How a Web proxy Server works?
Posted on November 20th, 2014 at 4:30 am by Grace

Image source: www.filesharefreak.com

The word “proxy” means “to go between.” Proxy servers act as a filter between your computer and the Internet. The most popular use of this technology is to provide anonymous web surfing from any location in the world.

When using a web proxy server, you are technically not connecting to the Internet; instead, you are connecting to a remote computer or server which is connected to the Internet. Therefore, you are able to surf the Internet “by proxy.”

When surfing the net on a free web proxy server, your Internet browser history will reveal only that you have connected to the proxy site, not the actual web sites you have visited. Using a proxy server will also eliminate the problem of web sites depositing so-called “cookies” on your computer.

Improving Cyber Security
Posted on November 13th, 2014 at 3:22 am by Avatar

homesec.jpgThe House of Representatives of the US have raised questions regarding possible danger scenario’s which could become problematic with the US Federal government’s plan to distance government networks from the rest of the internet. The move coined “The Cyber Initiative” would dramatically block out links to government sites in hopes of beefing up security as they are come of the most attacked sites on earth. This would come in the form of more data monitoring systems on government web sites aimed at preventing malicious cyber-attacks. The government has done so along with the implementation of full disclosure which re-defined the way and period information should be made available to them upon request. More on this matter, this is a move to beef up homeland security which is seen by many as restrictive but is argued to be an initiative that is essential for Homeland Security.

Cyber-crime targets Search Engines (Part 2)
Posted on November 6th, 2014 at 3:16 am by Avatar

cybercrime.jpgMany attempts by business and even governments to block unauthorized internet access and usage has failed miserably for the internet has broken out of the wired form giving it added access points with the advent of wireless technology. Mobile computing products are gaining ground as offices go into the wireless office. The mischief occurs when an unsuspecting user does a search and gets a seemingly relevant list of results which have been in fact loaded with malicious code that can trick people into believing they are at a relevant site which is in fact a phishing site that takes information from them then passes them onto the valid site without even knowing any malicious activity has occurred.

Twitter Taking Measures to Step Up Security
Posted on October 30th, 2014 at 2:53 am by Hannah

twitter birdCNet recently reported that Twitter is working on stepping up security, probably via two-factor authentication. This came in the heels of security breaches that resulted in the hacking of Twitter accounts of popular new programs from CBS.

According to CNET’s Dara Kerr, that Twitter is already “currently carrying out internal testing before rolling out the new security control” shouldn’t come as a surprise since the social site was looking for a software engineer back in February whose job description called for designing and developing security measures using “multifactor authentication”.

While two-factor authentication might not be enough to deter the best hackers, it is still a positive step towards better website security on the website since it will make it harder for them to log into Twitter accounts. Of course, this will also making logging in a bit of a hassle for the actual account owner, but that’s something we’d gladly take on if only it will keep our accounts more secure.

Photo Credit

Network Intrusion Detection Systems
Posted on October 22nd, 2014 at 10:22 pm by Avatar

ids.jpgNetwork Intrusion Detection Systems have a sole purpose which is to analyze data packets entering a network while looking for signatures of known malware. These signatures are constantly updated as new threats are detected so they are always on the lookout for a growing number of threats that keep on getting better and better at what they do. A detection system checks for any suspicious activity and then notifies the right people who then do the desired actions that have been laid out. Much like a citizen who calls the cops to report a criminal, it works the same way with the system being the caller and the dispatcher in detection side, and the cops on the System Administration side who takes action and apprehends the suspected criminal. They are however quite dependent on the ability of their handlers (System Administrator’s) to handle the threat as it should be. Miscalculations or lack of action can render it useless defeating its purpose. A better solution will be discussed in the next post that is more pro-active in the quest to protect the corporate network.

BlackBerry’s Web Security
Posted on October 15th, 2014 at 8:57 pm by Grace

23.jpgby Andrea Mella

Internet service resources in India are asking to put an end to BlackBerry’s services unless RIM supplied the government with a way to poke around on the communications. If precise, the taunt would bring to a head a subject that has been exhausted on for at least the two months, when Indian officials began inquiring about RIM for a means to interrupt BlackBerry communications, quoting terrorism concerns related to Kashmir. The Indian government requested RIM to moreover supply with some type of master key for loosening encrypted BlackBerry communications or to set connections via a server in the country from end to end which infrastructures could be in retreat and in all probability cut off as needed. 

