Teldata.Wordpress.com | ParagonHost.com

April 27, 2009

Technology Updates: 04/27/09

Filed under: Dave Safley, Internet, Networks, Security Focus, Technology, Telecom — paragon @ 10:39 pm

Safend, today announced a new release of Safend Encryptor, a hard-disk encryption solution that is a component of the Safend Data Protection Suite.

http://safend-security.blogspot.com/2009/04/safend-announces-safend-data-protection.html

 

VMware, Inc. today announced VMware vSphere™ 4

http://vmware-software.blogspot.com/2009/04/vmware-unveils-industrys-first.html

 

Check Point Software Technologies Ltd. today announced a new high-end Power-1 series of Power-1 11000

http://checkpoint-security.blogspot.com/2009/04/check-point-introduces-new-high-end.html

 

WatchGuard Technologies today unveiled its new operating system for WatchGuard security appliances – WatchGuard Fireware XTM

http://watchguard-guardsite.blogspot.com/2009/04/watchguard-sets-new-standard-for.html

 

eEye Digital Security today announced the general availability of Blink Server 4

http://eeye-security.blogspot.com/2009/04/new-eeye-blink-server-4-edition-to.html

 

ZyXEL Communications Inc , today announced a high-end addition to its already powerful line of Unified Threat Management (UTM) products, the ZyWALL USG2000.

http://zyxelguard.blogspot.com/2009/04/zyxel-introduces-high-end-unified.html

 

FaceTime Communications today introduced FaceTime Insight™,

http://facetime-security.blogspot.com/2009/04/facetime-introduces-powerful.html

 

Marshal8e6 has today announced the acquisition of Avinti

http://8e6-security.blogspot.com/2009/04/rss-feed-of-news-from-marshal8e6.html

 

Virtual Graffiti, Inc

http://www.VirtualGraffiti.com

 

ParagonHost

http://www.ParagonHost.com

April 23, 2009

Internet Security Trends – Conficker Worm Expected to Influence Rise in Spam

Filed under: Networks, Security Focus, Technology — paragon @ 12:30 am

Internet Security Trends – Conficker Worm Expected to Influence Rise in Spam

 

As a provider of messaging and Web security technology, Commtouch released their most current quarterly “Internet Threat Trends” report last week. The report forecasts how computers infected by the Conficker worm could cause a meaningful rise in spam levels during the next quarter. Analysts report that around 15 million computers on a global scale have already been infected by multiple versions of the worm to date.

Here are the Q1 highlights at a glance:

  • The Conficker worm infected more than 15 million computers since its first appearance last Fall.
  • Loan spam jumped to the top of the list of top spam topics, with 28% this quarter.
  • Users of social networking sites fell victim to new, more complex phishing attacks.
  • Computers/Technology sites and Search engines/Portals are among the top 10 Web site categories infected with malware and/or manipulated by phishing.
  • Brazil continues to lead in zombie computer activity, producing nearly 14% of zombies for the quarter.
  • Spam levels averaged 72% of all email traffic throughout the quarter and peaked at 96% in early January. It then bottomed out at 65% in February.
  • Spammers attacked large groups of an ISP’s users and moved to the next ISP in a targeted spam outbreak.
  • An average of 302,000 zombies were activated each day for the purpose of malicious activity.

Download the full in depth report here.

Source: Commtouch

 

ParagonHost

http://www.ParagonHost.com

 

Virtual Graffiti

http://www.VirtualGraffiti.com

April 18, 2009

All the week’s news and views about Security, 04/16/09

All the week’s news and views about Security, 04/16/09

Botnets: Reasons It’s Getting Harder to Find and Fight Them
http://www.networkworld.com/nlsecuritynewsal192072

 

The perpetual proliferation of botnets is hardly surprising when
one considers just how easy it is for the bad guys to hijack
computers without tipping off the users.Read full story
http://www.networkworld.com/nlsecuritynewsal192072

Senior Editor Ellen Messmer covers security for Network World.
E-mail Ellen mailto:emessmer@nww.com .

_______________________________________________________________
This newsletter is sponsored by Oracle
The Cost of Securing your Database

Make the most of IT security and compliance dollars by ensuring
your databases are secure. Get concrete tips and recommendations
in this Live Webcast sponsored by Oracle, scheduled for
Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn
how to cost-effectively safeguard sensitive and regulated
information. Register for this Live Webcast now.
http://adserver.fattail.com/redir/redirect.asp?CID=296041
_______________________________________________________________
Responsible for building a resilient data center Then don’t miss
Network World’s one-day conference and expo devoted to best
practices and new solutions. Hear top analysts. Meet key vendors.
Coming to 10 cities in ’09 including Boston in May and Atlanta in
June. Register now to attend free: Visit
http://www.nww.com/rpgx.jsp?c=XU1PTA1012Z4303.

