One of the hottest buzz of the moment certainly is the breaking news about NSA collecting phone records of Verizon subscribers. According to court order, Verizon has been asked to provide NSA daily information for all its phone records between April 25th and July 19th
Phishing – Alive and Well
Last week I was getting caught up on the usual deluge of emails, and one caught my eye. I’ll admit, at first glance, I almost clicked without thinking.
Dr.Jekyll or Mr.Hyde?
We recently had a company contact us regarding an email they received from their bank. The company’s access to their online banking account was blocked by its bank due to fraudulent activity observed through its account
New NSS Labs Report: IE’s Browser Security Bests Others
Microsoft’s Internet Explorer 10 is the most secure web browser according to the results of a mid-May 2013 NSS Labs’ analysis. Apple Safari 5, Google Chrome 25/26, Internet Explorer 10, Mozilla Foxfire 19 and Opera 12 were all evaluated against malware downloads and socially engineered malware. Results show that Chrome’s malware download protection improved significantly, up to more than 83 percent from a 70 percent performance in NSS’ October 2012 analysis, Browser C…
Preventing DDoS: What to Look for in a Security Solution
Distributed Denial of Service (DDoS) attacks are on the rise, and they’re only getting stronger. This was driven home by The New York Times report on how anti-spam organization Spamhaus fell prey to one of the largest DDoS attacks in history. Few can forget the targeted DDoS assaults on global financial institutions JP Morgan Chase, Wells Fargo and Bank of America, Regions Bank and American Express – attacks that crippled the businesses for hours and cost millions in lost business, rem…
11MB for a simple conference program application?
As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conferences, with the agenda, paper abstracts and a few news. Figure 1. IEEE Security & Privacy Android application Curious, I downloaded the application for Android (air.org.computer.confprog.sp.apk) and ran it through my automated analysis scripts.
This Week’s Five: Entrepreneurs flying into the cloud
This Week’s Five is the column where we bring to you a collection of five interesting reads from all over the web, with a different topic every week. This week, we are exploring the benefits of cloud computing for entrepreneurs and small business owners with regards to their website and server monitoring. We’re putting together some interesting articles about cloud computing solutions we’ve come across in the past few days, Ø Cloud Computing Boosts Next Generation of Startups, Survey Shows Cloud computing isn’t just potentially delivering savings and flexibility for existing organizations.
Microsoft Releases IE8 Fix-It Patch
Are you using Internet Explorer 8? If so, you need to read on
Cyberattack Tracker Zeroes in on Firewall Vulnerabilities
Deutsche Telekom’s interactive, real-time map of global cyberattacks reveals the bulk of recent attacks – 27.3 million in February alone – were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map’s revelations are significant.
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.