Recent Articles
-
Adobe Gets Regular on Patching Acrobat, Other Apps
Like Microsoft and Oracle before them, Adobe is getting on the routine patch release schedule. Beginning today, Adobe will begin releasing patches for its widely used document presentation, media and graphics applications, according to the Adobe Product Security Incident Response Team blog. According to the Adobe security blog, the company will release unspecified security patches…
-
Palo Alto Networks Unveils New Breed of Firewall Software
The application landscape has changed over the years and yet the firewall hasn’t. With this in mind, Palo Alto Networks is telling customers and channel partners its’ new PAN-OS 3.0 software for its firewalls is designed to supersede the ‘find it and kill it’ model other security technologies are based upon. "Any application can use…
-
Where are You Vulnerable Security Traps Abound
Where are You Vulnerable Security Traps Abound Even as IT spending is under the gun in 2009 as budget cuts continue and IT projects are delayed, security remains a top concern and priority among IT professionals. Security breaches have decreased in number, but they’ve increased in severity in 2008, according to a recent survey of…
-
UPDATE: T-Mobile Investigating Alleged Hack
T-Mobile says it’s aware of the alleged breach of its network security, as reported in an email to insecure.org over the weekend. >> Click here to read the first post on this alleged incident << In a statement to Channel Insider, T-Mobile said: "The protection of our customers’ information, and the safety and security of…
-
FTC Shut Down of Rogue ISP Has Far Reaching Implications
If the volume of spam hitting your inbox this weekend is down, you have the Federal Trade Commission to thank. On June 5, the FTC received a temporary restraining order to shut down Pricewert, a San Jose Internet service provider suspected of harboring spammers, peddlers of child pornographers and botnets. Many ISPs are inadvertently hosting…
-
Unconfirmed Reports of Massive T-Mobile Breach
Early reports indicate that hackers have penetrated the T-Mobile U.S. network and stolen proprietary operating data, customer databases and financial records. According to a post on insecure.org, the hackers have claimed to be auctioning the pilfered data to the highest bidder. T-Mobile competitors, they say, turned them down. >> Click here to read the full…