Monthly Archives: October 2006

Mac OS Bluetooth exploit – Inqtana.d

Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Records Management Reduces Risk

Records are paper or digital documents or forms that provide evidence of the activities of organisations and individuals. They are created during normal business activities, and are maintained to comply with regulations and to support operations. Capturing, maintaining and keeping records mean that essential information is available to safeguard the organisation’s interests.

To file archive or not to file archive?

New independent research, the second annual BridgeHead Software Information Lifecycle Management (ILM) Audit, confirms that significant IT data growth continues unmitigated.

ScriptLogic Corporation ranked number 188 fastest growing technology Company in North America on Deloitte’s 2006 Technology Fast 500

ScriptLogic Corporation, a leader in network administration software for Microsoft Windows-based networks, today announced that it ranked Number 188 on the 2006 Deloitte Technology Fast 500, a listing of the 500 fastest growing technology companies in North America. Rankings are based on percentage revenue growth over five years, from 2001-2005.

AppSecInc extends AppRadar to support Oracle on Linux

Application Security has announced Oracle on Linux support in AppRadar – the comprehensive database activity monitoring and security auditing solution. AppSecInc made the announcement in conjunction with Oracle OpenWorld, taking place this week at the Moscone Center in San Francisco.

Astaro showcases beta version of Astaro Security Gateway V7

Astaro Corporation displayed a beta release of Astaro Security Gateway V7 at the Munich trade show Systems 2006. Transparent email encryption, a new graphical user interface, sophisticated bandwidth management, and automatically configurable high availability mechanisms are the main innovations of the latest release.

Safend Protector 3.0 Review

Today’s enterprises characterized by a proliferation of easily accessible computer ports, such as USB and PCMCIA. In addition, a variety of communication adapters such as wireless and Bluetooth and other storage devices such as digital cameras, smart phones and PDAs all enable effortless access to endpoints.

Less Than Zero Threat, part 2

In part 1, we introduced the idea of a Less-Than-Zero threat and defined it relative to a Zero-Day threat. Now, I´ll go a little deeper on each and discuss ways to protect your organization from them.

Less Than Zero Threat, Part 1

The security industry and trade press have directed a lot of attention toward the “Zero-day attack,” promoting it as THE threat to guard against. According to the marketing hype, the Zero-Day attack is the one that you should most fear, so you must put in place measures (i.e., buy stuff) to defend your organization from… Read More »