_______________________________________________________________

 

RELATED EDITORIAL LINKS

Stealthy rootkit slides further under the radar
http://www.networkworld.com/nlsecuritynewsal192073  Thousands of
Web sites have been rigged to deliver a powerful piece of
malicious software that many security products may be unprepared
to handle.

Oracle delivers major security patch update
http://www.networkworld.com/nlsecuritynewsal192074  Oracle
released 43 security fixes on Tuesday for a range of
applications, including its flagship database, Oracle
Application Server, E-Business Suite, PeopleSoft Enterprise and
WebLogic Server.

UC security: When the shoe doesn’t fit – compress the foot
http://www.networkworld.com/nlsecuritynewsal192075  If your
security model is location-centric and depends on keeping things
separate, how do you respond to a disruptive technology like
unified communications? This is a pattern that keeps repeating
in many different areas: the security paradigm looked good until
a technology comes along, changes the assumptions and reveals
the inadequacy of the model.

CDT: Privacy, transparency needed in cybersecurity policy
http://www.networkworld.com/nlsecuritynewsal192076  U.S.
President Barack Obama’s administration and Congress will have
to address major civil liberties and transparency concerns as
they create new policies to tackle ongoing cybersecurity
vulnerabilties in the government and private industry, a digital
rights group said.

Human ear could be next biometric system
http://www.networkworld.com/nlsecuritynewsal192077  British
scientists are investigating the viability of a new biometric
technique that would make use of the human ear as a way for a
third party to identify the person they are speaking to.

Deleted Data Drives New Data Breaches
http://www.networkworld.com/nlsecuritynewsal192078  According to
a new report on data breaches from Verizon Business, cyber
criminals are no longer attacking where the credit card files
are, but where they once were.

Encrypt more data with latest SecuriKey version
http://www.networkworld.com/nlsecuritynewsal192079  When last we
heard from the folks at GT SecuriKey, the makers of the
hardware-software combo for securing laptops had just come out
with a bundle aimed at mobile Mac users who also ran Windows on
their portables via Boot Camp. Now the cross-platform data
security company is updating all of its Mac offerings, with
enhanced data encryption features in the latest version of
SecuriKey.

Top Trends: Patch Management
http://www.networkworld.com/nlsecuritynewsal185732  Find out how
patch-management products work, and what they can do for you, in
this Product Guide.

April giveaways http://www.networkworld.com/community/node/40434
galore
Cisco Subnet http://www.networkworld.com/subnets/cisco/
andMicrosoft Subnet
http://www.networkworld.com/subnets/microsoft/  are giving away
training courses from Global Knowledge, valued at $2,995 and
$3,495, and have copies of three hot books up for grabs:CCVP
CIPT2 Quick Referenceby Anthony Sequeira,Microsoft Voice Unified
Communicationsby Joe Schurman andMicrosoft Office 2007 On
Demandby Steve Johnson.Deadline for entries
http://www.networkworld.com/community/node/40434  April 30.

Network World on Twitter  http://twitter.com/NetworkWorld  Get
our tweets and stay plugged in to networking news.
TOP STORIES | MOST DUGG STORIES
       http://www.networkworld.com/nlsecuritynewsal192080

1. NASA takes Ethernet deeper into space
       http://www.networkworld.com/nlsecuritynewsal192081

2. EBay to spin off Skype by mid-2010
       http://www.networkworld.com/nlsecuritynewsal192082

3. Microsoft’s Patch Tuesday filled with zero-day exploits
       http://www.networkworld.com/nlsecuritynewsal192083

4. Fact-checking the fact-checkers: Snopes.com gets an ‘A’
       http://www.networkworld.com/nlsecuritynewsal192084

5. Managing IP addresses with free tools
       http://www.networkworld.com/nlsecuritynewsal192085

6. Exchange 2010: Sneak peek
       http://www.networkworld.com/nlsecuritynewsal192086

7. Breakthrough enables Terabit Ethernet
       http://www.networkworld.com/nlsecuritynewsal192087

8. 15 nifty BlackBerry apps for IT pros
       http://www.networkworld.com/nlsecuritynewsal192088

