yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
MX Logic Expects Managed Security Services to Play Critical Role in Preparing Businesses to Combat Mutating Cyber Threats in 2008
Preparing and Combating Cyber Threats in 2008

MX Logic, Inc. released cyber threat and managed services predictions that will impact small, medium and large businesses in 2008.

“In 2007, cyber criminals have firmly established their intentions to focus on Web 2.0 applications. This trend, coupled with the increased complexity of combined threats that are distributed through botnets, will reach critical mass in 2008,” said Sam Masiello, director of threat management at MX Logic. “The monetary benefit criminals receive from their malicious activity will force them to become more sophisticated in their tactics. We see the ability for cyber threats to quickly morph as a catalyst for the adoption of managed security services globally.”


MX Logic threat research predicts an array of blended cyber threats and tightly woven spam campaigns to dominate in 2008.

Web 2.0 Heightens Security Risk

Blogs, wikis and social networking sites not only make the Internet a more interactive, enjoyable user experience but also provide a breeding ground for security threats. Web 2.0 applications push code execution to the browser, allowing cyber criminals to inject malcode onto a victim's PC. These criminals are expected to seek ways to exploit social networking sites such as Facebook and MySpace. The MX Logic threat research team is already seeing instances of this new direction via blog spam and phishing, and predicts information looting through interactive communities will become a common practice in 2008 as cyber criminals continue to branch out and exploit technologies.

Web Malware Closes Gap on Email Threats

The rise of Web-based services and applications is helping pave the way for cyber criminals to exploit the Web browser. The Web browser is an appealing alternative for cyber crooks to push malware through email because it prompts the user to pull malware from a Web site. The social engineering possibilities are countless, and vulnerabilities within Internet Explorer and Firefox have contributed to a steady increase of cyber threats since 2004. The MX Logic Threat Operations Center has recorded spikes in the number of Web-based threats.

Targeted and Dangerous Social Engineering

MX Logic expects cyber crooks to continue to fine tune their social engineering skills and targeting methods for spam attacks. Targeted spam messages with infected payloads were sent to C-level executives purporting to be from agencies like the Better Business Bureau and the Internal Revenue Service. These messages are also expected to assume a more professional look and feel and to be sent in small quantities that can fly under spam detection technology. This approach contradicts the large, haphazard spam infiltration techniques of the past.

Blended Threats are Gaining Momentum

A blended threat, which combines two malicious tactics, demonstrates how malware distribution is a business model in the underground community.

With the changing landscape of cyber threats, managed services are playing a role in preparing businesses to combat spam and other malicious threats. Managed security services allow enterprises to save time and money spent on researching, installing and maintaining security applications. These services are evolving to the point where threats like the Storm Worm can be addressed before they hit an organization’s network.


“We will define 2007 as the year that managed services and in particular, managed security services, have become a reality,” said Pete Khanna, executive vice president, sales and support at MX Logic. “IT security is critical to all businesses no matter the size or the market. In 2008, we will see more vendors releasing managed security services and in turn creating a more integrated service-set, allowing for greater adoption globally.”

Distributors to Play a Key Role

With the adoption rate of managed services by resellers and solution providers on the rise, distributors will play a key role in driving the implementation and acceptance of managed services in 2008 and beyond. As leading distributors sell managed services, they will be the force behind bundling different managed services offerings together to create valuable integrated solutions. These solutions will provide convenient access to multiple resources through one service provider while maintaining the benefit of building new, recurring revenue streams for the channel.

Globalization of Managed Services

The same value proposition for managed services that has taken hold in the U.S. will be mirrored in Latin America, Asia and Europe. The year 2008 will be defined by the evolving market opportunity around managed services.

For updated information on these trends, or to learn more about security research and opinions, please visit the MX Logic Threat Blog at

About Web 2.0 News Desk
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for pe...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relation...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development ...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns hel...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers