Endpoint Security

RSS
Endpoint security news, solutions, and analysis for IT professionals

Endpoint Security News

  • Microsoft to kill popular Linux antivirus product

    Posted June 12, 2003 - 8:59 am

    Users and resellers of RAV AntiVirus, popular especially on Linux platforms, are in limbo after Microsoft Corp. announced plans to buy the RAV technology from Romania's GeCAD Software Srl.
  • Industry wary of Microsoft's antivirus play

    Posted June 11, 2003 - 9:58 am

    Major antivirus vendors responded with guarded optimism Tuesday to Microsoft Corp.'s announcement that it will buy antivirus technology from Romania's GeCAD Software Srl and offer its own antivirus products.
  • Microsoft scoops up antivirus technology

    Posted June 10, 2003 - 11:44 am

    In an announcement that could send reverberations throughout the antivirus software world, Microsoft Corp. said Tuesday that it was acquiring antivirus technology from a small Romanian company, GeCAD Software Srl of Bucharest, Romania.
  • A guide to war driving and detecting war driving

    Posted June 5, 2003 - 3:57 pm

    This in-depth report outlines both the tactics used by war drivers and the methods you can use to detect their presence in your network. (Article in PDF format.)
  • 802.11 security and war driving

    Posted June 5, 2003 - 3:44 pm

    This frequently updated collection of links offers both war driving tools and tips on how to make your own network more secure. An important resource for anyone with an 802.11 network.
  • WarChalking.org

    Posted June 5, 2003 - 3:38 pm

    War chalking is a descendent of the marks hobos would make in front of houses during the great depression indicating that the residents were friendly. These marks tell the world that an open wireless network is within range. If you don't intend to broadcast an open network, make sure you recognize these symbols - and don't see them outside your building.
  • WarDriving.com

    Posted June 5, 2003 - 3:31 pm

    The war driver's ultimate resource, update frequently with tips and tools. Keep ahead of the war drivers before they cruise past your network!
  • Priorities in the deployment of network intrusion detection systems

    Posted June 5, 2003 - 2:48 pm

    This master's thesis examines many of the factors that go into the architecture decisions in building an IDS. Look to section 3.1 for an in-depth discussion of the merits of using legacy hardware and free software for this purpose. (Thesis is in PDF format.)
  • Just how dangerous are PDAs?

    Posted May 29, 2003 - 2:43 pm

    Company policies about handhelds range from laissez faire to completely banning outside devices. With virus companies offering firewalls and virus scanners for PDAs, do companies need to worry or is it all hype to sell more security software?
  • Common sense security guide for home and individual users

    Posted May 28, 2003 - 12:48 am

    If you're looking for some concrete security guidelines for your remote users, you might want to use this guide as a starting point. Contains information on firewalls, anti-virus software, and other important topics. (In PDF format.)
  • ARM adding hardware-based security to its cores

    Posted May 27, 2003 - 9:09 am

    Chip designer ARM Ltd. will add extensions to its processor core next year that incorporate hardware-based security technologies, the company announced. Future versions of the company's ARM core for mobile and wireless handset chips will contain protected areas for storage of user authentication keys, and areas of the processor that are off-limits to unauthorized users.
  • Denial of service attacks and the emergence of intrusion prevention systems

    Posted May 20, 2003 - 7:01 pm

    There's a lot of hype surrounding the term "intrusion prevention system." This research paper attempts to define just what such a system might entail. It takes the distributed denial of service attacks of 2000 as its starting point but is applicable to a wide range of systems and attacks. (Article is a PDF file embedded in the page.)
  • Passport woes point to process, credibility problems

    Posted May 12, 2003 - 10:34 am

    The disclosure last week of a serious security vulnerability in the .NET Passport service underscored shortcomings with the development and management of the single sign-on technology and may undermine Microsoft Corp.'s efforts to win wider adoption of Passport among businesses and individuals, an industry analyst said.
  • New and noteworthy: Finger pressure detection

    Posted May 8, 2003 - 9:27 am

    Making an impression just got easier. Scientists in the United Kingdom have announced the development of biometric devices that detect finger pressure. The devices, known as piezo-electric (or pressure electricity) and piezo-resistive sensors, detect the unique pressure stamp created by an individual as he taps out a rhythm or sequence, such as a PIN.
  • Passport flaw leaves user info up for grabs

    Posted May 8, 2003 - 8:46 am

    Microsoft Corp. has scrambled to shut down a flaw in its Passport service that could potentially reveal users' critical personal information, a company spokesman confirmed Thursday.
  • AOL launches premium antivirus service

    Posted April 30, 2003 - 1:21 pm

    America Online Inc. (AOL) is teaming up with Network Associates Inc. to offer antivirus and firewall protection to AOL subscribers as part of a new premium subscription service.
  • Sun, Symantec team on appliance

    Posted April 14, 2003 - 9:33 am

    Sun Microsystems Inc. and antivirus company Symantec Corp. are releasing a "no hassles" intrusion detection system (IDS) appliance targeted at the enterprise and service provider markets, the two companies announced at the RSA Conference in San Francisco.
  • Fidelity looks at biometrics to ID clients, employees

    Posted April 8, 2003 - 9:05 pm

    Biometrics, the use of information technology to verify the identity of a person using human body traits, such as fingerprints, voice, face and eyes, is still in its nascent stages, but it is emerging as an alternative for companies to authenticate employees and clients without using passwords.
  • Entrust, Waveset partner for ID management

    Posted April 7, 2003 - 9:35 am

    Access management software provider Entrust Inc. and identity management company Waveset Technologies Inc. will swap technologies and work to develop new products as part of a partnership agreement announced Monday.
  • SANS Institute intrusion detection FAQ

    Posted March 28, 2003 - 1:49 pm

    The SANS Institute, a cooperative research and education organization for system administrators and security experts, offers this excellent resource to help you respond quickly to potentially malicious intruders in your systems. You'll learn what a number of standard attacks might look like while in progress, and also find some best practices for responding to those attacks.
  • Tools to build your own honeypot

    Posted March 28, 2003 - 1:36 pm

    A honeypot is a computer or system that an administrator puts online in order to attract attackers. You read correctly: sometimes you want an attacker in your network. A honeypot should be a tempting target that contains no actual sensitive data. If you believe that your network has already been probed or compromised, you can use a honeypot to collect data on the attacker and his methods without giving away vital information. This collection of resources will help you decide how to establish a honeypot on your own network, either by purchasing a commercial product or building your own.
  • COMDEX - Panel: Accept the Net is vulnerable to attack

    Posted November 19, 2002 - 10:42 am

    Companies and home Internet users need to accept that the global computer network is inherently vulnerable to attacks, worms, trojans and anything else miscreants want to unleash on it, and then accept that securing the system is everyone's responsibility, a panel of security experts said at the Comdex trade show.
  • Microsoft VPN flaw may leave intranets open to attack

    Posted September 27, 2002 - 8:45 am

    A flaw in Microsoft Corp.'s Point-to-Point Tunneling Protocol used to secure VPNs leaves corporate intranets open to attack from outside, according to German IT security company Phion Information Technologies GmbH.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness