Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

‘Secure cloud’ on the horizon for Microsoft

Posted on October 26, 2004December 30, 2021 by admini

An announcement from Redmond on Tuesday indicated that its Live Communications Server 2005 software will let companies encrypt their instant-messaging communications internally and link IM systems between companies so that suppliers and other business partners can share secure IM connections. Additionally, Live Communications Server, or LCS, will include an option for letting companies link to public instant-messaging networks from Microsoft, America Online and Yahoo, so that employees can chat with users on the Big Three IM services.

LCS has become a cornerstone of Microsoft’s efforts to expand its Office line beyond a collection of productivity applications. By integrating LCS into Office, Microsoft hopes to imbue a variety of applications — especially its Outlook email software — with “presence”, or the ability to intelligently route communications based on a worker’s location or availability.

Presence works by using information in people’s applications to know their whereabouts. For example, if Outlook’s calendar shows that a person is in a meeting, it can route voice calls to that person’s cell phone. Or if someone sends an IM to a user, the software can then prompt a Net phone call and record a voice message.

Microsoft said the new release of LCS will also improve secure remote access to presence and instant-messaging capabilities, using standard firewall ports instead of virtual private network, or VPN, connections.

Last week, Microsoft announced new corporate instant-messaging client software, code-named Istanbul. The software resembles the Windows Messenger software that’s currently found in Windows XP. The difference is that, with Istanbul, a user’s IM information is synchronised with Outlook’s calendar and scheduling information. Istanbul also connects to desk phones and serves up an alert when someone calls.

http://news.zdnet.co.uk/internet/security/0,39020375,39171537,00.htm

Read more

Mind those IMs–your cubicle’s walls have eyes

Posted on October 25, 2004December 30, 2021 by admini

But now employers are going further than ever, thanks to technology that can capture e-mail and instant messaging conversations, or record a worker’s every keystroke. Websense, a maker of Internet monitoring tools, has seen its stock price nearly double in the last year, though it saw some gains erased late last week. Other top players in the market include SurfControl and Secure Computing.

“I think all these companies are seeing great demand,” said Katherine Egbert, an analyst with Jefferies & Co. “Lately, regulatory compliance issues, and deadlines for meeting those regulations, have been driving sales.” The regulatory factors include financial reporting rules under the Sarbanes-Oxley Act and health care privacy mandates set forth in the Health Insurance Portability and Accountability Act, also known as HIPAA. Liability concerns regarding employee e-mails and IMs are also on the rise, as lawyers increasingly turn to computer records as evidence in sexual harassment suits and other legal actions involving the workplace.

Even tech luminaries, such as Microsoft Chairman Bill Gates, have used corporate networks to send e-mail that proved embarrassing in court.

“Productivity is a concern; loss of confidential information is still a concern; security breaches are a concern. Employers are afraid of being sued,” said Nancy Flynn, executive director of the ePolicy Institute, which, together with the American Management Association (AMA), recently published a survey on e-mail and IM surveillance in the workplace. “In almost every workplace lawsuit being filed today, e-mail is being subpoenaed as evidence,” Flynn said.

“IM will soon be subpoenaed on a regular basis as well.”

Aiming at IM According to the ePolicy-AMA survey, 60 percent of U.S. companies now use software to monitor incoming and outgoing external e-mail, while 27 percent of employers use software to track internal e-mail between employees. By contrast, employers have been relatively slow to monitor instant messaging, with just 10 percent of companies surveyed indicating they have taken steps to listen in on desktop chat. “Employers think IM is an emerging technology and they don’t have to monitor it yet,” Flynn said. “But if they have employees in their 20s, chances are (those employees) probably have been using IM since high school and view it as old technology.

And if a company doesn’t provide enterprise IM, (workers will) probably go out on the Internet and download a free version.”

IM giants America Online and Yahoo launched plans two years ago to offer corporate versions of their IM products, promising better security, along with regulatory compliance features not found in their free versions. Both have since scaled back those plans, but other companies have stepped in to fill the void, including industry titans such as Sun Microsystems and IBM, which are embedding their own IM products into their existing applications, and smaller companies such as IMLogic, FaceTime Communications and Akonix.

