Brian Prince

Cisco Pushes E-mail Security into the Cloud

Cisco Systems has hopped aboard the cloud security train with a set of new managed, hosted and hybrid e-mail security services. In April, Cisco will launch Cisco IronPort E-mail Security services with the goal of giving businesses the opportunity to choose from three different approaches to e-mail security – managed, hosted or a combination of […]

Koobface Variant Hits Facebook, Targets Other Social Networks

Researchers at Trend Micro are reporting that a new variant of the Koobface worm is spreading on Facebook. Koobface first appeared in 2008, with separate variants striking members of Facebook and MySpace.com. Now the Koobface worm is back again, with an eye toward stealing cookies for other social networking sites. According to Trend Micro, the […]

Rogue Facebook Application Uses Fake Terms of Service Alert to Target Users

For the second time in less than a week, Facebook has been forced to squelch a rogue application targeting users of the site. In the most recent attack, Facebook users receive notices stating they have been reported for violating Facebook’s terms of service by someone in their friends’ list. A link in the notification leads […]

Mitigate the Adobe Zero-Day Vulnerability While Waiting for a Patch

It’s no secret there is a zero-day flaw affecting Adobe Reader and Acrobat. A solution, however, has been more elusive. According to Secunia, the vulnerability affects versions 9 and earlier and is due specifically to an array indexing error in the processing of JBIG2 streams. The situation can be exploited to corrupt arbitrary memory via […]

Google Challenges Hackers to Native Client Security Contest

Google is hosting a contest to get its hands on security flaws affecting its Native Client technology. Native Client is an open-source research technology for running x86 native code in Web applications. As an incentive, Google is offering five cash prizes, the largest of which is $8,192. Second place is $4,096, third is $2,048 and […]

Quest Tool for Oracle Database Developers Will Support Microsoft VSTS 2010

Quest Software is offering an Oracle Database Schema Provider tool for the upcoming release of Microsoft Visual Studio Team System 2010. The systems management vendor made the announcement at the VSLive San Francisco conference held Feb. 23 to 27. The new tool, which will soon be available as a beta, “provides Oracle support for VSTS, […]

Google Talk Users Hit with Phishing Attack After Gmail Outage

More bad news for Google – some 24 hours after a Gmail service blackout, users of Google Talk became the target of a phishing scam seeking to trick them into giving up their user credentials. Google Talk is Google’s instant messaging system. According to Sophos, users have been getting unsolicited messages urging them to “check […]

Network Firewall Management Tools from Third-Party Vendors Gain Ground Among Enterprises

Five years after spinning out of FishNet Security, officials at Secure Passage say they have watched the challenge of managing firewall policies mushroom. In a space where larger vendors such as Cisco, Juniper Networks and Check Point Software Technologies loom large, third-party vendors like Secure Passage are finding a niche by offering enterprises deeper visibility […]

VMware to Launch vShield Zones Security Appliance to Protect Data Centers

VMware is launching a new appliance to protect the growing number of virtual data centers in the enterprise. Dubbed VMware vShield Zones, the appliance is aimed at helping enterprises maintain strict compliance with security policies as they pursue cloud computing with virtual environments. The company announced plans for the appliance Feb. 24 at VMworld Europe […]

Netezza Purchases Data Auditing Vendor Tizor Systems

Data warehousing vendor Netezza announced Feb. 24 it has acquired data auditing and protection vendor Tizor Systems for an undisclosed sum. According to officials at Netezza, the acquisition will help “enterprise customers to track, store and perform forensic analysis against years of data access history and more easily meet regulatory compliance requirements.” “As regulatory compliance […]