- Welcome Guest
- Sign In
Security analyst Ed Moyle, president, SecurityCurve, agrees that the viruses are interesting not for the threat they pose, but for the glimpse they offer into the future "This software is both interesting and significant, but not because of any threat inherent in it, which is ...
"Eavesdropping is a very real possibility in the VoIP world, both within the enterprise and at home," Ed Moyle, president of SecurityCurve, told TechNewsWorld. "However, most users don't need to be scared about this -- most Web traffic is also susceptible to eavesdropping, but users of the Internet realize this and behave accordingly (such as by not submitting personal information or financial information via e-mail or over other cleartext channels)."
"Eavesdropping is a very real possibility in the VoIP world, both within the enterprise and at home," Ed Moyle, president, SecurityCurve, told TechNewsWorld. "However, most users don't need to be scared about this -- most Web traffic is also susceptible to eavesdropping, but users of the Internet realize this and behave accordingly (such as by not submitting personal information or financial information via e-mail or over other cleartext channels)."
"I think some of the recent press about DKIM paints it as more of a panacea than it actually is," Ed Moyle, president, SecurityCurve, told TechNewsWorld. "Specifically, DKIM is not a universal solution to phishing or spamming. It does help to mitigate address spoofing, which is a very real problem that facilitates phishing and spamming, but it does not achieve the end goal of eliminating either entirely."
"The vulnerability discovered in the Veritas remote agent is a significant one, as it allows an attacker to remotely execute code on a target machine running the backup agent," Ed Moyle, president, SecurityCurve, told TechNewsWorld. "One mitigating factor is that Veritas is enterprise software and most corporate firewalls block port 10000 (the port used by the backup agent) from outside their network, which helps to prevent attacks from impacting corporate entities."
"I don't think anybody can look at the data and disagree with Gartner about the current state of phone-borne malware," Ed Moyle, president, SecurityCurve, told TechNewsWorld. "In terms of the specifics, however, I think Gartner is being overly cautious. I think their general direction is on target, but I think their timeline and current impediments to malware on the phone are unnecessarily pessimistic."
"There are a few precedents for this going back over a decade, although they have historically been less concerned with making money as with playing pranks on the computer owner. For example, the casino virus would play a game akin to roulette with the computer owner and either wipe the disk contents or leave them intact based on the outcome of the game," Ed Moyle, president, SecurityCurve, told TechNewsWorld...
Ed Moyle, president of SecurityCurve, told TechNewsWorld he could see how the mistake happened. "It's understandable because they probably have a bunch of custom development they did for Netscape. They probably took a snapshot of Firefox and since that time Firefox has evolved and fixed security holes. They wouldn't necessarily have the fixes and updates."
"This is a continuation of a trend of increasing spyware infection in the industry," Ed Moyle, president of SecurityCurve, told TechNewsWorld "Spyware vendors, to keep pace with both users' increased awareness of spyware and the availability of software to protect against it, ...
"AOL's move is a bold one," SecurityCurve President Ed Moyle told the E-Commerce Times. "I'm impressed that they've decided to undertake this type of protection for their user community and I think that it's a very responsible position on their part." When AOL decides to block...
"This is an interesting facet of the worm; the use of regional settings is a novel approach for this type of malware as usually we see only English as the language used for propagation," SecurityCurve President Ed Moyle told TechNewsWorld "Using the native language of the send...
"I do think this is a pervasive problem, but not necessarily because a large number of people are sharing their address-books on P2P networks," SecurityCurve President Ed Moyle said. "The issue is the broad and rapid dissemination of these addresses among the spamming community once they are located. In other words, once one spammer has your address, it's only a matter of time before they all do."
Analyst Ed Moyle of Security Curve said its vital for Microsoft users to install the patches. The five critical vulnerabilities, which affect all but IE, involve remote code execution Remote Control...
"We saw low propagation rates with Cabir and CommWarrior, so I'm expecting that this malware will not spread very quickly either," Ed Moyle, president of SecurityCurve, told TechNewsWorld Cabir and CommWarrior searched for Bluetooth-enabled Symbian phones and sent themselves t...
"These types of mistakes are very common and the truth is that vulnerabilities are a fact of life in all software products," Ed Moyle, president of SecurityCurve, told TechNewsWorld. "Products that are more widely deployed are under more scrutiny from vulnerability researchers; therefore a consumer product like this one is an attractive target as it is running on a large number of machines."
