May 7996
Network Security
1VIRUS NEWS Warning issued on new type of Word macro virus Magnetics Reflex Laboratories has uncovered a new type of macro...
1VIRUS NEWS Warning issued on new type of Word macro virus Magnetics Reflex Laboratories has uncovered a new type of macro virus that could pose a major threat to users of Microsoft Word for WindowsThe new macro virus uses a hitherto unknown way of activating. Reflex have named this activation method ‘Challenge’. The method makes use of an obscure and undocumented feature of Word for Windows. This enables the writer to start the macro virus without using any of the auto macro commandsJust by opening a Word document infected with this new type of virus, PC users will expose themselves to the effects of its payload. Reflex are now in the process of working on ways to defend against this new type of virus, They claim they will be in a position to deliver effective protection against it within a few weeks. for further information, confucf David Aubrey-Jones, Reflex Magnefics Lfd on: +44 I77 372 6666.
! MARKET &WS Encryption battle sees possible break through Advocates of encryption software are stepping up efforts in the States to loosen export restrictions on the controversial technology, reports the Wall Street Journal. Republican Senator Conrad expected to Burns is introduce a bill that would the federal ease government’s export rules.
2
-_-
-. .-~__--..-_.
_-_____
Firewull market dw&opments The market for Internet firewalls is heating up further as companies implement corporate intranets and seek ways to protect them. Compu#etworld reveals that Trusted Information Systems Inc. has introduced the Gauntlet lntranet firewall to protect intranets from intrusion by unauthorized employees. Sometimes an intranet firewall is set up to protect sensitive organizational units, such as payroll, from intrusions by employees outside those units while still allowing employees in that operation to use the full corporate network and the Internet. For example, Boston Edison Co. uses three firewalls - one from Checkpoint Software Technologies Ltd and two routers - to protect the corporate WAN and the LANs at 20 sites in the USA. The arrangement protects the utility in three ways. It blocks access to the corporate network by outsiders on the Internet. It blocks unauthorized employees from accessing several protected subnetworks, or intranets. It prevents employees from accessing the Internet in ways that policy forbids. In addition to the move to intranet firewalls, firewall vendors are beginning to break out of the traditional Unix moulds.
Those in favour of the reduction of restrictions placed on the export of encryption products are seeking support on the Internet. The Clinton adminstration has opposed the export of stronger encryption on the grounds that terrorists could use it to conduct operations without monitored. But being technology executives contend that these regulations hamper their ability to compete overseas. Because the regulations govern any software that incorporates the technology to keep data secure, they can impede exports of electronic-mail systems, WWW other software and Internet-related products, The new bill would give software makers free reign to sell scrambling systems overseas as long as the same systems are widely available in the USA. The new bill has been crafted to focus more tightly on ending export curbs without attacking other encryption-related issues.
Encryption supports will launch a ‘Golden Key Campaign’to garner backing on the World Wide Web.
: COMPANY / NE Enhanced network security offered An agreement has been reached between Secure Computing Corp.(a producer of firewall technology) and Security Dynamics Technologies Inc. to support Security Dynamics SecurlD and ACE/Server technologies in conjunction with Secure Computing’s Sindwinder The Internet firewall. companies hope that their agreement will enable customers to “mix and match security products”. SecurlD offers athentication technology which is an alternative to passwords for identification of persons attempting to sign onto a computer network. This,