

CipherTrust to Sell Phishing, Reputation Monitoring

CipherTrust on Feb. 6 plans to announce a new service that will allow companies to monitor their brands and spot online scams, such as phishing attacks, that use their names. CipherTrust Radar 360 and CipherTrust Radar Inside are hosted security services that identify traffic from compromised hosts on enterprise networks, and find the sources of […]

U.S. Government to Put Cyber Katrina to the Test

U.S. Government agencies are conducting electronic war games this week to test the governments ability to respond to the digital equivalent of Hurricane Katrina. The exercise, dubbed “Operation Cyber Storm,” was postponed for two months because of Katrina, but will take place between Feb. 6 and Feb. 10. The exercise will mimic the effects of […]

Security May Dog Software as a Service

As the thirst for low-maintenance on-demand software continues to grow in the enterprise, some security experts and customers worry that security weaknesses could disrupt on-demand applications and leave them high and dry. For now, these security concerns lurk well below the surface—few of the big vendors pitching their wares at the RSA Conference on Feb. […]

Blackworm D-Day Turns Out to Be a Dud

While the world held its breath, there were few noticeable effects from the dreaded Blackworm, which began deleting files on infected Windows computers Friday, according to interviews with computer virus experts. The worm, which also goes by the name “Kama Sutra,” “Nyxem” and “MyWife,” is continuing to spread, but is not causing the damage that […]

AMD Hack Points to Widespread Web Forum Flaws, Attacks

Malicious hackers are increasingly targeting security vulnerabilities in open-source software that runs bulletin boards and online forums, according to Internet monitoring firm Netcraft. The unpatched holes, in open-source software like phpBB, PostNuke, and Mambo are being used to take control of powerful servers for denial of service attacks and phishing scams. Poor deployment of security […]

Symantec Warns of Serious Hole in Sygate SMS Product

Symantec said Feb. 1 that a high-risk hole could allow a remote attacker to take over vulnerable Sygate Management Servers. The company issued a patch for the Sygate application vulnerability. If left unpatched, remote attackers could use SQL (Structure Query Language) code to overwrite passwords for accounts on the server, possibly gaining administrative access to […]