Twitter Login Verification Feature Now Available
Posted on December 25th, 2014 at 11:50 am by Hannah
Last month, we reported that Twitter was stepping up their game to put new security measures in place.
As expected, Twitter took the two-factor authentication approach with their new login verification feature. The feature, which is optional, can be set up on the account settings page. You need to add your phone number to the account, after which Twitter will always send a six-digit verification code to that phone that you will be required to enter every time you try to sign into your Twitter account. You may turn off login verification anytime, but as long as it is on, you won’t be able to sign in on any computer without your phone on hand.
For those that access Twitter via an app on their phone, Twitter warns that it may not work with some cell phone providers because the current release of login verification “is built on top of Twitter via SMS, so we need to be able to send a text to your phone before you can enroll in login verification.”
Symantec Releases Threat Analysis for 2007 (Part 1)
Posted on December 18th, 2014 at 8:20 am by Avatar
Symantec Inc., one of the industry’s leaders in virus and internet protection software has released their analyses of malware activities that wanted to steal personal information for the year 2007. It shows that from Jan to Jun last year, there were almost 7,000 incidents of attacks on the internet and systems their software are protecting while almost double for the next half year. This trend is quite alarming for cyber attacks have grown considerably that more and more people are falling victim to such attacks. The company conducts their own hacker communications analyses and other intelligence by analyzing information they set in honey-pots (purposely set traps to track hacker activities) and the results their software sends in to them for analyses.
Symantec Releases Threat Analysis for 2007 (Part 2)
Posted on December 11th, 2014 at 6:38 am by Avatar
They also report that the amount of malware has increased significantly with them growing ever complex making it harder for industry to cope unless there is mass infections. The initial detection of a threat mobilizes emergency centers that these software company’s have who work against the clock to provide updates to their many registered subscribers which they send updates to once they have the cure. They also send out updates to virus signature databases which allows the anti-virus, Intrusion detection and Prevention Systems to counter attacks by letting them recognize them hopefully in time to prevent mass infection.
Mock Penetration Attacks a Must for Federal Agencies
Posted on December 4th, 2014 at 5:58 am by Avatar
The NIST, has come out with a recommendation for all Federal government agencies to mount mock attacks to see the robustness and effectivity of security and penetration prevention measures/countermeasures that are employed. This due to alarming events that have happened to the British Government�s Tax Offices of junior government people getting hold and rights to download supposedly secure data from government servers. The US Government IT branch recommends that it be done on undisclosed schedules and employ rotating modes of attack to see if all the security in place is doing its job of protecting the information it is supposed to protect.
Posted on November 27th, 2014 at 5:03 am by Kitch
PC World recently placed Kaspersky 2012 on the 4th spot in the roundup of security suites. It is developed by Kaspersky Lab and works with Microsoft Windows. This software is an all in one computer protection. It keeps you safe from malware and phishing websites while you’re online – shopping, banking and social networking. For a reasonable $80, this will cover a whole year of protection of up to three PCs. You can also protect your family. You can control access to the internet, games and websites. You will have full control at all times! There are back up and restore features to protect any photos, videos or files that are important to you. In case of loss or theft, or crash of hard drives there will be no need for panic. You can put your own password to avoid any paranoia. The speed and efficiency of your computer won’t be compromised.
How a Web proxy Server works?
Posted on November 20th, 2014 at 4:30 am by Grace
Image source: www.filesharefreak.com
The word “proxy” means “to go between.” Proxy servers act as a filter between your computer and the Internet. The most popular use of this technology is to provide anonymous web surfing from any location in the world.
When using a web proxy server, you are technically not connecting to the Internet; instead, you are connecting to a remote computer or server which is connected to the Internet. Therefore, you are able to surf the Internet “by proxy.”
When surfing the net on a free web proxy server, your Internet browser history will reveal only that you have connected to the proxy site, not the actual web sites you have visited. Using a proxy server will also eliminate the problem of web sites depositing so-called “cookies” on your computer.
Improving Cyber Security
Posted on November 13th, 2014 at 3:22 am by Avatar
The House of Representatives of the US have raised questions regarding possible danger scenario’s which could become problematic with the US Federal government’s plan to distance government networks from the rest of the internet. The move coined “The Cyber Initiative” would dramatically block out links to government sites in hopes of beefing up security as they are come of the most attacked sites on earth. This would come in the form of more data monitoring systems on government web sites aimed at preventing malicious cyber-attacks. The government has done so along with the implementation of full disclosure which re-defined the way and period information should be made available to them upon request. More on this matter, this is a move to beef up homeland security which is seen by many as restrictive but is argued to be an initiative that is essential for Homeland Security.
Cyber-crime targets Search Engines (Part 2)
Posted on November 6th, 2014 at 3:16 am by Avatar
Many attempts by business and even governments to block unauthorized internet access and usage has failed miserably for the internet has broken out of the wired form giving it added access points with the advent of wireless technology. Mobile computing products are gaining ground as offices go into the wireless office. The mischief occurs when an unsuspecting user does a search and gets a seemingly relevant list of results which have been in fact loaded with malicious code that can trick people into believing they are at a relevant site which is in fact a phishing site that takes information from them then passes them onto the valid site without even knowing any malicious activity has occurred.
Twitter Taking Measures to Step Up Security
Posted on October 30th, 2014 at 2:53 am by Hannah
CNet recently reported that Twitter is working on stepping up security, probably via two-factor authentication. This came in the heels of security breaches that resulted in the hacking of Twitter accounts of popular new programs from CBS.
According to CNET’s Dara Kerr, that Twitter is already “currently carrying out internal testing before rolling out the new security control” shouldn’t come as a surprise since the social site was looking for a software engineer back in February whose job description called for designing and developing security measures using “multifactor authentication”.
While two-factor authentication might not be enough to deter the best hackers, it is still a positive step towards better website security on the website since it will make it harder for them to log into Twitter accounts. Of course, this will also making logging in a bit of a hassle for the actual account owner, but that’s something we’d gladly take on if only it will keep our accounts more secure.
Network Intrusion Detection Systems
Posted on October 22nd, 2014 at 10:22 pm by Avatar
Network Intrusion Detection Systems have a sole purpose which is to analyze data packets entering a network while looking for signatures of known malware. These signatures are constantly updated as new threats are detected so they are always on the lookout for a growing number of threats that keep on getting better and better at what they do. A detection system checks for any suspicious activity and then notifies the right people who then do the desired actions that have been laid out. Much like a citizen who calls the cops to report a criminal, it works the same way with the system being the caller and the dispatcher in detection side, and the cops on the System Administration side who takes action and apprehends the suspected criminal. They are however quite dependent on the ability of their handlers (System Administrator’s) to handle the threat as it should be. Miscalculations or lack of action can render it useless defeating its purpose. A better solution will be discussed in the next post that is more pro-active in the quest to protect the corporate network.