A small Cambridge, Mass., developer this week will introduce software designed to lock down notoriously insecure WLAN systems. Funk Software Inc.s Odyssey includes server and client software and is based on a new authentication scheme known as EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security). EAP-TTLS requires no client-side digital certificates. To date, most wireless LAN […]
Novell Inc. on Monday joined the Liberty Alliance Project single sign-on effort, adding yet another marquee name to what is shaping up to be a partisan fight over the future of identity management on the Web. The Provo, Utah, company will bring its considerable experience in identity management to the alliance, which is designed to […]
Microsoft Corp. on Thursday named Scott Charney, a former security and cybercrime specialist with PricewaterhouseCoopers, as its new chief security strategist. Charney replaces Howard Schmidt, who is leaving to become vice chairman of the National Critical Infrastructure Protection Board. Charney will have no shortage of things to keep him occupied when he starts work at […]
WASHINGTON — Microsoft Corp. is wasting no time implementing the Trustworthy Computing initiative that Bill Gates outlined in his all-company memo last month. Speaking to a group of privacy and security officers at the Privacy and Data Security Summit here Friday, Richard Purcell, Microsofts corporate privacy officer, outlined an extensive privacy program that requires every […]
WASHINGTON–Microsoft Corp. on Thursday joined a group of other vendors and privacy organizations in forming a new online privacy initiative designed to protect consumers from receiving unwanted or malicious e-mail messages. Known as Trusted Sender, the program is based on a set of best practices and is designed to give spam-weary consumers some options for […]
Hacktivismo, a subset of the famed Cult of the Dead Cow hacker group, will demonstrate its long-awaited Peekabooty software next month at a small peer-to-peer and network security conference in San Francisco. There has been a lot of discussion about what exactly Peekabooty is, but Hacktivismo has been quiet on the subject, preferring to let […]
Timing, as they say, is everything. As the furor over Oracle Corp.s new Unbreakable ad campaign grows, Application Security Inc. this week introduced a new version of its AppDetective, a security scanner designed to look for vulnerabilities in Oracle databases. Oracle, the Redwood Shores, Calif., database software maker, lately has been running a print advertising […]
A new mass-mailing worm hit the Internet on Sunday and has begun spreading rapidly. The new worm is known as Myparty.A and arrives as an e-mail with the subject line “New photos from my party!” The body of the message reads as follows: “Hello! My party…It was absolutely amazing! I have attached my web page […]
As the consolidation of struggling PKI technologies accelerates, even large backers of the security software are shelving internal products in favor of third-party pacts and a greater focus on public-key-infrastructure-based services. Indicative of this trend is a plan by IBM, of Armonk, N.Y., to diminish the role of its Tivoli SecureWay PKI solution over the […]
Struggling security vendor Baltimore Technologies plc. on Thursday announced the sale of its Content Technologies division for about $29 million. Clearswift Corp., a software company based in England, bought the division with a mix of cash, loan notes and Clearswift shares. Baltimore paid $992 million for Content Technologies in 2000. The sale is part of […]