Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/31/2011
11:52 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Trend Micro Unveils IBM Security Suite

ScanMail Suite for 64-bit Lotus Domino platforms uses a cloud-based database to detect threats, including those generated by URL-shortening services recently linked to the spread of malware.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Internet security software developer Trend Micro Monday unveiled its ScanMail Suite, a solution designed for all 64-bit IBM Lotus Domino platforms, including IBM's new System z platform.

The vendor's newest offering provides anti-spam, anti-malware, Web threat protection, and content protection to prevent data loss and theft, according to Trend Micro. ScanMail Suite, which was designed specifically as a native Lotus Domino server application, was optimized for high-performance scanning, the developer said. The technology supports all current 64-bit Domino platforms, as well as Windows and AIX.

"The release of ScanMail v5 for Lotus Domino for Linux on IBM System z allows us to exploit the world's fastest chip technology on the IBM zEnterprise System to help our customers achieve unrivalled reliability, security, and manageability for their multi-OS datacenters," said Steve Quane, chief product officer at Trend Micro. "Further, since Lotus Domino, ScanMail, and IBM System z all support multiple operating environments, heterogeneity of data centers no longer stands in the way of dramatic consolidation and cost reduction -- a key objective of our large enterprise customers."

IBM's zEnterprise System was designed to be fast and scalable. The solution integrates a number of IBM technologies to support enterprises' multi-architecture data centers and private clouds, according to the vendor. In the fourth quarter of 2010, sales of System z mainframes grew 69% year-over-year, IBM said.

Likewise, Trend Micro turns to the cloud, using its domain-reputation database to track the credibility of Web domains and IP addresses. The database assigns a reputation score, using factors such as the site's age, IP email sending behavior, indications of suspicious activities discovered via behavior analysis, and historical location changes, the developer said. ScanMail immediately can access this rating, allowing the software to instantly block messages that include links to malicious URLs, said Trend Micro.

Malicious URLs are a growing threat today, according to many researchers and security developers. Creators of phishing sites are tapping into users' hunger for the shortened URLs popular on Twitter, direct messages, SNS applications, chat services on Twitter and Facebook, as well as friend-search optimization, according to AhnLabs, a provider of online security solutions.

Earlier this month, a new worm spread via the goo.gl URL abbreviator, said Kaspersky Labs security researcher Nicolas Brulez, in a company blog. The attack, first seen on Jan. 20, tweets a malicious URL, eventually linking a user to a scareware page. Scammers created a similar ruse in December, while a September attack using bit.ly's link shortening service saw more than 116,000 clicks.

To help combat these attacks, Twitter offers a link service that also will be used for analysis.

"A link converted by Twitter's link service is checked against a list of potentially dangerous sites. When there's a match, users can be warned before they continue," the company's site said. "Our link service will also be used to measure information like how many times a link has been clicked. Eventually, this information will become an important quality signal for our Resonance algorithm -- the way we determine if a Tweet is relevant and interesting."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13659
PUBLISHED: 2020-06-02
address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
CVE-2020-10703
PUBLISHED: 2020-06-02
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like ...
CVE-2020-10739
PUBLISHED: 2020-06-02
Istio 1.4.x before 1.4.9 and Istio 1.5.x before 1.5.4 contain the following vulnerability when telemetry v2 is enabled: by sending a specially crafted packet, an attacker could trigger a Null Pointer Exception resulting in a Denial of Service. This could be sent to the ingress gateway or a sidecar, ...
CVE-2020-10136
PUBLISHED: 2020-06-02
Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access cont...
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...