Category Archives: Security

SourceFire Acquires Immunet

The Immunet Blog says they plan to “spread” as the Sourcefire Cloud Technology Group.

Over the past 2.5 years the team here at Immunet has built an amazing cloud platform to deliver next generation security technologies and raise the bar for AntiVirus protection. As a result, we’ve built a product that is 35 times smaller than our nearest competitor using an entirely new approach to fight today’s rapidly spreading threats — our Collective Immunity technology. After growing to over 750,000 users in just over a year, we have reached a stage in our company’s life where we needed to put our pedal on the gas and spread Immunet to the entire world.

The acquisition makes a lot of sense since Immunet has been producing a Windows version of ClamAV, which was acquired by Sourcefire in 2007.

Windows ClamAV users had already been redirected to Immunet support and *nix ClamAV planned to migrate to the same Immunet Cloud technology that boasted “NO virus updates required“. This acquisition confirms Sourcefire’s commitment at a business as well as a technology level.

NVIDIA announces CPU

I noticed that NVIDIA slipped a CPU announcement into their CES press releases

NVIDIA announced today that it plans to build high-performance ARM based CPU cores, designed to support future products ranging from personal computers and servers to workstations and supercomputers.

Known under the internal codename “Project Denver,” this initiative features an NVIDIA CPU running the ARM instruction set, which will be fully integrated on the same chip as the NVIDIA GPU.

Just when you thought NVIDIA made it easier to crack encryption using FERMI (graphics processors)

Guidelines for Secure IPv6

The National Institute of Standards and Technology last week issued SP 800-119, Guidelines for the Secure Deployment of IPv6

Some things are said to be very different about it…

Router access control lists (ACLs), firewalls, and other security components must be carefully managed to retain ICMPv6 functionality. Any security measures on a network segment must allow IPv6 nodes to use ICMPv6 to accomplish Neighbor Discovery, PMTU discovery, and other essential tasks. If an IPv6 default router on a network segment is unable to receive and reply to legitimate RS messages, nodes sending those messages may experience a denial of service condition.

…while other things are said to stay the same.

The deployment of IPv6 reinforces the basic security lessons learned with IPv4. These security practices include defense in depth, diversity, patching, configuration management, access control, and system and network administrator best practices. Good security practices remain unchanged with the deployment of IPv6.

US Government Oversight – Up for Bid

A site called Issa Exposed says the new chair of the US House Oversight Committee has asked corporate lobbyists for guidance on what he should investigate.

They point out he is calling for an end to earmarks, while he takes earmarks.

In FY 2007, Issa requested a total of $260,738,955 in what he later called “tantamount to a bribe.” It dipped a bit in FY 2008 to $112,570,000, but he rebounded strongly for FY 2009 with earmark requests totalling $214,367,000.

And, while “his biggest backer since entering Congress has been the health care and pharmaceutical industry” he criticizes 9/11 first responders for asking for federal health care assistance.

And let’s remember that it was just a few weeks after submitting those FY2009 earmark requests that he was trying to block health care for 9/11 first responders, saying “I have to ask … why the firefighters who went there and everybody in the city of New York needs to come to the federal government for the dollars versus this being primarily a state consideration.”

That is the first time I have seen anyone call al Qaeda’s terrorist attack in New York “primarily a state consideration”.

A labor blog has written a scathing open letter to Mr. Issa, where they point out the irony in an “oversight” official asking corporations for a list of regulations to weaken. A comment attached to their letter also makes an interesting point:

California Congressman Darrell Issa made his fortune as CEO of Directed Electronics, maker of the Viper and Python car alarms. He may have spoken to you sternly if you too closely approached a Viper-protected vehicle, as it is Issa’s recorded voice that announces, “Protected by Viper. Stand back.” Ironically, he was twice arrested for auto theft himself in the 1970’s, but never charged.

That turns out to be true:

Issa, 49, became a multimillionaire manufacturer of electronic auto alarms, including the popular “Viper” anti-theft device. “When people ask me why I got into the car alarm business, I tell them the truth,” he said in a statement to The Chronicle. “It was because my brother was a car thief.”

Issa was accused by the police of giving misleading and inconsistent information about the stolen car and his brother. He, in response, panned the police efforts to solve the crime, calling them poor investigators:

Issa told The Chronicle that he believed police had targeted him because “they always thought I was not coming clean enough essentially to (help them) prosecute my brother.” He blamed his brother for the San Jose arrest. […] William Issa’s attorney contended that no crime had been committed because Darrell Issa had offered to buy the Mercedes back from the dealership for more than the amount it had paid.

Why would he offer them more?