"What is surprising to me about this type of mass-mailing worm is the fact that we continue to be susceptible to them. There are a number of barriers to infection already, but still this type of malware seems to slip through the cracks," Ed Moyle, president of SecurityCurve, told TechNewsWorld, pointing out all the filtering and antivirus products that have been both integrated into e-mail clients and can be purchased separately...
"Identity management has moved from a few small, niche players to core functionality in mainline enterprise application platforms and enterprise management software," Ed Moyle, president of SecurityCurve, told CRM Buyer via e-mail. "Whereas a few years ago, small players like Netegrity (since purchased by CA) and Securant (since purchased by RSA) dominated the market, now companies like IBM, HP, Sun, Microsoft, and CA all offer identity management functionality."
"What I think is most interesting about [the new routers] is the incorporation of the malware 'throttling' technology that HP has been hyping over the past few months," Ed Moyle of Security Curve told TechNewsWorld via e-mail "Specifically, they've provided that capacity withi...
"It seems as if a number of antivirus vendors are assuming in their risk-ratings that most enterprises will be filtering IM-type content, but in today's world, both personnel in the business community as well as home users are using IM to communicate," Ed Moyle of Security Curve told TechNewsWorld...
"The innovative thing about this worm is in its use of real-time, thirdparty content in the construction of the e-mail subject and text," Ed Moyleof SecurityCurve told TechNewsWorld "Malware authors have historicallytried to make their attachment enticing to the recipient by u...
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/antitrust-law.jpg
https://www.technewsworld.com/story/courts-regulators-pose-threat-to-apple-services-revenue-in-2024-178918.html
Courts, Regulators Pose Threat To Apple Services Revenue in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/filmmaker.jpg
https://www.technewsworld.com/story/openais-sora-elevenlabs-and-the-end-of-video-media-as-we-know-it-179032.html
OpenAI’s Sora, ElevenLabs, and the End of Video Media as We Know It
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/diverse-professionals.jpg
https://www.technewsworld.com/story/business-buyers-guide-for-a-better-pc-purchase-179116.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Noble-Numbat.jpg
https://www.technewsworld.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/passkey.jpg
https://www.technewsworld.com/story/proton-adds-passkey-support-to-password-manager-knocks-big-tech-179110.html
Proton Adds Passkey Support to Password Manager, Knocks Big Tech
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/passwordless-computing.jpg
https://www.technewsworld.com/story/the-realities-of-switching-to-a-passwordless-computing-future-178579.html
The Realities of Switching to a Passwordless Computing Future
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/computer-programmers.jpg
https://www.technewsworld.com/story/ai-will-have-a-transformative-impact-on-software-development-in-2024-178950.html
AI Will Have a Transformative Impact on Software Development in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/smart-home-future.jpg
https://www.technewsworld.com/story/qualcomm-makes-the-smart-home-work-179142.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/network-engineers-code.jpg
https://www.technewsworld.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Wi-Fi-7.jpg
https://www.technewsworld.com/story/next-generation-wi-fi-7-standard-expected-to-be-finalized-in-early-2024-178845.html
Next-Generation Wi-Fi 7 Standard Expected To Be Finalized in Early 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/hacker-team.jpg
https://www.technewsworld.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/IT-infrastructure.jpg
https://www.technewsworld.com/story/google-joins-amazon-microsoft-with-new-arm-based-data-center-cpu-axion-179113.html
Google Joins Amazon, Microsoft With New Arm-based Data Center CPU, Axion
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/SevaCare-Blood-Pressure-Monitor.jpg
https://www.technewsworld.com/story/sevacare-blood-pressure-monitor-offers-affordable-home-health-assurance-178951.html
SevaCare Blood Pressure Monitor Offers Affordable Home Health Assurance
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Beatbot-AquaSense-Pro-pool-cleaner.jpg
https://www.technewsworld.com/story/beatbot-aquasense-pro-just-in-time-for-summer-the-ultimate-robot-pool-cleaner-179122.html
Beatbot AquaSense Pro: Just in Time for Summer, the Ultimate Robot Pool Cleaner
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/Mantic-Minotaur.jpg
https://www.technewsworld.com/story/lunar-lobster-is-dead-how-to-upgrade-to-ubuntu-23-10-mantic-minotaur-177260.html
Lunar Lobster Is Dead: How To Upgrade to Ubuntu 23.10 Mantic Minotaur
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/home-hacker.jpg
https://www.technewsworld.com/story/paranoia-in-the-home-1-in-3-americans-worried-about-their-smart-gadgets-being-hacked-178954.html
Paranoia in the Home: 1 in 3 Americans Worried About Their Smart Gadgets Being Hacked
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Pat-Gelsinger-Intel-Vision-2024-event.jpg
https://www.technewsworld.com/story/intel-fights-back-major-ai-threats-ahead-and-michael-dell-is-back-baby-179119.html
Intel Fights Back, Major AI Threats Ahead, and Michael Dell Is Back, Baby!
