Novell vows first identity management for cloud, virtualized apps Virtualization and cloud computing has taken off, despite strong lingering concerns over how companies can secure and manage those apps and data. Novell Inc. says it can help. Virtual satellite cluster technology gets $75M blast Scientists building the complex space technology that will replace traditional spacecraft with clusters of wirelessly-interconnected satellite modules got an almost $75 million infusion from the How to fight malware Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks. Network IPS tests reveal equipment shortcomings An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs. How we tested antimalware gateways We primarily looked for the ability to identify and block malware (such as keystroke loggers, browser hijackers, bots, adware, rootkits, dialers, data miners and trojans). The ability to correctly recognize and thwart phishing attempts was also important. We established a variety of corporate policies regarding Internet access, and we expected the gateway products would enforce them. TCP RESET: Pros and Cons A clever anti-malware gateway can achieve zero latency by using a span/tap port to inspect Internet traffic for malware and malware references (in contrast to inline inspection). How to remove rootkits by hand Manually removing rootkit-based malware can be extremely difficult. You can't delete the offending Registry entries because the malware process is running. You halt the malware process, but Windows restarts the malware before you can delete the Registry entries. Many rootkits also set the Registry entries' owner to someone other than the user, thus complicating things further. DoorStop X Security Suite 2.3 A firewall by its very definition is, "any barrier that is intended to thwart the spread of a destructive agent." When it comes to your Mac, that "destructive agent" is anyone on the Internet or your local network who wants to gain unauthorized access to your computer and data. DoorStop X Security Suite is a collection of three tools designed to leverage your Mac's built-in firewall, help you understand how others are trying to access your computer, and to help you understand how to keep your Mac secure. 20 mobile trends and future technologies Spokespeople from Info-Tech Research Group Ltd., Advanced Micro Devices Inc., Sony Corp. and Research in Motion Ltd. provided food for thought on upcoming uses for mobile devices at a Technology Town Hall meeting in Toronto Tuesday. Fortinet secures remote and branch office environments Fortinet, a network security and unified threat management (UTM) solutions provider, has launched a new FortiGate multi-threat security appliance for remote office and branch office (ROBO) environments. Today from the Subnet communities On Cisco Subnet: Oracle, Sun, and the Identity Management Waiting Game and An Early Gift for MySQL servers; On Microsoft Subnet: Running Windows 7 on a Mac; On Google Subnet: Will Google be left in the dark over white spaces? Network World on Twitter? You bet we are |
No comments:
Post a Comment