Vulnerabilities / Threats
1/31/2011
11:52 AM
Connect Directly
RSS
E-Mail
50%
50%

Trend Micro Unveils IBM Security Suite

ScanMail Suite for 64-bit Lotus Domino platforms uses a cloud-based database to detect threats, including those generated by URL-shortening services recently linked to the spread of malware.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Internet security software developer Trend Micro Monday unveiled its ScanMail Suite, a solution designed for all 64-bit IBM Lotus Domino platforms, including IBM's new System z platform.

The vendor's newest offering provides anti-spam, anti-malware, Web threat protection, and content protection to prevent data loss and theft, according to Trend Micro. ScanMail Suite, which was designed specifically as a native Lotus Domino server application, was optimized for high-performance scanning, the developer said. The technology supports all current 64-bit Domino platforms, as well as Windows and AIX.

"The release of ScanMail v5 for Lotus Domino for Linux on IBM System z allows us to exploit the world's fastest chip technology on the IBM zEnterprise System to help our customers achieve unrivalled reliability, security, and manageability for their multi-OS datacenters," said Steve Quane, chief product officer at Trend Micro. "Further, since Lotus Domino, ScanMail, and IBM System z all support multiple operating environments, heterogeneity of data centers no longer stands in the way of dramatic consolidation and cost reduction -- a key objective of our large enterprise customers."

IBM's zEnterprise System was designed to be fast and scalable. The solution integrates a number of IBM technologies to support enterprises' multi-architecture data centers and private clouds, according to the vendor. In the fourth quarter of 2010, sales of System z mainframes grew 69% year-over-year, IBM said.

Likewise, Trend Micro turns to the cloud, using its domain-reputation database to track the credibility of Web domains and IP addresses. The database assigns a reputation score, using factors such as the site's age, IP email sending behavior, indications of suspicious activities discovered via behavior analysis, and historical location changes, the developer said. ScanMail immediately can access this rating, allowing the software to instantly block messages that include links to malicious URLs, said Trend Micro.

Malicious URLs are a growing threat today, according to many researchers and security developers. Creators of phishing sites are tapping into users' hunger for the shortened URLs popular on Twitter, direct messages, SNS applications, chat services on Twitter and Facebook, as well as friend-search optimization, according to AhnLabs, a provider of online security solutions.

Earlier this month, a new worm spread via the goo.gl URL abbreviator, said Kaspersky Labs security researcher Nicolas Brulez, in a company blog. The attack, first seen on Jan. 20, tweets a malicious URL, eventually linking a user to a scareware page. Scammers created a similar ruse in December, while a September attack using bit.ly's link shortening service saw more than 116,000 clicks.

To help combat these attacks, Twitter offers a link service that also will be used for analysis.

"A link converted by Twitter's link service is checked against a list of potentially dangerous sites. When there's a match, users can be warned before they continue," the company's site said. "Our link service will also be used to measure information like how many times a link has been clicked. Eventually, this information will become an important quality signal for our Resonance algorithm -- the way we determine if a Tweet is relevant and interesting."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.