Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Security Journal Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Maria C. Horton, Liz McMillan

Related Topics: PC Security Journal, Security Journal

testsiteforbugresearchpleasedonotapprove: News Feed Item

SecureWorks Launches Security Industry's First Protections Against Ongoing Browser Vulnerabilities, i.e.: 'Month of Browser Bugs (MoBB)'

SecureWorks Launches Security Industry's First Protections Against Ongoing Browser Vulnerabilities, i.e.: 'Month of Browser Bugs

ATLANTA, July 7 /PRNewswire/ -- SecureWorks, a leading managed IT Security Services Provider and the leading provider of Managed Security Services to the financial industry, announced that it is the first IT security provider to successfully deploy countermeasures to protect its banking, utility and healthcare clients against new browser vulnerabilities being released by the developers of the Metasploit Project. The release of browser vulnerabilities is being called the "Month of Browser Bugs (MoBB)" initiative and promises that one new vulnerability will be released each day for the remainder of July impacting the latest versions of Internet Explorer, Firefox, Safari, and other browsers.

"We are implementing countermeasures every day to address the vulnerabilities that have been released, and we are proactively monitoring and developing additional countermeasures for any new vulnerability that might arise," said Allen Wilson, VP of Research for SecureWorks. There have been no security incidents involving the released vulnerabilities within SecureWorks' client base.

"In addition to the countermeasures we are launching, we are also recommending that our clients, as well as all computer users, follow some "Safe Practices of IT Computing". Never accept suspicious and/or unsolicited electronic files, avoid opening urls in email messages that may be questionable, and keep your anti-virus, anti-spyware and firewall protection up to date."

"It is important to not only have your Network Intrusion Prevention and Host Intrusion Prevention systems in good working order but to also continually follow the safe practices outlined above," stated Wilson. "Successful exploitation of a remote code execution vulnerability can allow a hacker complete access to one's computer system which can lead to a larger network compromise, loss of sensitive materials, and other adverse impacts to business operations. Unfortunately, these types of vulnerabilities are widely used by phishers and malicious software ("malware") developers to surreptitiously install spyware or bypass security measures." For a complete list of safe computing practices, see

For more information about the MoBB vulnerabilities, see

About SecureWorks

SecureWorks, named by the Yankee Group as a leading Managed Security Service Provider (MSSP), ranked 79th on the Inc. 500 Fastest Growing Private Companies List for 2005 and 39th on the 2005 Deloitte Technology Fast 500, a ranking of the 500 fastest growing technology companies in North America. SecureWorks is the only service that prevents network intrusions at the perimeter, firewall and host levels; monitors client networks 24x7x365; provides ongoing vulnerability assessments; and protects email from spam and viruses while automatically encrypting email to protect confidential information. SecureWorks is a member of the elite FIRST (Forum of Incident

Response and Security Teams) and protects 1,300 enterprise customers. Twice, it has been listed on CIO magazine's "CIO 100 List".


CONTACT: Elizabeth W. Clarke of SecureWorks, +1-404-486-4492 or
[email protected]

Web site:

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.