Network Intrusion Detection Systems
Posted on October 22nd, 2014 at 10:22 pm by Avatar

ids.jpgNetwork Intrusion Detection Systems have a sole purpose which is to analyze data packets entering a network while looking for signatures of known malware. These signatures are constantly updated as new threats are detected so they are always on the lookout for a growing number of threats that keep on getting better and better at what they do. A detection system checks for any suspicious activity and then notifies the right people who then do the desired actions that have been laid out. Much like a citizen who calls the cops to report a criminal, it works the same way with the system being the caller and the dispatcher in detection side, and the cops on the System Administration side who takes action and apprehends the suspected criminal. They are however quite dependent on the ability of their handlers (System Administrator’s) to handle the threat as it should be. Miscalculations or lack of action can render it useless defeating its purpose. A better solution will be discussed in the next post that is more pro-active in the quest to protect the corporate network.

BlackBerry’s Web Security
Posted on October 15th, 2014 at 8:57 pm by Grace

23.jpgby Andrea Mella

Internet service resources in India are asking to put an end to BlackBerry’s services unless RIM supplied the government with a way to poke around on the communications. If precise, the taunt would bring to a head a subject that has been exhausted on for at least the two months, when Indian officials began inquiring about RIM for a means to interrupt BlackBerry communications, quoting terrorism concerns related to Kashmir. The Indian government requested RIM to moreover supply with some type of master key for loosening encrypted BlackBerry communications or to set connections via a server in the country from end to end which infrastructures could be in retreat and in all probability cut off as needed. 

Data Center Services Security in Northern Europe Gets a Boost from NTT
Posted on October 8th, 2014 at 8:09 pm by Grace

The global data center service industry has been relatively flourishing despite the prevailing economic difficulties in the past couple of years. Business continue to survive, and many of these businesses rely on data center providers for their information handling needs.

Perhaps one indication that the industry is thriving is the recent news that NTT Communications made a move to acquire Secode AB, a leading name in the managed-security and security-consulting arena in Northern Europe. This move has been hailed by many as beneficial to all the parties involved.

NTT Communications is the long distance and international arm of the well known company, NTT. Having established the brand worldwide, it has been the main choice of many businesses. NTT Communications offer various data center services to its customers from all corners of the world. With this acquisition, it only hopes to further strengthen its services in terms of security.

NTT Communications offers data center services in more than 31 cities in 20 countries/regions. Any client can expect excellent quality, characterized by:

  • Full-scale preparations for power outage and fire disaster.
  • Green data center equipped with efficient cooling facilities.
  • Security system installing the latest authentication methods.
  • 24 ⁄ 7 operation and maintenance system
  • System redundancy in power supply, air conditioning and network.
  • Stable network achieved by using backbones and access lines from multiple carriers
  • Quality is certified by NTT Communications Data Center standards.

While the acquisition involves a company local to a certain region, the effects on the security of the data center services of NTT shall certainly be felt system-wide, geographic barriers notwithstanding.

Start-up Out to ReShape the Web Security Scene
Posted on October 1st, 2014 at 6:41 pm by Hannah

shape-security-logoVery little is still known about the actual web security product that start-up Shape Security is working on, but the excitement and full support of its big name investors are quickly drawing everyone’s eyes on what they claim would reshape the whole web security industry.

All we know so far is what Shape Security claims on its site:

“Shape alters the economics of web hacking. We shift costs from defenders to attackers, forcing hackers to spend much more to achieve much less. Our military-grade technology doesn’t rely on past signatures, so it uniquely protects against zero-day and other advanced threats.”

It has also been reported that the new product will be released by the end of the year if not early 2014. This means that while we may not really understand what’s in the works right now and just how exactly they will improve cyber security, relying on conventional malware and spyware software may be a thing of the past really soon.

Image via Shape Security

Scareware pop-ups Sued
Posted on September 24th, 2014 at 5:47 pm by Grace

Image Source:

Seeing ‘WARNING: YOUR COMPUTER IS VULNERABLE! CLICK HERE TO PROTECT YOURSELF!’ can just mean there’s something is not working in your system security. NOT! Theres a new spyware that displays this kind of message which brings panic to its users. And tricks them into purchasing bogus applications or products to fix the vulnerability. These are clearly scams. Malwares. It is designed primarily to scare you into purchasing or giving out your information. It pretends to help you solve the problems that it has found in your system by paying a premium and they will take care of the rest. Microsoft and the state of Washington has filed a lawsuit against a few companies, one of the companies is from Texas, a firm that sells Registry Cleaner XP for $40. The big companies like Microsoft continuously run after these copycats. With the 2005 Computer Spyware Act backing them up but the suspects are hard to find.

Norton Anti-Virus
Posted on September 17th, 2014 at 5:16 pm by Grace

20.jpgby Andrea Mella

Norton Identity Safe encrypts your passwords and added confidential data repeatedly while satisfying your demand to put away time and look after it from being stolen by listening in keystroke loggers. This anti-virus software runs inaudibly in the background with no requirements in perplexing security alerts. The Norton Internet Security mechanically optimizes your security settings. It distributes non obligatory solutions for you and your family as well as antispam and parental controls. The two-way firewall obstructs the hackers from flouting into your computer and discontinue spyware from broadcasting information. The recently discovered security gaps in the operating system and applications were used to avoid viruses, worms, and hackers from incoming all the way through these vulnerabilities.

Cyberattackers Focus on Social Networks
Posted on September 10th, 2014 at 3:47 pm by editor

If you have a MySpace or Facebook account, you may be a prime target of cyberattackers. They usually do this by sending Trojans through apps or widgets that your friends sent you. According to researchers at Finjan, cyberattackers are now going to these social networking sites such to get more victims.

“Attacks will become more sophisticated by combining several services in order to heighten infection ratios and decrease the detection rate, while providing more robust and scalable attack frameworks,” Yuval Ben-Itzhak, chief technology officer, Finjan, said in a news release. “The focus will be on trojan technology as it enables maximum flexibility in terms of command and control. This adds another potentially malicious element to the ‘legitimate’ web traffic that needs to be examined by security solutions.”

In short, before installing the app or widget that your friend sent you, confirm if it came from them. If it didn’t, kindly delete it immediately. If it did come from them, research on the app or widget from previous users.


Microsoft’s Windows 7 – Opening Pandora’s Box
Posted on September 3rd, 2014 at 2:31 pm by Grace

Microsoft UacThere has been much talk about the problem associated with the so-called Pandora’s box that is Microsoft’s UAC or User Account Control. This is one of the most unforgettable features of Vista where it first appeared as the ever present annoying pop-up window that asked for permission on almost each and every mouse click (exaggerated). The danger is that the said control feature seems to fail to revert to default security settings after a user has signed into the system as the systems administrator. After this event, use of all applications thereafter have been found to have default settings of the admin without reverting to previously set security settings that can be a wide open door for hackers to exploit. (Read the rest of this story.)

No Adware Pro
Posted on August 27th, 2014 at 1:19 pm by Grace


No Adware Pro. Guys, check out the latest adware remover. It is called, No Adware Pro. It is a user-friendly adware remover. You can regularly update it so as to identify the latest threats that hac come out in the internet. Its quite a simple tool. It will scan your PC from time to time, for different known spywares, adwares, dialers and web bugs. You can configure various browsers to protect your computer when surfing online. Whats more is, it’s protecting you through a shield, in real time. It means, the software will prevent malicious items we detect, from ever running on our PCs instantly! It has a scheduler, which enables you to program the adware remover, when its supposed to scan the whole system.

Broad spectrum DLP’s
Posted on August 20th, 2014 at 12:46 pm by Avatar

Data Loss Prevention is a term used to define and enforce data classification and uses robust encryption and security. Vendors like Vontu , Reconnex and Titus Labs, all produce software that is classified as data mining technologies and gives the user the function/ability to include the security option which they can define the level that should be applied.
These types of software scans email and their attachments along the files users already have and create giving the users a sign that the said files are in need of protection. They then assign the level/s of protection that are assigned and the file is encrypted with a key. Only authorized clients and users with the right access levels get the key and thus access to the said information eliminating the reliance on the traditional walls for protection.

« Previous Entries