Secure customer support
map
contact
home
home.bandeau.gauche.jpg
home.bandeau.droit.2.jpg
 
 SECURITY FEED
 

 

• Google Books privacy debate: Whose side are you on?
I was listening to NPR yesterday, and one story lingered with me throughout the day. So, I figured I'd take it to the blogs and see what you all have to say about the matter. Here's the deal: Some authors have mixed feelings...

 

• How long can Apple dodge the antitrust bullet?
If you ask me, Apple is getting dangerously close to putting itself in the line of fire from an antitrust bullet. And when it comes, it'll have nothing to do with the iPod or Mac OS, but instead it's the way Apple manages the App Store. by Adrian Kingsley-Hughes

 

• News to know: Culture of cheap; Microsoft, Nokia; eBay; Apple
Here are todayàƒÂ¢â‚¬â„¢s notable headlines. You can get News To Know via email alert and RSS daily. For continuous updates see BNETàƒÂ¢â‚¬â„¢s around-the-Web tech coverage. Andrew Nusca: Culture of cheap: How discount computers cost the consumer Jason Perlow: Der Frankenputer: A Last Hurrah at...

 

• Apple drops (another) Mac OS X security patch
Less than a week after fixing 19 Mac OS X security vulnerabilities, Apple is on the patch treadmill again. The company released Security Update 2009-004 to fix a solitary BIND vulnerability that could lead to denial of service attacks.àƒÂ‚à‚  Apple warns: A...

 

• Cloud Security Panel: Is cloud computing more or less secure than on-premises IT?
Will applying conventional security approaches and best practices be enough for low-risk, high-reward, cloud computing adoption? Most importantly, how do companies know when they are prepared to begin adopting cloud practices without undo security risks? by Dana Gardner

 

• Advanced Mac OS X rootkit tools released
Security researcher Dino Dai Zovi (of Pwn2Own fame) has released a suite of tools to demonstrate how to load an advanced rootkit on Mac OS X machines. The tools were first discussed at this year's Black Hat security conference where Dai Zovi right presented techniques to manipulate...

 

• Apple plugs code execution, phishing holes in Safari browser
Apple has released Safari 4.0.3 to fix at least six security vulnerabilities that put Mac and Windows users at risk of hacker attacks. The update is considered highly-critical and should be immediately applied on both Windows and Mac systems because of the risk of information disclosure, phishing...

 

• Court upholds RealDVD injunction; supports outdated laws and Hollywood business model
I have to admit that I am blown away by a judge's decision to grant a preliminary injunction on sales of RealDVD, RealNetworks' controversial software that allows consumers to rip DVD movies into a computer much the same way that CDs can be ripped. Even though I...

 

• DVD Jon subpoenaed in Apple anti-trust lawsuit
Jon Lech Johansen, better known to most as "DVD Jon" has been subpoenaed as part of the ongoing iPod/iTunes antitrust lawsuit. by Adrian Kingsley-Hughes

 

• New Mac OS X DNS changer spreads through social engineering
TrendMicro is reporting on a newly discovered 4th member of the OSX_JAHLAV malware family. The latest variant is once again relying on social engineering, this time spreading under a QuickTime Player update (QuickTimeUpdate.dmg) with a DNS changer component enabling the malware authors to redirect and monitor the...

 

• Microsoft: Exploits likely for 'critical' Windows vulnerabilities
Microsoft today dropped a mega patch bundle with fixes for several "critical" vulnerabilities affecting the Windows platform and warned that "consistent, reliable exploit code" was likely to be released within 30 days. The Redmond, Wash. software maker released nine bulletins -- five rated critical -- to provide...

 

• Campaign Monitor hacked, accounts used for spamming
E-mail marketing software developer Campaign Monitor warned users today of a server compromise that took place during the weekend. The compromise allowed the attackers to gain access to customer accounts, which they abused by importing their own lists of harvested emails in order to launch spam campaigns...

 

• Password-reset flaw haunts WordPress admins
Researchers are sounding the alarm for a serious administrator password-reset vulnerability affecting the latest version of WordPress, the popular open-source blog publishing platform. The flaw, which can be exploited via the browser, gives an attacker a trivial way to compromise the admin account of any WordPress of...

 

• Logitech debuts Harmony 900 universal remote with RF tech; $399
Logitech on Tuesday announced the Harmony 900 universal remote control, an RF-enabled version of the popular but pricey Harmony One remote that allows the unit to be used when your TV cabinet doors are closed. In addition to its...

 

• Security 101: Look back to advance
The security landscape may be rapidly evolving, but the clue to standing a better chance in the fight against threats could be in looking back, not forward. The security landscape may be rapidly evolving, but the clue to standing a better chance in the fight against threats could be...
 
 

Important: Bee Ware solutions for PCI DSS compliance:

Non-intrusive application audit using i-Watch
A Web Application Firewall in front of web-facing applications : i-Sentry
Strong Web SSO authentication with i-Trust

Learn more:  This email address is being protected from spam bots, you need Javascript enabled to view it

 
Trusted Application
Bee Ware's solution for secure Web applications: non-intrusive Trusted Application Assessment
 
 • 3rd International E-crime Forum

FIC 2009

At the Grand Palais, Lille, 24th March 2009

Bee Ware is an official sponsor of the Forum attended by  national and international public and private partners and local, economic and legal authorities.
Read the press release
 
• Silent Web Application Assessment
Bee Ware, the leading provider of Web application security solutions, announces more groundbreaking technology with the advent of Silent Web Application Assessment
Read the press release
 
 
  Partner / Analyst
 
 TELINDUS
 
"...After a thorough evaluation of the competitive landscape and laboratory benchmarking we chose Bee Ware who scored highest on the criteria of attack detection, ease of use and management capabilities...”
 
Bart Geeraerts, Cluster Manager Business Innovation Security
 
Read the press release
 
  Customer quote
 
 KBC SECURITIES
 
" Security and the level of confidence it gives our customers is a primary differentiator for us and i-Sentry helps us deliver on that ."
 

Kris De Nul, Head of ICT Development

Read the case study 

 
  © Bee Ware - legal notice
French
English