“Industry estimates say that by the end of 2005, IM in the workplace will surpass e-mail in the workplace,” Flynn said. “IM is coming on fast, and given that, employers need to take the necessary steps now with their policies and monitoring software.”

Monitoring software downloads is a top issue as well, industry observers and legal experts say.

In 2002, an Arizona company paid $1 million to settle a lawsuit with the recording industry that charged copyright violations involving MP3s stored on the company’s computer systems.

Customers such as PepsiCo and Ford Motor use Websense software to track and report employee Internet usage, block access to some Web pages, and set temporary access windows that limit the times some sites are available. Many corporations have adopted policies banning file-swapping software in the office and installed network traffic management software to track down potential violators.

Despite hot prospects, the industry has not seen a flood of new players. Instead, it has seen a rise in consolidation, particularly this year, Jeffries analyst Egbert said. Among recent deals, Blue Coat purchased Cerberian, CyberGuard acquired Webwasher, and Internet Security Systems bought Cobion.

Courts have generally found that employers have the right to monitor equipment that they own on their premises, including telephones and computer systems. Nevertheless, laws surrounding the monitoring of employees’ electronic communications are not as cut-and-dried as they appear, legal experts say. The law, on the face of it, looks like it’s illegal. But the courts have ruled that viewing stored e-mail is not considered a violation of the wiretap laws,” said attorney Philip Gordon, chairman of the privacy practice group for law firm Littler Mendelson. In one U.S. Court of Appeals case, the court further detailed how it is only considered a violation of the Wiretap Act if an e-mail is intercepted while it is traveling through the network pipe and is between two points.

http://news.zdnet.com/2100-1040_22-5423220.html?part=rss&tag=feed&subj=zdnet

Read more

New I.B.M. Report Will Warn of Computer Security Threats

Posted on October 25, 2004December 30, 2021 by admini

The report, to be named the Global Business Security Index, is intended to give computing managers early warning of a range of computer vulnerabilities like attacks by malicious hackers, automated softwares, viruses and worms, as well as to gauge the impact of political upheavals and natural disasters.

The index will be generated from data gathered by 2,700 International Business Machines information security employees and a global network of about a half-million sensors – software programs and security hardware distributed to its customers and its own networks in 34 countries.

The index will be released on I.B.M.’s Web site and will be part of a broader service known as the I.B.M. Security Threats and Attack Trends, or STAT, report, which the company offers customers at a cost of about $10,000 a year.

That service is also produced by I.B.M.’s Security Intelligence Services, a group that is part of its managed computing services unit and is based on a corporate campus in Boulder, Colo.

“We alert customers to trends,” said Alfred Huger, Symantec’s senior director. “The security landscape today is totally different,” said David Mackey, a former army intelligence analyst who now directs the company’s Security Intelligence Services.

The I.B.M. security executives said they had also seen a 15 percent increase in the past month in the percentage of network attacks against critical infrastructure providers – computer network sites that government agencies and companies use to provide essential services.

Industry analysts who track the computer security industry said reports like those provided by I.B.M. and Symantec were useful to corporations attempting to protect themselves from attacks over the Internet.

“An early-warning-type system would be a benefit to an organization,” said Allan Carey, a senior research analyst for International Data Corporation, a research firm for the computer industry.

“There is a time gap that occurs, and generally the awareness of a hole is made and all of a sudden it’s a rush against time to fix the hole,” said Gregg Mastoras, a senior security analyst at Sophos, an antivirus and antispam firm.

http://www.nytimes.com/2004/10/25/technology/25ibm.html?ex=1099281600&en=2cc6057987b06308&ei=5040&partner=MOREOVER

Read more

Microsoft reworks antispam spec to silence critics

Posted on October 25, 2004December 30, 2021 by admini

The software giant said that it has rewritten Sender ID–a specification for verifying the authenticity of e-mail with Internet Protocol records–to address criticisms of the spec’s earlier incarnation.

Among other changes, Microsoft removed language in its pending patents for SenderID that could have included claims to Sender Permitted From, or SPF, a widely used system for e-mail authentication that was merged with Microsoft’s CallerID for Email to create Sender ID, according to Microsoft’s Ryan Hamlin.

