Security gear maker SonicWall said Feb. 8 that it has acquired e-mail security vendor MailFrontier for $31 million in cash. The deal will add MailFrontiers messaging security software and hardware to SonicWalls portfolio of security hardware and software products for small and midsize businesses, according to a statement from SonicWall. /zimages/6/28571.gifClick here to read about […]
Malicious hackers who are able to hijack an organizations Web domain may be able to steal traffic from the legitimate Web site long after the domain has been restored to its owner, according to a recent report. Design flaws in the way Web browsers and proxy servers store data about Web sites allow malicious hackers […]
Symantec said Feb. 7 that it reached an agreement to buy Relicore, which makes change and configuration management software for corporate data centers. Terms of the deal were not disclosed. Relicore, of Burlington, Mass., makes Clarity, which is software that can scan a companys servers. Symantec plans to use Relicores technology with its server management […]
Juniper Networks unveiled a new integrated router and security appliance on Feb. 6: the Secure Services Gateway 500 Series. The SSG is a LAN/WAN router that sports an integrated firewall, VPN, and will eventually support anti-virus, anti-spam and Web filtering features, according to Adam Conway, product line manager for Junipers Security Products Group. The SSG […]
CipherTrust on Feb. 6 plans to announce a new service that will allow companies to monitor their brands and spot online scams, such as phishing attacks, that use their names. CipherTrust Radar 360 and CipherTrust Radar Inside are hosted security services that identify traffic from compromised hosts on enterprise networks, and find the sources of […]
U.S. Government agencies are conducting electronic war games this week to test the governments ability to respond to the digital equivalent of Hurricane Katrina. The exercise, dubbed “Operation Cyber Storm,” was postponed for two months because of Katrina, but will take place between Feb. 6 and Feb. 10. The exercise will mimic the effects of […]
As the thirst for low-maintenance on-demand software continues to grow in the enterprise, some security experts and customers worry that security weaknesses could disrupt on-demand applications and leave them high and dry. For now, these security concerns lurk well below the surface—few of the big vendors pitching their wares at the RSA Conference on Feb. […]
While the world held its breath, there were few noticeable effects from the dreaded Blackworm, which began deleting files on infected Windows computers Friday, according to interviews with computer virus experts. The worm, which also goes by the name “Kama Sutra,” “Nyxem” and “MyWife,” is continuing to spread, but is not causing the damage that […]
Malicious hackers are increasingly targeting security vulnerabilities in open-source software that runs bulletin boards and online forums, according to Internet monitoring firm Netcraft. The unpatched holes, in open-source software like phpBB, PostNuke, and Mambo are being used to take control of powerful servers for denial of service attacks and phishing scams. Poor deployment of security […]
Symantec said Feb. 1 that a high-risk hole could allow a remote attacker to take over vulnerable Sygate Management Servers. The company issued a patch for the Sygate application vulnerability. If left unpatched, remote attackers could use SQL (Structure Query Language) code to overwrite passwords for accounts on the server, possibly gaining administrative access to […]