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/mobile-app-security.jpg
https://www.technewsworld.com/story/mobile-security-firms-fortify-defenses-as-app-attacks-accelerate-179003.html
Mobile Security Firms Fortify Defenses as App Attacks Accelerate
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/iPhone-15-Pro.jpg
https://www.technewsworld.com/story/pundit-predicts-apple-ai-will-be-bound-to-iphone-analysts-react-179132.html
Pundit Predicts Apple AI Will Be Bound to iPhone, Analysts React
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Snapdragon-X-Elite.jpg
https://www.technewsworld.com/story/qualcomm-chip-closing-performance-gap-with-apple-m3-in-leaked-benchmarks-179039.html
Qualcomm Chip Closing Performance Gap With Apple M3 in Leaked Benchmarks
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/deepfake-edit.jpg
https://www.technewsworld.com/story/are-deepfakes-overblown-179016.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/laptop-user.jpg
https://www.technewsworld.com/story/temu-and-homary-online-retailers-that-are-generally-a-good-value-179105.html
Temu and Homary: Online Retailers That Are Generally a Good Value
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/Dysolve-Game-Lobby.jpg
https://www.technewsworld.com/story/ai-powered-software-offers-breakthrough-for-treating-dyslexia-178937.html
AI-Powered Software Offers Breakthrough for Treating Dyslexia
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/smartphone-user-perplexed.jpg
https://www.technewsworld.com/story/affiliate-marketing-contributing-to-substandard-search-results-study-178978.html
Affiliate Marketing Contributing to Substandard Search Results: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/08/e-waste.jpg
https://www.technewsworld.com/story/disorganization-not-cost-fuels-the-it-e-waste-crisis-178570.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/antitrust-law.jpg
https://www.technewsworld.com/story/the-dojs-flabby-antitrust-lawsuit-against-apple-179086.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/law-enforcement-investigators.jpg
https://www.technewsworld.com/story/tech-coalition-launches-initiative-to-crackdown-on-nomadic-child-predators-178773.html
Tech Coalition Launches Initiative To Crackdown on Nomadic Child Predators
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Project-Kuiiper.jpg
https://www.technewsworld.com/story/amazons-competitor-to-musks-starlink-takes-critical-step-toward-deployment-178873.html
Amazon’s Competitor to Musk’s Starlink Takes Critical Step Toward Deployment
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/AI-robot-in-business.jpg
https://www.technewsworld.com/story/how-to-leverage-gen-ai-without-losing-the-corporate-shirt-179123.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/CES-2024-Innovation-Showcase.jpg
https://www.technewsworld.com/story/10-products-from-ces-2024-that-set-the-innovation-bar-178966.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/03/Google-Gemini.jpg
https://www.technewsworld.com/story/apple-google-talks-could-bring-gemini-ai-to-iphone-179077.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/tv-set-top-box-with-remote.jpg
https://www.technewsworld.com/story/electronic-frontier-foundation-calls-for-ftc-action-on-poisoned-set-top-boxes-178797.html
Electronic Frontier Foundation Calls for FTC Action on Poisoned Set-Top Boxes
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Francis-Scott-Key-Bridge-and-Cargo-Ship-Dali-NTSB.jpg
https://www.technewsworld.com/story/how-ai-could-have-prevented-the-key-bridge-collapse-179094.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Tim-Cook-Vision-Pro-selfie.jpg
https://www.technewsworld.com/story/vision-pro-revives-one-and-done-app-purchases-179012.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Apple-Vision-Pro-unboxed.jpg
https://www.technewsworld.com/story/apple-vision-pro-impressions-one-week-later-179019.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/women-dont-play-emma-raz.jpg
https://www.technewsworld.com/story/women-dont-play-confronts-gender-disparity-in-the-tech-industry-178379.html
‘Women Don’t Play’ Confronts Gender Disparity in the Tech Industry