Monthly Archives: December 2006

Stellar Data Recovery Products Are A Hit Among 97% Of Its Customers

Stellar Information Systems Ltd. today revealed that about 97% of its customers were satisfied or extremely satisfied with their data recovery product performance. Stellar conducted a survey and the overall objective of the study was to gain a strong understanding of how well are the Stellar products performing in the minds of their customers. The… Read More »

Silver Bullet for Compliance

Once again it´s down to the IT manager to manage the policies and ensure that they are followed whilst not hampering the productivity of users. Thankfully automated tools can now help in this task and can restrict the use of specific applications or services and track application usage on a by-PC basis.

Silver Bullet for Compliance

The rise of life-style technologies, such as the ubiquitous iPod, has also given birth to a new type of security threat via the USB port. MP3 players are in reality portable memory devices, which are capable of downloading and storing vast amounts of data from a corporate network – as is every laptop.

Silver Bullet for Compliance

No-one in business today can be unaware of the compliance challenges facing the IT team in protecting company assets and processes. The statistics are clear, abundant and all around us, leaping from headlines on a daily basis; massive financial losses associated with security non-compliance are commonplace, as are high-profile court cases about staff misuse of… Read More »

Akonix Security Center Publishes IM Threat Watch for July 2006

Akonix Systems, the provider of the most deployed instant messaging (IM) security and compliance products in the world, today announced its Security Center (www.imsecuritycenter.com) researchers tracked 16 attacks against IM networks in July, bringing the total number of attacks during 2006 to 127.

The security risk in Web 2.0

Web 2.0 is causing a splash as it stretches the boundaries of what Web sites can do. But in the rush to add features, security has become an afterthought, experts say. The buzz around the new technology echoes the ´90s Internet boom–complete with pricey conferences, plenty of start-ups, and innovative companies like MySpace.com and Writely… Read More »

Learning to Detect Phishing Emails

Phishers launched a record number of attacks in January 2006, as reported by the Anti-Phishing Working Group. These attacks often take the form of an email that purports to be from a trusted entity, such as eBay or PayPal. The email states that the user needs to provide information, such as credit card numbers, identity… Read More »

Bypassing Oracle dbms_assert

By using specially crafted parameters (in double quotes) it is possible to bypass the input validation of the package dbms_assert and inject SQL code. This makes dozens of already