Cyber Security Institute

Thursday, March 31, 2005

Enterprise security boom continues

The market for enterprise security is growing at its highest rate ever in Europe, according to analyst firm Canalys.

MORE... (0) Comments

Windows 2003 Server SP1 a big plus for wireless LAN security

Microsoft released its first major service pack for its flagship server product Windows 2003 Server.  Aside from other security enhancements to the operating system, SP1 for Windows 2003 Server is a huge boost for enterprise grade wireless LANs.

MORE... (0) Comments

Having a problem with IT? Blame the sales rep

A new report conducted by market research firm Info-Tech Research Group says 95 per cent of information technology groups “are not delivering some number of projects on time or to the full satisfaction of the business executive.”

MORE... (0) Comments

The U.N. thinks about tomorrow’s cyberspace

Created in 1865 to facilitate telegraph transmissions, its mandate has expanded to include radio and telephone communications.  But the ITU enjoys virtually no influence over the Internet.

MORE... (0) Comments

Wednesday, March 30, 2005

Study indicates Canadians fear identity theft over virus attacks

Thirty-nine per cent of Canadians consider identity theft, such as having passwords and personal information stolen, to be their primary security concern online, according to a recent study.

MORE... (0) Comments

Europeans worry about online banking security

Phishing, keystroke logging and other types of scams are increasingly worrying users of online banking services in Europe while scaring others away, according to a report issued from Forrester Research Inc.

MORE... (0) Comments

Phishing attacks ease off

The rate at which identity theft emails hit consumers is beginning to slow, according to a study published recently.

MORE... (0) Comments

Tuesday, March 29, 2005

Black Duck debuts IP compliance software

Black Duck Software Inc. rolled out an on-demand service that allows developers and due diligence teams to examine software projects for open source code in order to make sure their licensing obligations are being met.

MORE... (0) Comments

Cisco readying XML device

Already a powerhouse in the market for Internet routers, Cisco intends to enter the emerging market for XML networking products this year, according to industry sources.  Under a project dubbed Aeon, Cisco is working on a line of networking devices designed to handle network traffic of XML documents, a field already populated by a number of specialised start-ups.

MORE... (0) Comments

IPv6 addresses its problems

Something is happening in IPv6, the next generation Internet Protocol that’s been waiting in the wings for the best part of a decade.

MORE... (0) Comments

Monday, March 28, 2005

Telecom giants join forces against hackers

High-profile telecom and networking companies are banding together to crack down on hackers.

MORE... (0) Comments

Saturday, March 26, 2005

Industry group to map VoIP security

The Voice over IP Security Alliance, a recently formed industry group, has created a new committee to define security requirements for Internet telephony networks.  The committee will define security requirements across a variety of voice over Internet Protocol (VoIP) deployments and address issues such as security technology components, architecture and network design, network management, and end-point access and authentication, the group said Monday.  Another panel will research infrastructure weaknesses, vulnerabilities and emerging application attacks, the group said.

MORE... (0) Comments

Friday, March 25, 2005

Symantec Gains Added Vendor Neutrality with New IPS Support

Current Analysis says competitive pressures have forced Symantec to expand its managed security services offering to include support for intrusion prevention systems.  On March 15, Symantec expanded its Symantec Managed Security Services (MSS) to support additional intrusion prevention systems (IPS).

MORE... (0) Comments

Thursday, March 24, 2005

Root out the administrative password menace

When password management comes to mind, most managers think of their own personal passwords or the end-users’ passwords used to access the network, sales database or e-mail systems.  But there is another set of passwords that is at the heart of the enterprise operation—passwords that are critical and sensitive, and yet their security and management is often overlooked.

MORE... (0) Comments

RootkitRevealer

RootkitRevealer is an advanced patent-pending root kit detection utility.  It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.

MORE... (0) Comments

Wednesday, March 23, 2005

IBM releases new antispam technology

New technology from IBM Corp. is designed to stop spam by identifying the Internet domain it came from, and can help spot online scams such as phishing attacks and e-mail spoofing.

MORE... (0) Comments

Microsoft Begins Beta Of Unified Update

Microsoft began a public beta test of its new Microsoft Update, a substitute for Windows Update that will keep users current with security patches and other updates for not only the OS, but also Office and other products from the Redmond, Wash.-based developer.

MORE... (0) Comments

Report: Companies unprepared for IM attacks

Many businesses are leaving themselves vulnerable to the emerging crop of IM-borne attacks because they aren’t managing employee use of instant-messaging software, a new report finds.

MORE... (0) Comments

Tuesday, March 22, 2005

Flaw found in Nortel’s VPN client

A security company has warned of a password flaw in Nortel’s VPN software.

MORE... (0) Comments

Fingerprint scanners must be stand-alone: Centrelink

Centrelink has specified that fingerprint scanners it hopes to purchase should be stand-alone in nature and not integrated with external devices such as a mouse or keyboard.

MORE... (0) Comments

Microsoft Shares Longhorn Networking Details

Microsoft execs go public with some of the enterprise and home networking changes that will debut with its next-gen Windows, Longhorn, due out in it’s client version in 2006 and server in 2007.

MORE... (0) Comments

Sarbanes-Oxley Spending In 2004 More Than Expected

Spending for section 404 compliance averaged $4.4 million in 2004, a recent survey finds.

MORE... (0) Comments

Monday, March 21, 2005

Network managers have to do more with less

Many network managers in the UK will have to cope with a growing burden on their WAN without any increased investment in network bandwidth this year, according to a study recently published.

MORE... (0) Comments

Worms whack half of businesses

Almost half of businesses have had a worm outbreak in the last year, despite increases in security spending on compliance efforts, according to a recent survey.

MORE... (0) Comments

Symantec study warns of more OS X attacks

Security vendor Symantec is warning that Apple’s OS X operating system is increasingly becoming a target for hackers and malware authors.

MORE... (0) Comments

Sarbanes-Oxley compliance may be a burden, but it’s helping some companies improve operations at v

To hear many company executives tell it, the Sarbanes-Oxley Act has been a monumental burden, sucking up time and resources without making their businesses more competitive.  “The cost has been overbearing,” says Chris McWilton, CFO at the charge-card company with $2.6 billion in revenue.  But MasterCard is trying to get something back from that investment.

MORE... (0) Comments

Friday, March 18, 2005

FBI And Retailers Collaborate To Prevent Theft

The bureau is working with retailers to develop information-sharing networks and databases to cut down on organized theft.

MORE... (0) Comments

Government Expected To Spend Heavily On Cybersecurity

Input says the effects of 9/11 have changed the way federal agencies approach cybersecurity and will drive steady growth in federal IT security spending.

MORE... (0) Comments

Mixed views on AU IT security accreditation

The security community is bitterly divided about any possible national IT security accreditation scheme.  Some say Australia needs one, while others say the whole idea is a waste of time and the government should just implement internationally recognised standards.

MORE... (0) Comments

Security’s new deal

Security companies have entered a new era: Buy or be bought.

MORE... (0) Comments