9. Exchange 2010 beta leads kickoff of new Office lineup
       http://www.networkworld.com/nlsecuritynewsal192089

10. Recession resistant: 10 technologies CIOs are still buying
       http://www.networkworld.com/nlsecuritynewsal192090

       http://twitter.com/NetworkWorld

MOST-WATCHED VIDEO1. Students learn through robot battles
       http://www.networkworld.com/nlsecuritynewsal192091
_______________________________________________________________
This newsletter is sponsored by Oracle
The Cost of Securing your Database

Make the most of IT security and compliance dollars by ensuring
your databases are secure. Get concrete tips and recommendations
in this Live Webcast sponsored by Oracle, scheduled for
Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn
how to cost-effectively safeguard sensitive and regulated
information. Register for this Live Webcast now.
http://adserver.fattail.com/redir/redirect.asp?CID=296041
_______________________________________________________________

April 15, 2009

Twitter Worm Attack Continues: Here’s How to Keep Safe

Filed under: Internet, Networks, Security Focus, Technology — paragon @ 9:21 pm
All the week’s news and views about Security, 04/14/09
Twitter Worm Attack Continues: Here’s How to Keep Safe
http://www.networkworld.com/nlsecuritynewsal191582
The malicious worm affecting Twitter over the weekend has now
mutated and continues to invade the popular micro-blogging
network. Although Twitter is taking action against the problem,
security analysts fear that further mutations of the worm will
continue to wreak havoc on the network over the week.Read full
story  http://www.networkworld.com/nlsecuritynewsal191582
Senior Editor Ellen Messmer covers security for Network World.
E-mail Ellen mailto:emessmer@nww.com .
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Network Management Solutions in your backyard. Answers are as close
as the IT Roadmap event in your area. You can ask questions,
compare quotes, and gain a year’s worth of direction in less than a
day. Coming to 10 cities in ’09 including Boston in May and Atlanta
in June. Qualify to attend free at
http://www.nww.com/rpgx.jsp?c=XU1PTB1012Z4303.
_______________________________________________________________
RELATED EDITORIAL LINKS
Twitter wrestles with fourth worm attack
http://www.networkworld.com/nlsecuritynewsal191583  Another worm
attack early Monday on Twitter kept the micro-blogging Web
service chasing down infected accounts and deleting rogue
tweets.
Weekend worms strike Twitter, teen admits responsibility
http://www.networkworld.com/nlsecuritynewsal191584  Twitter was
hit with at least three different worm attacks that started
Saturday and continued into Sunday, the micro-blogging service
acknowledged as it promised users it would review its coding
practices.
1 in 5 Windows PCs still hackable by Conficker
http://www.networkworld.com/nlsecuritynewsal191585  Although the
media blitz about the Conficker worm prompted a significant
number of enterprise users to finally fix a six-month-old
Windows bug, about 1 in 5 business computers still lack the
patch, a security company said Monday.
Botlab keeping an eye on spamming botnets
http://www.networkworld.com/community/node/40855  University of
Washington researchers have developed a prototype system called
Botlab that monitors botnets to gain insight into a major
generator of spam.
Does Social Networking Require User Policy Changes?
http://www.networkworld.com/nlsecuritynewsal191586  IT security
administrators have had a fairly easy case to make against such
social networking sites as Myspace in the past. Myspace in
particular tends to be a place for the mostly personal, and some
profiles are simply front companies for online mobsters and
malware pushers.
PCI security rules may require reinforcements
http://www.networkworld.com/nlsecuritynewsal191587  The PCI
standard, long touted as one of the private sector’s strongest
attempts to regulate itself on IT security, is increasingly
being slammed by critics who claim that the rules aren’t doing
enough to protect credit and debit card data.
Can the status quo threaten your LAN?
http://www.networkworld.com/nlsecuritynewsal191588  In times of
economic crisis people tend to seek the safety and security of
the status quo. “Doing what you’ve always done, and what
everyone else is doing, is the most prudent course,” goes the
thinking.
Security Tops IT Budget Priorities
http://www.networkworld.com/nlsecuritynewsal191589  Security is
on the minds of American companies and many are still making
room in their budgets to invest in IT security initiatives,
according to a survey released Monday by Robert Half Technology.
Trend Micro dishes out security smorgasbord
http://www.networkworld.com/nlsecuritynewsal191590  Trend Micro
Monday dished out a smorgasbord of endpoint security products
that put the focus on Trend’s cloud-based architecture and its
partnership with systems-management vendor BigFix.
RSA upgrades data leak prevention suite
http://www.networkworld.com/nlsecuritynewsal191591  EMC’s RSA
division Monday announced an upgraded version of its data-leak
prevention suite, adding over twenty policy templates for
recognizing personal identifiable information in countries
around the world, including Spain and New Zealand.
Podcast: Prepping for Tougher Health Data Rules
http://www.networkworld.com/nlsecuritynewsal191592  As part of
the recent stimulus bill, the HITECH Act will create standard
electronic health records for every American by 2014, as well as
introduce strict new rules for the protection of these health
records. John Linkous from eIQnetworks discusses the components
of the act and how IT can start preparing now for the new
standards. (10:12)
User education key to IT security: Microsoft
http://www.networkworld.com/nlsecuritynewsal191593  With the
release of its latest Security Intelligence Report, Microsoft is
encouraging its partners and customers to become more security
aware and educated, as new attack tactics are on the rise.
Top Trends: Patch Management
http://www.networkworld.com/nlsecuritynewsal185732  Find out how
patch-management products work, and what they can do for you, in
this Product Guide.
April giveaways http://www.networkworld.com/community/node/40434
galore
Cisco Subnet http://www.networkworld.com/subnets/cisco/
andMicrosoft Subnet
http://www.networkworld.com/subnets/microsoft/  are giving away
training courses from Global Knowledge, valued at $2,995 and
$3,495, and have copies of three hot books up for grabs:CCVP
CIPT2 Quick Referenceby Anthony Sequeira,Microsoft Voice Unified
Communicationsby Joe Schurman andMicrosoft Office 2007 On
Demandby Steve Johnson.Deadline for entries
http://www.networkworld.com/community/node/40434  April 30.
Network World on Twitter  http://twitter.com/NetworkWorld  Get
our tweets and stay plugged in to networking news.
TOP STORIES | MOST DUGG STORIES
       http://www.networkworld.com/nlsecuritynewsal191594
1. Conficker awakens, starts scamming
       http://www.networkworld.com/nlsecuritynewsal191595
2. Microsoft eating up U.S. and global netbook markets
       http://www.networkworld.com/nlsecuritynewsal191596
3. Bill would give Obama power to shut down Internet
       http://www.networkworld.com/nlsecuritynewsal191597
4. Are you an IT geezer? (and we mean that in a good way)
       http://www.networkworld.com/nlsecuritynewsal191598
5. A Twitter virus shows up: StalkDaily
       http://www.networkworld.com/nlsecuritynewsal191599
6. The 10 worst Microsoft product names of all time
       http://www.networkworld.com/nlsecuritynewsal191600
7. Netbook computers spark corporate interest
       http://www.networkworld.com/nlsecuritynewsal191601
8. Conficker, the Internet’s No.1 threat, gets an update
       http://www.networkworld.com/nlsecuritynewsal191602
9. The implications of Skype’s free software application for
iPhone  http://www.networkworld.com/nlsecuritynewsal191603
10. Fear and loathing in Windows 7: Testing Branch Cache using
Linux   http://www.networkworld.com/nlsecuritynewsal191604
MOST-WATCHED VIDEO1. Students learn through robot battles
       http://www.networkworld.com/nlsecuritynewsal191605
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
ARCHIVE LINKS
Network Security Research Center
http://www.networkworld.com/topics/security.html  : For breaking
security news, news analysis, blogs, newsletters, product tests,
and more.
Security Strategies Newsletter
http://www.networkworld.com/newsletters/sec/index.html  :
Norwich University Associate Professor M. E. Kabay takes the
long view of security issues and resources for ensuring your
network, computer and facilities remain secure. View the archive
and to sign up for the newsletter here
http://www.networkworld.com/newsletters/sec/index.html
_______________________________________________________________
BONUS FEATURE
Accurately Troubleshoot your Apps. Optimize your application
troubleshooting efforts with the best practices described in this
whitepaper, “Application Troubleshooting Guide.” Eliminate finger
pointing between departments. Find out how to isolate the source of
application performance problems and what to look for when
troubleshooting. Get all of the details today.
http://www.nww.com/rpgx.jsp?c=XU1PTA1013Z4161 Download this
whitepaper now.
_______________________________________________________________
PRINT SUBSCRIPTIONS AVAILABLE
You’ve got the technology snapshot of your choice delivered to
your inbox each day. Extend your knowledge with a print
subscription to the Network World newsweekly, Apply today at
http://www.subscribenw.com/nl2
http://www.networkworld.com/nlsecuritynewsal166186
International subscribers, click here:
http://www.subscribenw.com/dp30
https://www.subscribenww.com/cgi-win/nww.cgi?paid&p=ADP608NW
_______________________________________________________________
ParagonHost
The Spam Busters
Virtual Graffiti

Blog at WordPress.com.