SurfControl (London: SRF), the leading provider of global on-demand, network and endpoint IT security solutions, and Akamai Technologies, (Nasdaq: AKAM), the leading global service provider for accelerating content and business processes online, today announced that SurfControl has moved its product download and threat list updates to Akamai’s infrastructure.
SurfControl has announced that SurfControl’s MailControl has been awarded Anti-Spam Premium Checkmark Certification from West Coast Labs. This level of certification is awarded to solutions that have a spam capture rate of more than 97 percent and SurfControl MailControl successfully identified over 99 percent.
Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines on high risk infectors we are still seeing an increasing overall number of malware infections, it is this new… Read More »
StillSecure invited a who’s who list of vulnerability management gurus to come together and talk about the past, present and future of vulnerability management.
According to GFI, a leading provider of network security, content security and messaging software, every IT manager should make it part of their New Year’s Resolution to protect their networks from the following threats in 2007.
A recent report outlining the threat to US defence security reveals that hacking attempts have gone up by 43 per cent. The desire, of hackers, to obtain and thereby steal or corrupt technology design data could have terrifying results should this information fall into the ‘wrong hands’.
Administrative accounts are not the only problem: many Web applications and Web application frameworks create default users during installation. If the site administrator does not remove these default users or at least change their passwords, these accounts will be easy targets for a dictionary attack. Finally, when users are allowed to choose their own usernames,… Read More »
To understand and then combat a brute force attack, also known as a dictionary attack, we must start by understanding why it might be an appealing tool for a hacker. To a hacker, anything that must be kept under lock and key is probably worth stealing. If your Web site (or a portion of it)… Read More »
Throughout 2007 IT will need to prepare itself for an onslaught of unmanaged IP enabled devices as millions of users plug in new computers, USB drives, music/video players, handheld mobile devices, and even the stray game console into enterprise networks. In addition to new shiny objects, many users install applications like iTunes, VoIP, multi-player games,… Read More »
There has recently been considerable alarm about the possibility of a malicious code spreading via Skype. Skype is a system that allows voice communication over established Internet connections, in an environment very similar to that of telephone calls. It even allows calls to be made to telephones from a computer, with lower tariffs than that… Read More »