“We wanted to complete what we started,” said Hamlin, general manager for Microsoft’s safety technology and strategy group.

Microsoft has resubmitted the specification to the Internet Engineering Task Force, a technical standards body.

Last month, the IETF shut down the working group that was charged with building consensus for Sender ID and turning it into an industry standard. Consensus became impossible after some people in the open-source community said Microsoft’s patent claims could enable the software company to eventually charge royalties. Others were critical of the system’s inability to work with previously published records in SPF. As a result, America Online and open-source groups pulled their support of Sender ID. And Meng Wong, the architect of SPF, said he would retrench on his technical specification alone.

Microsoft’s Hamlin said Monday that the company has revised Sender ID by making it backward-compatible with 100,000-plus SPF records already published. He also said Sender ID will give e-mail providers a choice to publish records in SPF, which verifies the “mail-from” address to prevent fraud, or in PRA–purported responsible address. PRA records let an e-mail provider check the “display address” of an e-mail in its headers against the numerical IP address of the sender. That process can prevent so-called phishing attacks by spammers who forge the display address. E-mail providers and senders now have the ability to publish in and check the authenticity of e-mail with both methods in Sender ID.

“We’ve been trying to make it as user-friendly as possible. We’ve got the spec to the point where you only have to publish one record for two purposes. I see that as a little victory,” said Wong.

Still, some people in the open-source community are concerned about Microsoft’s other pending patent over Sender ID, which prevents users of the specification from sublicensing it.

AOL said Monday that it has renewed support for Sender ID in its current form. The IETF has granted Sender ID “experimental” status so that the industry can test it, along with competing e-mail authentification proposals, and build consensus that way.

http://news.com.com/Microsoft+reworks+antispam+spec+to+silence+critics/2100-1032_3-5426045.html?part=rss&tag=5426045&subj=news.1032.5

Read more

Check Point Beefs Up Protections For Insider Attacks

Posted on October 22, 2004December 30, 2021 by admini

InterSpect 2.0 provides a new spate of solutions to fight worms and viruses and offers network zone segmentation for quarantining problems.

It was expected to be available to solution providers immediately.

According to Tamir Hardof, product marketing manager at the Redwood City, Calif., vendor, the new InterSpect also incorporates further integration with the Check Point Integrity end-point security solution to safeguard networks from attacks introduced inside the network.

The new tool boasts one-click SmartDefense antivirus updates, as well as proactive protection that can recognize and stop the spread of e-mail worms by restricting messages delivered to the network using POP3/IMAP protocols, he said.

Customers also can manage and deploy these offerings from Check Point’s Smart management architecture, and view InterSpect 2.0 logs in the company’s SmartCenter console for easier management of enterprisewide deployments.

http://www.securitypipeline.com/news/51000450;jsessionid=VZQEJTC2HNHI0QSNDBCCKHSCJUMEKJVN

Read more

IT chiefs use scare tactics to tighten security

Posted on October 21, 2004December 30, 2021 by admini

The poll of IT network and security administrators in SMEs to determine how they persuade management to change security practice found that almost half of respondents admit to advocating the fear factor. Many respondents indicated that they have to present worst case scenarios involving confidentiality breaches, lost customers or liability charges to justify investments in information security technology.

The use of scare tactics may be prompted by the fact that, according to additional findings from the poll, more than one in four (29 per cent) network administrators claim that senior management rarely, or never, change standard practices in response to security recommendations alone.

However, an encouraging 30 per cent indicated that rational facts, including cost-based analysis, productivity statistics and industry articles, are sufficient to prompt a reaction.

Additionally, 51 per cent of respondents reported that senior management implement changes to security practices based on their recommendations most or all of the time.

“This survey shows that SMEs can vary greatly in their approach to security. Despite high profile attacks and regulatory pressure, a strong security-conscious culture is still not second nature to all organisations,” said Mark Stevens, chief strategy officer at WatchGuard. “While many organisations treat security as a priority from the top down, and are very proactive in their approach, others require more persuasion to implement and update secure practices. To protect against the threat of attack, executive sponsorship is critical. Organisations need to adopt an approach that incorporates not only technology solutions, but ongoing user education as well as development and enforcement of security policies.”

http://www.vnunet.com/news/1158895

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme