Articles about Secure Computing

ATLAS (A Toroidal LHC Apparatus) is one of six detector experiments at the Large Hadron Collider (LHC) – image by Maximilien Brice CERN/Science photo library

Cisco spins CERN partnership

Cisco is joining CERN’s openlab, in a partnership The Borg says will help secure the huge computing infrastructure the LHC-operator needs to run. The vendor's participation will start with CERN and Cisco putting together a team to develop highly secure computing infrastructure technologies capable of dealing with massive amounts …
hands waving dollar bills in the air

McAfee snaps up Secure Computing

McAfee is buying smaller IT security rival Secure Computing for $465m in cash. Secure Computing is best known for its firewall and security appliances product lines but more recently it has been busy on the acquisition front, most recently with a deal to buy user control firm Securify for $20m earlier this month. Prior to that …
John Leyden, 22 Sep 2008

Intel infosec folk TEE off open source app dev framework

A trio of Intel boffins have broken a vendor lock-down on trusted execution environments (TEEs) with the release of an open source framework that could help developers to build more secure apps. Intel wonks Brian McGillion, Tanel Dettenborn, and Thomas Nyman (plus N. Asokan of Aalto University and University of Helsinki) …
Darren Pauli, 30 Jun 2015
The Register breaking news

Secure Computing snaps up user control firm Securify

Security appliance firm Secure Computing has bought user access monitoring and control firm Securify, in a deal valued at up to $20m ($15m guaranteed in cash and stock, plus an earn-out of up to $5m). Securify's appliance-based technology allows organisations to control and keep tabs on user access to applications. The …
John Leyden, 04 Sep 2008

Secure Computing buys CipherTrust

Secure Computing has announced a deal to acquire CipherTrust, the messaging security firm, for $273.6m in cash and stock. The deal is expected to close in early September, subject to regulatory approval and customary closing conditions. The deal allows Secure Computing to add CipherTrust's messaging security appliances to its …
John Leyden, 12 Jul 2006
The Register breaking news

Secure Computing snaffles Cyberguard

Secure Computing has announced plans to acquire rival security firm CyberGuard in a cash and stock transaction valued at approximately $295m. The deal allows Secure Computing to expand its portfolio to include CyberGuard's all-in-one security appliance and web filtering products as well as expanding its market footprint. The …
John Leyden, 19 Aug 2005
The Register breaking news

CyberGuard bids for Secure Computing

Security vendor CyberGuard yesterday launched an unsolicited offer to buy rival Secure Computing with a one-for-one stock exchange transaction offer. The bid - which values Secure Computing at approximately $278m - comes days after Secure posted a profit warning, blaming weak government sales for lowered Q2 revenues of between $ …
John Leyden, 12 Jul 2004
The Register breaking news

Secure Computing snags N2H2

Secure Computing today announced plans to acquire content filtering company N2H2 in an all-stock transaction valued at approximately $19.9 million. Secure Computing is probably best known for its Sidewinder G2 Firewall and VPN products, but it also has a smaller business selling content filtering technology. Joining forces with …
John Leyden, 29 Jul 2003
The Register breaking news

Secure Computing waves next-gen firewall roadmap

ComputerWire: IT Industry Intelligence Secure Computing Corp yesterday unveiled how it plans to merge the Gauntlet business it bought from Network Associates Inc into its existing firewall business, with the goal of shipping the first of its "next generation" firewalls, codenamed NGF, at the end of the year, Kevin Murphy …
ComputerWire, 26 Jun 2002
LG Chromebase

Wait, that's no moon 21.5-inch monitor, it's an all-in-one LG Chromebase PC

Chromebooks have been one of the few bright spots in an otherwise down PC market this year. Now LG is hoping that the success Google has had with its "browser in a box" laptops can carry over to the desktop, as well. Desktop PCs running Chrome OS have been available previously in the form of Chromeboxes, devices about the size …
Neil McAllister, 18 Dec 2013

SanDisk to secure online sales with USB Flash drives

SanDisk will next year bring secure computing to its USB Flash drives in a bid to persuade online banks, auction houses and retailers to use them to minimise unauthorised and fraudulent transactions. The technology is called TrustedSignins and essentially embeds a "high performance" encryption engine into the Flash drive. …
Tony Smith, 24 Oct 2006
The Register breaking news

Ericsson selects Secure's SoftToken for intelligent phones

Ericsson has concluded a deal worth over $1 million to build SofToken technology from Secure Computing into its future generation of 'intelligent' mobile phones. Ericsson is also a shareholder in Symbian, the joint venture building intelligent phones based on Psion EPOC32 OS. The move was made to address the fears that many …
Tony Dennis, 21 Oct 1998
The Register breaking news

