Brian Prince

Virtualization, Cloud PCI Compliance Tips for Your Enterprise

Virtualization, Cloud PCI Compliance Tips for Your Enterprise by Brian Prince Do Ask, Do Tell Companies should get independent verification that its cloud/virtualization vendor is PCI-compliant, and make sure there are measures in place to maintain that compliance. Companies should study their SLA to see if it protects them in the event of a data […]

Microsoft Releases Windows Security Tool to Swat Bug

Microsoft is arming Windows users with a new automated tool to help thwart exploits of a zero-day that has come under attack. The bug, which lies in the Windows shell component of the operating system, exists because Windows parses shortcuts in a way that permits malicious code to be executed when the icon of a […]

FileMaker Releases Database App for iPad, iPhone

FileMaker is nudging the iPad and iPhone further into the enterprise space by bringing their database technology to the mobile devices’ users. The company released FileMaker Go iPhone and FileMaker Go for iPad Tuesday, and the programs are now available through Apple’s iTunes App Store. With FileMaker Go, users can view, edit and search for […]

Adobe Reader to Get Sandboxing Security Technology

Adobe Systems is adding new sandboxing technology to Adobe Reader to tighten security and close down doors for attackers. Known as -Protected Mode’, the technology will be included in the next full version of the PDF viewing software, and comes at a time when attackers are increasingly using Adobe vulnerabilities to compromise computers. The technology […]

How Attackers Use Social Networks for Command and Control Operations

In August 2009, Arbor Networks researcher Jose Nazario uncovered a botnet using Twitter as a command and control mechanism. Since then, other examples of attackers taking advantage of Web 2.0 sites have continued to sporadically pop up. The tactic remains quite rare, but there are a number of reasons why attackers may increasingly look to […]

Microsoft Security Essentials, Forefront Software Betas Released

Microsoft released the beta versions of upcoming editions of Microsoft Security Essentials and Forefront Endpoint Protection 2010. In Security Essentials, Microsoft has added several new features and enhancements, including integration with Internet Explorer to protect against Web threats as well as a network inspection system to prevent network-based exploits. According to a spokesperson, the network […]

Stuxnet Malware Still Exploiting Microsoft Windows Security Hole

News of a Microsoft Windows zero-day vulnerability may have put the Stuxnet malware on the public’s radar, but it has not stopped the malware’s purveyors from trucking along. As of this morning, Microsoft said it detected nearly 10,000 unique machines where Stuxnet infections were prevented. The target of the malware is not ordinary users, but […]

VeriSign Adds Malware Scanning Service for SSL Customers

VeriSign has announced plans to make a move into malware scanning to bolster its role in ensuring Website security. The anti-malware service is part of a handful of new features VeriSign is offering to its customers to help them create a safe, trusted experience for visitors. In addition to malware scanning, VeriSign SSL-protected sites will […]

Microsoft Windows Security Advisory Flawed, Pros Say

Some security pros are taking issue with Microsoft’s advisory on a zero-day vulnerability one researcher referred to as “simple to exploit.” The vulnerability lies in the Windows Shell component. While Microsoft asserted in its advisory July 16 that the result of the vulnerability is that “malicious code may be executed when the user clicks the […]

Microsoft Releases Security Advisory for .LNK Bug Under Attack

Microsoft issued an advisory today to address a zero-day vulnerability linked to a Trojan spreading through infected USB devices. According to Microsoft, the vulnerability at the center of the reports exists because Windows incorrectly parses shortcuts in a way that allows malicious code may be executed when the user clicks the displayed icon of a […]