Matt Hines

PayPal Fills Phishing Hole

Online payment company PayPal reported that it has fixed a Web site glitch through which the operators of a phishing scheme had been attempting to steal personal data of the companys customers. According to officials for the eBay subsidiary, PayPal updated coding on its Web site to block a vulnerability that phishers based in South […]

Compliance Fuels Security on Demand

The software as a service delivery model is poised for adoption across the security industry, with some hosted applications providers tabbing customers compliance efforts as an emerging driver of the trend. As Salesforce.com has proved in the CRM (customer relationship management) sector, many business customers appear increasingly willing to consider the move to hosted applications […]

AIG Confirms Customer Data Breach

Insurance provider American International Group has confirmed the theft of a file server and other hardware that held the personal information of approximately 970,000 potential customers. Company officials said an intruder entered one of its Midwest offices sometime after business hours in late March and walked off with a file server and other equipment, including […]

Web 2.0, AJAX Bring New Era of Threats

Malware attacks created using emerging Web development tools such as AJAX are expected to begin showing up more frequently, as writers of malicious code match the skills of their legitimate counterparts. With the arrival of the Yamanner virus targeting Yahoo Messenger on June 13, industry analysts and security software vendors say the era of what […]

Microsoft Halts Unauthorized Vista Downloads

Microsoft has forwarded a cease-and-desist order to VistaTorrent.com, asking the sites operators to stop their distribution of the latest beta test version of the Windows Vista operating system. Company spokesmen noted that it is Microsofts standard practice to stop third parties from unauthorized distribution of its products, as the software giant said it cannot guarantee […]

Microsoft on Security: Pariah or Trendsetter?

BOSTON—Microsofts transformation from pariah to trendsetter in the information security sector is slowly beginning to sink in, but users are mixed about hopping on the bandwagon. At the TechEd 2006 conference here, the software maker worked overtime to convince the world that security is really its No. 1 priority. So far, with a few rare […]

Independent Mobile VPN Vendors to Merge

Wireless virtual private network specialists NetMotion Wireless and Padcom announced a deal to merge their businesses June 15, with plans to aim their combined products squarely at enterprise customers. The two former rivals, who will unite under the NetMotion Wireless moniker, say that their proposed marriage will create the largest dedicated provider of wireless VPN […]

CipherTrust Updates E-Mail Gateway Appliances

CipherTrust launched updated versions of its gateway security appliance on June 15, promising more sophisticated tools for regulating IT compliance issues and scanning images embedded in e-mail messages. Dubbed IronMail 6.5, the gateway security appliance offers two new functional modules for managing compliance and scouring messages for viruses hidden in image files, a tactic commonly […]

Startup Aims to Automate Identity Compliance

A new software startup named Aveksa introduced its first product June 14 with the goal of helping companies automate IT authentication systems management and regulatory compliance work. Labeled as Alexa Compliance Manager, the software promises to centrally monitor the operation of access management tools present in other IT systems and applications, and give companies the […]

Webroot Revamps Enterprise Anti-Spyware

Webroot launched the latest version of its enterprise anti-spyware application on June 13, promising a completely revamped software client along with stronger tools for removing rootkits and other malicious programs. The product, Spy Sweeper Enterprise 3.0, offers kernel-level driver protection capabilities to help aid in the detection and removal of increasingly sophisticated forms of spyware, […]