Ubuntu for smartphones aims to replace today's mobes, laptops

Canonical, the company behind the Ubuntu Linux operating system, has announced a new version of Ubuntu designed specifically for smartphones. Ubuntu for phones is based on the Linux kernel and uses the same Unity user interface that Canonical has developed for the desktop, which the company says should make it immediately …
Neil McAllister, 02 Jan 2013
The Register breaking news

Microsoft dumps Metro from Windows 8

Microsoft has dropped "Metro", the name given to the squaretastic user interface for Windows 8 and Windows Phone, claiming it was just a code name all along. Litigation, though, may be the real reason as it seems the word may be owned by a European company or individual that objected to its use. The change comes late in the day …
Gavin Clarke, 03 Aug 2012
Bill Gates, screengrab PBS TV

MS Trusted Computing back to drawing board

Microsoft's extravagent silver-bullet to cure piracy, rid the Internet of worms and viruses, and possibly bring about world peace won't now appear in Longhorn, the next version of Windows. Despite their apparently contradictory headlines, both eWeek and CRN corroborate that Microsoft's promised software support for the Trusted …
Andrew Orlowski, 06 May 2004
The Register breaking news

Microsoft to pay $250,000 for hot new security defenses

Microsoft is offering more than $250,000 to researchers who develop new security defenses to protect Windows users against attacks that exploit software bugs. Microsoft's Blue Hat Prize announced on Wednesday at the Black Hat security conference will pay $200,000 for the best “novel runtime mitigation technology designed to …
Dan Goodin, 04 Aug 2011
The Register breaking news

The IT manager's guide to social computing

Analysis If your company is averse to openness and transparency and is unlikely to change, then this article is not going to interest you much. Unless, of course, you are considering a change of direction. The fact is that 'social computing' cannot be implemented without trust between employers and employed, between colleagues and …
David Tebbutt, 21 Jul 2006

Intel pumps $100m into university research

Intel is launching a $100M, five-year program to juice university research in the US on advanced computing projects, an effort that will attempt to walk the fine line between pure research and marketable product development. "What makes this different from other industry efforts to engage the academic researcher is that we're …
Rik Myslewski, 26 Jan 2011
The Register breaking news

McCain pulls ahead in pharmaceutical spam

USA '08 Barack Obama is ahead not only in the polls but where it counts the most - in spam messages. However, his presidential rival John McCain can claim his own guaranteed enlarged small victory. The Democrat candidate is the topic of 70 per cent more junk mail messages than his Republican counterpart overall. But McCain edges ahead …
John Leyden, 04 Nov 2008
graph up

McAfee sales strong despite recession

McAfee bucked the trend of poor financial news from the IT industry by posting strong results that exceeded analyst expectations on Thursday. The security software firm's Q4 revenues came in at $424m, an increase of 19 per cent compared to the $356m recorded in Q42007. Q42008 profits hit $45.4m, up from $12.2m in the same period …
John Leyden, 13 Feb 2009
The Register breaking news

DoH tells NHS to dump IE6

The Department of Health has told trusts using Windows 2000 or XP to move to version 7 of Microsoft's browser. In a technology bulletin published by the department's informatics directorate on 29 January 2010, it advised NHS trusts using Microsoft Internet Explorer 6 on either Windows 2000 or Windows XP to move to version 7 of …
Kable, 01 Feb 2010
The Register breaking news

Phishers adapt old scams to exploit bank turmoil

Scammers are exploiting meltdown in the banking sector in an attempt to trick users into handing over sensitive financial information. Phishing emails commonly pose as security checks from a prospective mark's bank. The latest generation of the scam imitates communiques about bank mergers. US consumer watchdog the Federal Trade …
John Leyden, 12 Oct 2008
Jeanette Horan

IBM CIO's Great Refresh: No, Sales Guy, you can't JUST use DropBox

CIO interview She might be CIO of IBM, but Jeanette Horan is just like you: replacing Windows XP with Windows 7, ripping out Internet Explorer 6 and floating a growing amount of software on the cloud. She also has to contend with staffers begging her for the ability to share information using third-party sync 'n' share apps like DropBox. …
Gavin Clarke, 02 Aug 2013
The Register breaking news

IBM hands out malware-stuffed USB at security conference

IBM has apologised after supplying a malware-infected USB stick to delegates of this week's IBM AusCERT security conference. The unlovely gift was supplied to an unknown number of delegates to the Gold Coast, Queensland conference who visited IBM's booth. Big Blue does not identify the strain of malware involved in the attack …
John Leyden, 21 May 2010
The Register breaking news

Intel needs to rethink security to profit from McAfee buy

Analysis Intel's surprise $7.76bn acquisition of McAfee is not only the biggest pure-play security deal in history, but the most significant statement of intent by an IT superpower since Microsoft launched its Trustworthy Computing initiative back in 2002. Microsoft launched the initiative to develop products that are more secure by …
John Leyden, 20 Aug 2010

Russian FSB 'protecting' Storm Worm gang

The creators of the Storm Worm botnet are known to US authorities but a lack of co-operation from their counterparts in St. Petersburg, Russia, is preventing action being taken. St. Petersburg was the centre of the infamous Russian Business Network. It's also reckoned by some to be the city the Storm Worm (more properly Trojan) …
John Leyden, 31 Jan 2008
The Register breaking news

Is that YouTube clip you just watched booby trapped?

Video clips from YouTube might come booby-trapped with malware, security watchers warn. A fake video file containing the Zlob Trojan has been planted on the video-sharing site. If selected, the Trojan bombards infected users with ads. It might also be used to upload other forms of malware onto compromised PCs. According to the …
John Leyden, 20 Jun 2007
The Register breaking news

NAI sells firewall business

Secure Computing has acquired the Gauntlet firewall and VPN business from Network Associates (NAI) for an undisclosed amount. Network Associates customers will be "transitioned" to Secure Computing, developers of the Sidewinder Firewall and VPN Gateway, under the deal which sees the transfer of NAI's technology, along with …
John Leyden, 14 Feb 2002
The Register breaking news

The rise of the Malware Mafia

RSA Policy makers should reject pressure to draft new laws targeting phishing and other types of cyber crime because existing statutes already cover most of the illegal activity, a researcher who investigates online criminals said. Although phishing, malware attacks, and botnet propagation have all come about in the last decade or …
Dan Goodin, 11 Apr 2008
The Register breaking news

Germany tops porn Web hosting superleague

Germany is the Web host with the most - at least in terms of pornography. The .de TLD boasts 10,030,200 pages of smut, beating the UK's 8,506,800 pages into the runners-up spot. That's according to Secure Computing, which has just carried out a study of the global distribution of pornographic web pages by the top 100 individual …
Lester Haines, 24 Jun 2004
For Sale sign detail

Bogus anti-spyware firm fined $1m

A firm accused of marketing bogus anti-spyware software has paid $1m to settle a lawsuit brought by the US State of Washington. New York-based Secure Computer (not to be confused with legitimate security firm Secure Computing) is accused of using spamming and pop-ups in an aggressive and allegedly deceitful marketing campaign …
John Leyden, 05 Dec 2006

MessageLabs takes smut-blocking tech in-house

Web security services outfit MessageLabs has acquired image analysis technology firm Fortium ICA Limited. Fortium Technologies, the parent company of Fortium ICA, will continue to market and develop video copy control and fingerprint detection technologies as an independent company. Terms of the technology acquisition deal, …
John Leyden, 26 Aug 2008
hands waving dollar bills in the air

Share the Vista vision, Microsoft tells security rivals

Microsoft has called on security software firms to provide more than just "basic" products for Windows Vista. Partners must deliver more than "baseline" protection and support for Windows Vista's new security architecture to address future threats to computers, it says. Its cry comes in response to a barrage of complaints from …
Gavin Clarke, 03 Oct 2006
The Register breaking news

No nudes on .nu: official

The operators of the .nu TLD have taken mighty exception to a recent report by Secure Computing which claimed that the tiny sun-kissed island of Niue was the repository for three million pages of Web depravity. .NU Domain Ltd - the US-based .nu custodian - is to take legal action against Secure for "making false claims that .NU …
Lester Haines, 01 Jul 2004

Vista and IE 7 to receive 'critical' fixes on Patch Tuesday

Microsoft is to issue four critical security fixes for this month's Patch Tuesday. Three of these affect either Windows Vista or Internet Explorer 7, which the software maker holds out as a paragon of its conversion to secure computing. In all, Microsoft will push six high-priority updates this Tuesday, the company announced …
Dan Goodin, 07 Jun 2007
The Register breaking news

Air of desperation encircles SIM Summit

The SIM industry has been gathering around Prague for Informa's annual SIM Summit, with various luminaries from the industry presenting their plans for how the SIM is going to develop over the next few years - and the answer seems to be away from mobile phones, if anywhere at all. The Subscriber Identity Module (SIM), used in …
Bill Ray, 25 Apr 2007
The Register breaking news practicing Homeland inSecurity

US businesses are failing to support safe computing advice from the Department of Homeland Security. The Department of Homeland Security's National Infrastructure Protection Centre (NIPC) issued Seven Simple Computer Security Tips in 2002. Two years on, a survey of 111 enterprise IT managers commissioned by Secure Computing …
John Leyden, 11 May 2004
The Register breaking news

Microsoft's 'M' treads on US veterans' toes

Microsoft is in hot water again for again taking the name of someone else's software for one of its fledgling products It's emerged Microsoft's M programming language shares the same name as a 30-year-old open language used by the US Department of Veteran Affairs (VA) along with tens of thousands of users in medicine and …
Gavin Clarke, 05 Nov 2008

Malware spectre haunts Adobe Reader

Adobe Reader may be subject to a security hole that creates a means for hackers to take over vulnerable Windows boxes simply by opening a maliciously constructed PDF document. Gray hat hacker Petko Petkov, who first discovered the bug, omits details of the supposed flaw. He said security concerns over the potency of the flaw …
John Leyden, 21 Sep 2007
The Register breaking news told to swot up on Net security

Industry groups, vendors and police came together in Westminster today to collaborate on producing guidelines to help protect small firms from the growing menace of e-crime. Parliamentary lobby group Eurim and the Institute for Public Policy Research hope their Protecting the Vulnerable report will act as a catalyst for …
John Leyden, 13 Feb 2004
homeless man with sign

CyberGuard snags anti-spam outfit Zix for $3.6m

Security firm CyberGuard has bought the anti-spam, anti-virus and URL filtering business of Zix Corporation for $3.6m in cash. The deal - announced Monday, 14 March and approved by the boards of directors of the two companies - will see Zix's Web Inspector and Message Inspector products moved over to CyberGuard's portfolio. The …
John Leyden, 14 Mar 2005
The Register breaking news

Blue Coat buys URL filtering firm

In brief Proxy appliance firm Blue Coat is to buy URL filtering firm Cerberian for approximately $17.5m in stock. The acquisition is expected to close within approximately 60 days, subject to various customary closing conditions. The deal, announced today, will see Cerberian's URL filtering and categorisation technology iintregratednto …
John Leyden, 19 Jul 2004
hands waving dollar bills in the air

Sun's grid: lights on, no customers

Many of you will remember the fanfare and bravado surrounding Sun Microsystems' Sep. 2004 announcement of a $1 per hour per processor utility computing plan. What you won't remember is Sun revealing a single customer using the service. That's because it hasn't. The missing customers prove quite shocking when you consider that …
Ashlee Vance, 25 Oct 2005

Microsoft reveals hardware security plans

Can trusted computing hardware deliver security without locking out competition, asks SecurityFocus's Robert Lemos. The next version of Windows, codenamed "Longhorn," will have security features to take advantage of the trusted computing hardware now showing up in the marketplace, Microsoft executives announced on Monday. The …
Robert Lemos, 26 Apr 2005
fingers pointing at man

BlackBerry hacking peril exposed

A hacking program, due to be released next week, will demonstrate how to use a connection from BlackBerry devices to potentially bypass enterprise security defences. Jesse D'Aguanno, director of security research at German firm Praetorian Global, gave a presentation on how to use the BlackBerry environment to circumvent …
John Leyden, 10 Aug 2006
The Register breaking news

Brussels to spend €250k on Linux migration study

The European Commission has awarded UK-based consultancy netproject a €250,000 contract to study the issues of migrating government computers in member states to a Linux / Open Source environment. netproject has been hired by the Commission to draw up guidelines on a move to open source technologies and to help define EU IT …
John Leyden, 30 Oct 2002
fingers pointing at man

Katrina-themed malware attack hits the net

Hurricane Katrina is bringing out the worst in people on the net as well as on the streets of New Orleans. Spam emails purporting to offer links to news about Katrina are been used to tempt potential victims onto a site hosting Trojan malware. The site exploits well-known IE vulnerabilities to install a variety of Trojans …
John Leyden, 02 Sep 2005
Flag Russia

Storm Worm turns one

Thursday marked the first anniversary of the infamous Storm Worm. Created by a Russian-based criminal network, the malware rapidly infected millions of PCs in Europe and North America and continues to be a problem. The Storm Worm malware (more properly known as a Trojan) strain first surfaced on 17 January 2007, in emails …
John Leyden, 18 Jan 2008
The Register breaking news

3Com upgrades Firewall Cards

3Com has launched a rack of new embedded Firewall Cards. The range includes a new 3Com Firewall PC Card, as well as a revamp of existing Firewall Desktop PCI Cards, 3Com Firewall Server PCI Cards and 3Com Embedded Firewall Policy Server. Designed to secure vulnerable notebooks and remote PCs, the products provide hardware …
John Leyden, 08 Oct 2002
The Register breaking news

NSA preps Spook Linux 0.1

The ultra-secretive US spy agency, the National Security Agency (NSA), has released a prototype for an ultra-secure version of the Linux operating system. Developed in co-operation with industry research partners, the prototype includes enhancements to Linux which provide stronger protection against the bypassing of application …
John Leyden, 08 Jan 2001