Brian Prince

ATandT Breach Could Reach Further than Thought

The security breach at AT&T that exposed the e-mail addresses of a reported 114,000 owners of the iPad with Wi-Fi + 3G could potentially impact privacy more than was initially thought. Two security researchers told eWEEK that the ICCIDs (integrated circuit card identifiers) of iPad owners could be used to determine their IMSIs (International Mobile […]

IT Security Budgets Return Focus to Complex Projects

Enterprises are getting back to business-driven security initiatives after putting off some large-scale projects last year, according to the Gartner analyst firm. While security spending tied to “keeping the bad guys out” was not heavily affected by the economy, many IT security organizations scaled back on capital-intensive projects in 2009, Gartner found. This year, however, […]

Most Major Software Bugs Caused by Testing, Infrastructure Limitations, Survey Finds

Osterman Research and software production management vendor Electric Cloud released a survey this month that laid most of the blame for major software bugs on poor testing procedures and infrastructure limitations as opposed to design problems. The survey included responses from 144 professionals including software developers, testers, managers and executives from organizations with at least […]

Check Point Buys Liquid Machines for ERM Business

Check Point Software Technologies has acquired Liquid Machines for an undisclosed sum in a bid to strengthen its data security story. At the heart of the deal is Liquid Machines’ document encryption technology, which Check Point said extends its ability to secure data throughout the data lifecycle. According to Check Point, the deal adds to […]

ATandT Breach Exposed Apple iPad Owners’ E-Mail Addresses

AT&T confirmed a security breach exposed the e-mail addresses of 3G iPad owners. The breach was first reported by Gawker.com after a group called Goatse Security exploited a security hole on AT&T’s Website. As a result, the group was able to get its hands on the e-mail addresses of 114,000 owners of 3G iPads. “AT&T […]

Australian ISPs Adopt Industry Security Standard

An Australian collective of technology firms has developed an industry code in cooperation with the country’s government to help Internet Service Providers improve cyber-security. The Internet Industry Association’s (IIA) newly developed “icode” (PDF) provides a voluntary industry framework for how ISPs can respond to security issues affecting customers and how ISPs can go about dealing […]

Sophos Bolsters Cloud-Based Security Protections

Sophos has strengthened its cloud-based analytic capabilities to protect endpoints from malware and malicious websites. In Sophos Endpoint Security and Data Protection 9.5, Sophos has added what it calls “Live Protection,” a new spin on the company’s approach to the cloud. Rather than sending updates to endpoints from the company’s database of malicious URLs and […]

Apple Safari Updates Plug Security Holes

Apple released new versions of Safari June 7 with critical fixes for both Windows and Mac OS X users. Many of the bugs addressed in Safari 4.1 and 5.0 can be exploited to remotely execute code. Several of the vulnerabilities impacted WebKit, the open-source browser engine behind Safari. Here are some of the most serious […]

1 in 10 IT Pros Cheat Firewall Audits, Survey Finds

Cheating on a firewall audit can be tempting. So much so that roughly 1 in 10 IT pros surveyed by firewall management vendor Tufin Technologies admitted to cutting corners to get an audit passed. The results of the latest survey (PDF), which included responses from 242 IT pros that were mostly from organizations with 1,000 […]

Microsoft Patches Critical IE, Windows Vulnerabilities

Microsoft released 10 security bulletins today to address 34 vulnerabilities, including several with Microsoft’s highest exploitability rating. The exploitability rating ranks vulnerabilities according to the likelihood attackers will develop reliable exploit code. Three of the bulletins are rated “critical.” Among them is MS10-033, which plugs two Windows security vulnerabilities that could allow an attacker to […]