yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
MX Logic Expects Managed Security Services to Play Critical Role in Preparing Businesses to Combat Mutating Cyber Threats in 2008
Preparing and Combating Cyber Threats in 2008

MX Logic, Inc. released cyber threat and managed services predictions that will impact small, medium and large businesses in 2008.

“In 2007, cyber criminals have firmly established their intentions to focus on Web 2.0 applications. This trend, coupled with the increased complexity of combined threats that are distributed through botnets, will reach critical mass in 2008,” said Sam Masiello, director of threat management at MX Logic. “The monetary benefit criminals receive from their malicious activity will force them to become more sophisticated in their tactics. We see the ability for cyber threats to quickly morph as a catalyst for the adoption of managed security services globally.”


MX Logic threat research predicts an array of blended cyber threats and tightly woven spam campaigns to dominate in 2008.

Web 2.0 Heightens Security Risk

Blogs, wikis and social networking sites not only make the Internet a more interactive, enjoyable user experience but also provide a breeding ground for security threats. Web 2.0 applications push code execution to the browser, allowing cyber criminals to inject malcode onto a victim's PC. These criminals are expected to seek ways to exploit social networking sites such as Facebook and MySpace. The MX Logic threat research team is already seeing instances of this new direction via blog spam and phishing, and predicts information looting through interactive communities will become a common practice in 2008 as cyber criminals continue to branch out and exploit technologies.

Web Malware Closes Gap on Email Threats

The rise of Web-based services and applications is helping pave the way for cyber criminals to exploit the Web browser. The Web browser is an appealing alternative for cyber crooks to push malware through email because it prompts the user to pull malware from a Web site. The social engineering possibilities are countless, and vulnerabilities within Internet Explorer and Firefox have contributed to a steady increase of cyber threats since 2004. The MX Logic Threat Operations Center has recorded spikes in the number of Web-based threats.

Targeted and Dangerous Social Engineering

MX Logic expects cyber crooks to continue to fine tune their social engineering skills and targeting methods for spam attacks. Targeted spam messages with infected payloads were sent to C-level executives purporting to be from agencies like the Better Business Bureau and the Internal Revenue Service. These messages are also expected to assume a more professional look and feel and to be sent in small quantities that can fly under spam detection technology. This approach contradicts the large, haphazard spam infiltration techniques of the past.

Blended Threats are Gaining Momentum

A blended threat, which combines two malicious tactics, demonstrates how malware distribution is a business model in the underground community.

With the changing landscape of cyber threats, managed services are playing a role in preparing businesses to combat spam and other malicious threats. Managed security services allow enterprises to save time and money spent on researching, installing and maintaining security applications. These services are evolving to the point where threats like the Storm Worm can be addressed before they hit an organization’s network.


“We will define 2007 as the year that managed services and in particular, managed security services, have become a reality,” said Pete Khanna, executive vice president, sales and support at MX Logic. “IT security is critical to all businesses no matter the size or the market. In 2008, we will see more vendors releasing managed security services and in turn creating a more integrated service-set, allowing for greater adoption globally.”

Distributors to Play a Key Role

With the adoption rate of managed services by resellers and solution providers on the rise, distributors will play a key role in driving the implementation and acceptance of managed services in 2008 and beyond. As leading distributors sell managed services, they will be the force behind bundling different managed services offerings together to create valuable integrated solutions. These solutions will provide convenient access to multiple resources through one service provider while maintaining the benefit of building new, recurring revenue streams for the channel.

Globalization of Managed Services

The same value proposition for managed services that has taken hold in the U.S. will be mirrored in Latin America, Asia and Europe. The year 2008 will be defined by the evolving market opportunity around managed services.

For updated information on these trends, or to learn more about security research and opinions, please visit the MX Logic Threat Blog at

About Web 2.0 News Desk
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a w...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations?...
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the clou...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNati...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers