Twitter Taking Measures to Step Up Security
Posted on October 30th, 2014 at 2:53 am by Hannah
CNet recently reported that Twitter is working on stepping up security, probably via two-factor authentication. This came in the heels of security breaches that resulted in the hacking of Twitter accounts of popular new programs from CBS.
According to CNET’s Dara Kerr, that Twitter is already “currently carrying out internal testing before rolling out the new security control” shouldn’t come as a surprise since the social site was looking for a software engineer back in February whose job description called for designing and developing security measures using “multifactor authentication”.
While two-factor authentication might not be enough to deter the best hackers, it is still a positive step towards better website security on the website since it will make it harder for them to log into Twitter accounts. Of course, this will also making logging in a bit of a hassle for the actual account owner, but that’s something we’d gladly take on if only it will keep our accounts more secure.
Network Intrusion Detection Systems
Posted on October 22nd, 2014 at 10:22 pm by Avatar
Network Intrusion Detection Systems have a sole purpose which is to analyze data packets entering a network while looking for signatures of known malware. These signatures are constantly updated as new threats are detected so they are always on the lookout for a growing number of threats that keep on getting better and better at what they do. A detection system checks for any suspicious activity and then notifies the right people who then do the desired actions that have been laid out. Much like a citizen who calls the cops to report a criminal, it works the same way with the system being the caller and the dispatcher in detection side, and the cops on the System Administration side who takes action and apprehends the suspected criminal. They are however quite dependent on the ability of their handlers (System Administrator’s) to handle the threat as it should be. Miscalculations or lack of action can render it useless defeating its purpose. A better solution will be discussed in the next post that is more pro-active in the quest to protect the corporate network.
BlackBerry’s Web Security
Posted on October 15th, 2014 at 8:57 pm by Grace
by Andrea Mella
Internet service resources in India are asking to put an end to BlackBerry’s services unless RIM supplied the government with a way to poke around on the communications. If precise, the taunt would bring to a head a subject that has been exhausted on for at least the two months, when Indian officials began inquiring about RIM for a means to interrupt BlackBerry communications, quoting terrorism concerns related to Kashmir. The Indian government requested RIM to moreover supply with some type of master key for loosening encrypted BlackBerry communications or to set connections via a server in the country from end to end which infrastructures could be in retreat and in all probability cut off as needed.
Data Center Services Security in Northern Europe Gets a Boost from NTT
Posted on October 8th, 2014 at 8:09 pm by Grace
The global data center service industry has been relatively flourishing despite the prevailing economic difficulties in the past couple of years. Business continue to survive, and many of these businesses rely on data center providers for their information handling needs.
Perhaps one indication that the industry is thriving is the recent news that NTT Communications made a move to acquire Secode AB, a leading name in the managed-security and security-consulting arena in Northern Europe. This move has been hailed by many as beneficial to all the parties involved.
NTT Communications is the long distance and international arm of the well known company, NTT. Having established the brand worldwide, it has been the main choice of many businesses. NTT Communications offer various data center services to its customers from all corners of the world. With this acquisition, it only hopes to further strengthen its services in terms of security.
NTT Communications offers data center services in more than 31 cities in 20 countries/regions. Any client can expect excellent quality, characterized by:
- Full-scale preparations for power outage and fire disaster.
- Green data center equipped with efficient cooling facilities.
- Security system installing the latest authentication methods.
- 24 ⁄ 7 operation and maintenance system
- System redundancy in power supply, air conditioning and network.
- Stable network achieved by using backbones and access lines from multiple carriers
- Quality is certified by NTT Communications Data Center standards.
While the acquisition involves a company local to a certain region, the effects on the security of the data center services of NTT shall certainly be felt system-wide, geographic barriers notwithstanding.
Start-up Out to ReShape the Web Security Scene
Posted on October 1st, 2014 at 6:41 pm by Hannah
Very little is still known about the actual web security product that start-up Shape Security is working on, but the excitement and full support of its big name investors are quickly drawing everyone’s eyes on what they claim would reshape the whole web security industry.
All we know so far is what Shape Security claims on its site:
“Shape alters the economics of web hacking. We shift costs from defenders to attackers, forcing hackers to spend much more to achieve much less. Our military-grade technology doesn’t rely on past signatures, so it uniquely protects against zero-day and other advanced threats.”
It has also been reported that the new product will be released by the end of the year if not early 2014. This means that while we may not really understand what’s in the works right now and just how exactly they will improve cyber security, relying on conventional malware and spyware software may be a thing of the past really soon.
Image via Shape Security
Scareware pop-ups Sued
Posted on September 24th, 2014 at 5:47 pm by Grace
Image Source: symantec.com
Seeing ‘WARNING: YOUR COMPUTER IS VULNERABLE! CLICK HERE TO PROTECT YOURSELF!’ can just mean there’s something is not working in your system security. NOT! Theres a new spyware that displays this kind of message which brings panic to its users. And tricks them into purchasing bogus applications or products to fix the vulnerability. These are clearly scams. Malwares. It is designed primarily to scare you into purchasing or giving out your information. It pretends to help you solve the problems that it has found in your system by paying a premium and they will take care of the rest. Microsoft and the state of Washington has filed a lawsuit against a few companies, one of the companies is from Texas, a firm that sells Registry Cleaner XP for $40. The big companies like Microsoft continuously run after these copycats. With the 2005 Computer Spyware Act backing them up but the suspects are hard to find.
Posted on September 17th, 2014 at 5:16 pm by Grace
by Andrea Mella
Norton Identity Safe encrypts your passwords and added confidential data repeatedly while satisfying your demand to put away time and look after it from being stolen by listening in keystroke loggers. This anti-virus software runs inaudibly in the background with no requirements in perplexing security alerts. The Norton Internet Security mechanically optimizes your security settings. It distributes non obligatory solutions for you and your family as well as antispam and parental controls. The two-way firewall obstructs the hackers from flouting into your computer and discontinue spyware from broadcasting information. The recently discovered security gaps in the operating system and applications were used to avoid viruses, worms, and hackers from incoming all the way through these vulnerabilities.
Cyberattackers Focus on Social Networks
Posted on September 10th, 2014 at 3:47 pm by editor
If you have a MySpace or Facebook account, you may be a prime target of cyberattackers. They usually do this by sending Trojans through apps or widgets that your friends sent you. According to researchers at Finjan, cyberattackers are now going to these social networking sites such to get more victims.
“Attacks will become more sophisticated by combining several services in order to heighten infection ratios and decrease the detection rate, while providing more robust and scalable attack frameworks,” Yuval Ben-Itzhak, chief technology officer, Finjan, said in a news release. “The focus will be on trojan technology as it enables maximum flexibility in terms of command and control. This adds another potentially malicious element to the ‘legitimate’ web traffic that needs to be examined by security solutions.”
In short, before installing the app or widget that your friend sent you, confirm if it came from them. If it didn’t, kindly delete it immediately. If it did come from them, research on the app or widget from previous users.
Microsoft’s Windows 7 – Opening Pandora’s Box
Posted on September 3rd, 2014 at 2:31 pm by Grace
There has been much talk about the problem associated with the so-called Pandora’s box that is Microsoft’s UAC or User Account Control. This is one of the most unforgettable features of Vista where it first appeared as the ever present annoying pop-up window that asked for permission on almost each and every mouse click (exaggerated). The danger is that the said control feature seems to fail to revert to default security settings after a user has signed into the system as the systems administrator. After this event, use of all applications thereafter have been found to have default settings of the admin without reverting to previously set security settings that can be a wide open door for hackers to exploit. (Read the rest of this story.)
No Adware Pro
Posted on August 27th, 2014 at 1:19 pm by Grace
No Adware Pro. Guys, check out the latest adware remover. It is called, No Adware Pro. It is a user-friendly adware remover. You can regularly update it so as to identify the latest threats that hac come out in the internet. Its quite a simple tool. It will scan your PC from time to time, for different known spywares, adwares, dialers and web bugs. You can configure various browsers to protect your computer when surfing online. Whats more is, it’s protecting you through a shield, in real time. It means, the software will prevent malicious items we detect, from ever running on our PCs instantly! It has a scheduler, which enables you to program the adware remover, when its supposed to scan the whole system.