Matt Hines

Nortel Adds On-board Symantec Intrusion Detection

Networking giant Nortel on May 22 unveiled a new applications switch that comes pre-loaded with Symantecs intrusion detection software. Labeled as the Nortel Application Switch with Symantec Intelligent Network Protection, the network hardware aims to offer comprehensive protection for corporate systems on an infrastructure level. Nortel officials said that the introduction of the defensive-minded switch […]

Pedophile-Hunting Technology Aimed at Insider Threats

NextSentry is hoping software partially derived from a pedophile-tracking application can keep corporate insiders on the security straight and narrow. Security applications vendor NextSentry and its initial product offering were launched May 22, promising to bring sophisticated natural language processing capabilities into the enterprise security content filtering market. The most intriguing element of the companys […]

New Yahoo IM Worm Poses as Safety Browser

Security researchers have identified a new worm spreading across Yahoos instant messaging network that has been cloaked under the guise of a “safety” browser in an attempt to dupe users. First discovered by anti-malware researchers at FaceTime Communications, the worm, labeled as yhoo32.explr, is forwarding itself throughout Yahoos IM system via the contact lists of […]

Microsoft Lands Whale for VPN Tech

Microsoft added remote-access VPN technology to its growing array of security properties on May 18, snapping up privately held Whale Communications for an undisclosed price. Company officials described the acquisition as a move to round out Microsofts ability to provide support for secure access to corporate networks in its ISA (Internet Security and Acceleration) Server […]

Research Says Cisco, Microsoft Lead Security Spending

The continued push into the security sector by IT leaders Cisco Systems and Microsoft is making hay with chief security officers, as a new poll of the executives finds that most will consider the well-known vendors products in 2006 as they budget network and applications defense technologies. In its inaugural survey of ranking CSOs at […]

VeriSign Certifies SSL Plans Via GeoTrust Buyout

Picking off one of its fastest-growing rivals in the SSL certificate space and rounding out its own presence in the market, VeriSign announced on May 17 that it is acquiring GeoTrust for roughly $125 million. If the all-cash deal gains the approval of industry regulators, VeriSign contends that the buyout will significantly expand its reach […]

Security: The Consumer Device Conundrum

With the introduction of Palms newest Treo, Nokias partnership with Google for instant messaging on the handheld and BlackBerrys move into China, its clear that powerful devices abound, offering sophisticated capabilities both inside and outside the office. Enterprises must balance the promise of such products with the security implications they bring. When intellectual property expert […]

Researchers Warn of Fake Anti-Spyware

The latest report issued by Finjans Malicious Code Research Center highlights the growth of several emerging breeds of cyber-attack, including the increasing popularity of so-called “ransomware” and viruses that are being spread via fake anti-spyware applications. The anti-virus software makers research arm said in its Web Security Trends Report, issued on May 16, that the […]

Palm Unveils Latest Treo Smart Phone

Palm continued the build-out of its high-end Treo line on May 15, introducing its new model 700p smart phone. The second of four new Treo versions that the company is expected to release this year, the handheld runs on the Palm operating system and offers the ability to connect to EvDO (Evolution Data Optimized) networks […]

Intel Aims to Upgrade PCs with Virtual Appliances

Intel is eyeing a plan for using software to boost a PCs ability to fight hackers, talk on the phone and even capture television programs in the future. The chip maker, which launched its security and manageability-focused vPro brand on April 24, is contemplating mounting an effort to establish a standard method for adding virtual […]