Data Center Services Security in Northern Europe Gets a Boost from NTT
Posted on October 8th, 2014 at 8:09 pm by Grace

The global data center service industry has been relatively flourishing despite the prevailing economic difficulties in the past couple of years. Business continue to survive, and many of these businesses rely on data center providers for their information handling needs.

Perhaps one indication that the industry is thriving is the recent news that NTT Communications made a move to acquire Secode AB, a leading name in the managed-security and security-consulting arena in Northern Europe. This move has been hailed by many as beneficial to all the parties involved.

NTT Communications is the long distance and international arm of the well known company, NTT. Having established the brand worldwide, it has been the main choice of many businesses. NTT Communications offer various data center services to its customers from all corners of the world. With this acquisition, it only hopes to further strengthen its services in terms of security.

NTT Communications offers data center services in more than 31 cities in 20 countries/regions. Any client can expect excellent quality, characterized by:

  • Full-scale preparations for power outage and fire disaster.
  • Green data center equipped with efficient cooling facilities.
  • Security system installing the latest authentication methods.
  • 24 ⁄ 7 operation and maintenance system
  • System redundancy in power supply, air conditioning and network.
  • Stable network achieved by using backbones and access lines from multiple carriers
  • Quality is certified by NTT Communications Data Center standards.

While the acquisition involves a company local to a certain region, the effects on the security of the data center services of NTT shall certainly be felt system-wide, geographic barriers notwithstanding.

Start-up Out to ReShape the Web Security Scene
Posted on October 1st, 2014 at 6:41 pm by Hannah

shape-security-logoVery little is still known about the actual web security product that start-up Shape Security is working on, but the excitement and full support of its big name investors are quickly drawing everyone’s eyes on what they claim would reshape the whole web security industry.

All we know so far is what Shape Security claims on its site:

“Shape alters the economics of web hacking. We shift costs from defenders to attackers, forcing hackers to spend much more to achieve much less. Our military-grade technology doesn’t rely on past signatures, so it uniquely protects against zero-day and other advanced threats.”

It has also been reported that the new product will be released by the end of the year if not early 2014. This means that while we may not really understand what’s in the works right now and just how exactly they will improve cyber security, relying on conventional malware and spyware software may be a thing of the past really soon.

Image via Shape Security

Scareware pop-ups Sued
Posted on September 24th, 2014 at 5:47 pm by Grace

Image Source: symantec.com

Seeing ‘WARNING: YOUR COMPUTER IS VULNERABLE! CLICK HERE TO PROTECT YOURSELF!’ can just mean there’s something is not working in your system security. NOT! Theres a new spyware that displays this kind of message which brings panic to its users. And tricks them into purchasing bogus applications or products to fix the vulnerability. These are clearly scams. Malwares. It is designed primarily to scare you into purchasing or giving out your information. It pretends to help you solve the problems that it has found in your system by paying a premium and they will take care of the rest. Microsoft and the state of Washington has filed a lawsuit against a few companies, one of the companies is from Texas, a firm that sells Registry Cleaner XP for $40. The big companies like Microsoft continuously run after these copycats. With the 2005 Computer Spyware Act backing them up but the suspects are hard to find.

Norton Anti-Virus
Posted on September 17th, 2014 at 5:16 pm by Grace

20.jpgby Andrea Mella

Norton Identity Safe encrypts your passwords and added confidential data repeatedly while satisfying your demand to put away time and look after it from being stolen by listening in keystroke loggers. This anti-virus software runs inaudibly in the background with no requirements in perplexing security alerts. The Norton Internet Security mechanically optimizes your security settings. It distributes non obligatory solutions for you and your family as well as antispam and parental controls. The two-way firewall obstructs the hackers from flouting into your computer and discontinue spyware from broadcasting information. The recently discovered security gaps in the operating system and applications were used to avoid viruses, worms, and hackers from incoming all the way through these vulnerabilities.

« Previous Entries