Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: December 2003

Don’t leave holes in your patching policies

Posted on December 16, 2003December 30, 2021 by admini

Bugs are an inevitable problem in a sector where companies are driven by shareholders to rush out equipment before it is ready.

From a security perspective, this presents users with a huge problem. Empirical evidence suggests that the average device – whether it is a perimeter network resource such as a firewall or router, or a core device such as a server – has more holes in it than a piece of Gruyere.

One of the rarest but most devastating security vulnerabilities in host computers is the buffer overflow error, said Gary Jones, professional services manager of security consultancy MIS Corporate Defence Solutions.

The problem is that too many companies are not implementing patches in a structured way. “If you are running a corporate database, you cannot just slap on a patch when it is released,” he said. “You need some form of development environment and the patch must be tested first.”

Companies must also react to critical patches. If another aggressive internet worm appears, companies must be aware of it before they read about it in the press and they must be able to implement a patch quickly.

One solution is to have an employee checking newsgroups, supplier sites and bulletins to pick up on patches before the hackers do. Unfortunately, many companies are not in a position to pay this extra salary.

Common sense plays a big part in locking down your network vulnerabilities, but resources are also an important factor.

Virtual patching, where an intrusion dection system dynamically configures against threats, is the way on insuring against unknown vulnerabilities.

More info: [url=http://www.computerweekly.co.uk/articles/article.asp?liArticleID=127212&liArticleTypeID=20&liCategoryID=1&liChannelID=7&liFlavourID=1&sSearch=&nPage=1]http://www.computerweekly.co.uk/articles/article.asp?liArticleID=127212&liArticleTypeID=20&liCategoryID=1&liChannelID=7&liFlavourID=1&sSearch=&nPage=1[/url]

Read more

Check Point to buy Zone Labs for $205 million

Posted on December 15, 2003December 30, 2021 by admini

Working together, the two types of software can further help corporations defend themselves against attacks, the companies said.

More info: [url=http://zdnet.com.com/2100-1105_2-5124542.html]http://zdnet.com.com/2100-1105_2-5124542.html[/url]

Read more

EMC acquires server specialist VMware

Posted on December 15, 2003December 30, 2021 by admini

The move will help EMC reach further into the world of utility computing, a trend sweeping the industry as companies search for ways to make information technology easier to manage and more efficiently used, the Hopkinton, Mass.-based company said. Today, EMC is accelerating the convergence of these two worlds,” he said in a statement.

The acquisition indicates that EMC, which already has a major presence in large corporations, is trying to expand into the same advanced systems management area targeted by IBM, HP, Sun Microsystems, Microsoft and others.

VMware’s software lets a single server run multiple operating systems simultaneously on different “virtual machines,” a technology well developed in expensive mainframe computers, maturing in Unix servers, and now arriving in lower-priced machines based on Intel processors.

IBM’s and HP’s comfort working with a neutral start-up may not carry over to EMC, a competitor in the storage domain, Haff said.

More info: [url=http://zdnet.com.com/2100-1104_2-5124506.html]http://zdnet.com.com/2100-1104_2-5124506.html[/url]

Read more

Financial Security info center gets $2 million

Posted on December 14, 2003December 30, 2021 by admini

The center is one of many that industries and their government liaisons formed since 1998 to share vulnerability information and alerts when incidents occur that affect critical infrastructure, such as telecommunications and banking.

Money from Treasury will allow the center to expand to serve the entire financial industry, department officials said. By the end of fiscal 2005, officials expect that the center will be funded entirely by membership fees, which range from $750 to $50,000 per year. Upgrades include:
* Enhancing the network so it can serve more than 30,000 institutions.
* A secure forum for real-time information sharing.
* Physical data threats to the cyberthreat information.
* Web-based warnings and alerts service
* Setting more than 16 performance metrics
More info: [url=http://www.fcw.com/fcw/articles/2003/1208/web-fsisac-12-10-03.asp]http://www.fcw.com/fcw/articles/2003/1208/web-fsisac-12-10-03.asp[/url]

Read more

How the Internet Gives Consumers the Upper Hand

Posted on December 14, 2003December 30, 2021 by admini

Moreover, key decision makers and stakeholders—competitors, government agencies, the media, attorneys, current and former employees, and suppliers—are increasingly listening and referring to these online discussion communities for real-time insights.

Today, nearly 75% of consumers cite word-of-mouth recommendations as the most influential factor in their car-buying . In the space of a few short years, the Internet has evolved into a useful medium for particular kinds of commerce. After the dot-com hype of the 1990s, several car-buying Web sites emerged as some of the most popular of all Web destinations for consumers.

In addition to these quasi-official sites for information and opinions about vehicles, a parallel universe of Internet communities also sprang up where consumers freely shared information and informal opinions about all phases of the automotive experience—new-car attributes and drawbacks, subjective accounts about ownership, comparisons of competing vehicles, anticipation about new models, safety issues, product recalls, service problems, launch glitches and hassles with dealers.

These online communities, populated almost exclusively by consumers who love to talk about their cars, trucks and SUVs, have become an increasingly legitimate, albeit unstructured, source of car-related information in the eyes of all potential consumers.

Quite inevitably, this vast new storehouse of highly believable, unsolicited, unstructured information has begun to exercise huge infl uence on consumers’ behavior.

Left unmonitored and unchecked, these free-form and unstructured Internet discussions can both boost and harm automotive companies’ brand images, loyalty and satisfaction levels, product-quality perceptions, sales and profi ts.

As this paper will explore, these influential consumers, and the consumers and stakeholders they infl uence, are directly affecting the bottom lines of automotive manufacturers and dealers.

Of consumers who purchased a 2001 or 2002 vehicle, nearly 20% participated in online discussion groups before buying (Source: JD Power & Associates).

Consumers continue to rely on car companies and the automotive media for updated product information, auto reviews and new-model information, but more and more of them are looking to the Internet to narrow their choices and evaluate their options.

More info: [url=http://www.feedbackasp.com/whitepaper]http://www.feedbackasp.com/whitepaper[/url]

Read more

Changes to Functionality in Microsoft Windows XP Service Pack 2 Improve Security

Posted on December 12, 2003December 30, 2021 by admini

The technologies include:

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 11
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme