Manchester, UK (29th July 2009) Avecto Ltd, the most trusted name in least privilege management for corporate desktops, today announced the release of Privilege Guard 2.1. “Many organizations want to remove local admin rights from their users, but don’t know where to start, as they are unsure of why users require a privileged account”, said Mark Austin, CTO at Avecto.   With the new Privilege Monitoring capability, Privilege Guard can be deployed in passive mode and it will analyze application behaviour, identifying any applications that would fail to run under a standard user account. “Privilege Monitoring takes the hard work out of policy definition, by automatically identifying problem applications and any other tasks that require the user to be logged on with a privileged account”, said Gavin Wilson, Senior Support Analyst, Oxford University Press.

Read more: Avecto Releases Privilege Guard 2.1 with Privilege Monitoring Capability

Evaluation based on completeness of vision and ability to execute

28th July 2009 - IP-based security and unified threat management (UTM) specialist, Clavister, today announced it has been positioned by Gartner, Inc. in the Niche Players quadrant of the Magic Quadrant for Small to Medium Sized Business (SMB) Multifunction Firewalls.

This research examines the SMB multifunction firewall market and Gartner defines SMB organizations as those having fewer than 1,000 employees.

Peter Johansson, CEO of Clavister said: “We feel our inclusion in Gartner’s Magic Quadrant for SMB Multifunction Firewalls to be confirmation of our mission to help businesses and organizations to improve business performance. Network security is fundamental to protecting one of the most important business assets - its data.”

Read more: Clavister positioned in the Niche Players Quadrant of the Magic Quadrant for SMB Multifunction...

Burlington, MA & Redwood Shores, CA, 27th July, 2009 – Reports that a major data breach at Network Solutions – potentially impacting more than 570,000 cardholders around the world - is almost certainly the result of cloud computing making such network hacks highly attractive, says Imperva, the data security specialist.   "Although the data breach appears to have been discovered in early June, here we in late July - six weeks later - reading about a breach affecting more than half a million cardholders, around half of the Internet service company's customer base," said Amichai Shulman, Imperva's chief technology officer.   "As the dust settles on this major data breach - which appears to be right up there alongside the Heartland Security card data breach of the start of the year - heads will undoubtedly roll," he added.  

Read more: Attraction of cloud computing will increase the risk card data breaches says Imperva

The concluding Start Thinking Soldier mission launches on the 27th July, giving the public an opportunity to test their physical aptitude and mental fitness in virtual challenges, putting into practice expertise used by the British Army.

The launch coincides with the public taking part in 1 million online missions, utilising the Start Thinking Soldier experience to test their potential Army skills, and receive detailed feedback on their performance.

Mission 4 sees users partake in challenges that include navigating a parachute jump at night, requiring them to assess wind strength in order to reach the target destination.  Concentration and agility skills are then tested when neutralising enemy mortar threats, in timed sprints carrying weapons and mastering the use of the Javelin - a mid range anti tank weapon - in order to save local infrastructure from insurgents.

Read more: British Army Launch Final Start Thinking Soldier Challenges as Public Takes Part in 1 Million...

San Jose, California – July 23, 2009 – Finjan discovered a new 0-day exploit “in the wild”. This time, cybercriminals are exploiting a vulnerability in Adobe Acrobat Reader and Flash player.    

The zero-day vulnerability found (CVE-2009-1862) can be exploited to download and execute malicious code on the victim’s PC. Adobe announced that an update will be available on July 31, 2009 which will leave end users’ PCs until then unprotected.   

The exploit was detected “in the wild” by Finjan’s Malicious Code Research Center (MCRC). As with the previous 0-day attacks reported by MCRC, Finjan’s unified secure web gateway (SWG) successfully detected and prevented the attempt to exploit the vulnerability and execute the code.

Read more: Finjan Prevents Zero-Day Exploit of Adobe Acrobat Reader and Flash Player Vulnerability