ATLANTA—Internet Security Systems Inc. on Thursday announced its plans to make a grab for the brass ring of security management: dynamically protecting networks and individual machines by tying threat data to vulnerabilities in real time. The new strategy, dubbed Dynamic Threat Protection, includes several new partnerships and product launches and represents a major bet on […]
A hoax message posted to two security mailing lists Monday suggests that the Recording Industry Association of America has hired a group of hackers who have developed a worm capable of infecting and shutting down peer-to-peer file-sharing software. The hackers claim to have released the worm, on the RIAAs orders, and that it now controls […]
As corporations and musicians continue to flex their muscles under the Digital Millennium Copyright Act, security researchers, academics and private citizens are petitioning the federal government to grant key exceptions to the controversial law. At the invitation of the U.S. Copyright Office at the Library of Congress, dozens of people submitted comments last fall on […]
In an effort to give its product an edge over the dozens of other firewalls on the market, Microsoft Corp. last week unveiled a feature pack for its Internet Security and Acceleration Server that delivers unique protection features. ISA Server 2000 Feature Pack 1 includes an enhanced SMTP filter, better security for transmissions between Outlook […]
Two Harvard University security researchers have developed a model showing that enterprises that share their sensitive data about network attacks and security breaches are less attractive targets and, hence, less likely to be attacked. The paper, to be presented later this month at the Financial Cryptography conference in Gosier, Guadeloupe, supports the U.S. governments contentions […]
Sun Microsystems Inc. on Monday will unveil its first new identity-management product based on the Liberty Alliance specification it helped create. Sun One Identity Server 6.0 is hardly a breakthrough product, but customers, competitors and other Liberty Alliance members will be watching its progress closely. It is the first major product from an alliance member […]
After taking most of 2002 off, the worlds virus writers seem to be making up for lost time in the early part of 2003. A new virus, known as Sobig, is spreading rapidly on the Internet, infecting machines worldwide. The virus, which attacks Windows machines running Microsoft Corp.s Outlook e-mail client, was first seen late […]
Critics who called the governments draft plan for improving cyber-security toothless and overly broad are likely to be sorely disappointed by the next version when its released within the next few weeks. A current version of the document circulating in Washington contains even less detail and fewer specific recommendations than did the original draft released […]
Its been a big week for teen pop singer Avril Lavigne; first she garnered five Grammy nominations and now she has a virus named after her. A new worm—going by various names, including Avril, Lirva and Naith—is infecting machines in the United States and abroad. In addition to forcing users to visit Lavignes Web site, […]
Scott Charney has been on the hot seat ever since he joined Microsoft Corp. last year as the software giants chief security strategist. He arrived in Redmond, Wash., four months after Bill Gates sent out his famous memo outlining the companys new Trustworthy Computing initiative and a newfound commitment to security. He is not only […]