Surveillance changes history and we need to protect ourselves.
Freedome by F-Secure
Become untrackably invisible http://freedome.f-secure.com.
Apple and the Enterprise
The first ever computer for home use with a GUI was released by Apple in 1983, and was billed Lisa . Although Lisa was a failure, Apple struck gold when the iconic Apple II was released in 1984. Since then, Apple went on to make some of the most memorable devices, and has garnered a cult status for itself for good reason
Google and the Zero-Day Conundrum
Last week Google announced a significant change to the way they disclose vulnerabilities. In cases where a zero-day vulnerability has made it into the wild and is being actively exploited, Google will now give a scant 7 days to the software vendor whose product is being exploited before ”…support(ing) researchers (by) making details available so that users can take steps to protect themselves.” We hope that the details Google will make available do not include full disclosu…
Dr.Jekyll or Mr.Hyde?
We recently had a company contact us regarding an email they received from their bank. The company’s access to their online banking account was blocked by its bank due to fraudulent activity observed through its account
Twitter Adds 2FA
Yesterday Twitter announced that it has enabled two-factor authentication for users of their popular service. As we wrote in our Two-Factor Authentication Solution Brief earlier this year: the password as you know it is dead. As we continue to move into a world where literally everything we do touches the Internet in some fashion, companies owe it to their users and customers ways of ensuring they provide safe and secure methods of authentication
App Security Wins Move at Snail’s Pace
Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…
Finding Similarities and Differences at DEX Level
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One the samples was targeting a Japanese audience, while the other sample was for Korean end-users
Network World’s Security Threat Landscape – May 2013
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet’s Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks.
Cyberattack Tracker Zeroes in on Firewall Vulnerabilities
Deutsche Telekom’s interactive, real-time map of global cyberattacks reveals the bulk of recent attacks – 27.3 million in February alone – were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map’s revelations are significant.