Network Intrusion Protection Systems
Posted on June 26th, 2015 at 2:00 pm by Avatar

ips.jpgPreviously we discussed the importance of having an intrusion detection system to handle the growing number of attacks on corporate networks with Intrusion Detection Systems. A better solution would be to give some form of control to the detection system giving it teeth to execute actions that would prevent intrusion such as denying access or deleting errant file attachments. This comes in the form of Intrusion Prevention Systems which have the ability to detect, analyze and take appropriate action as programmed to do so by the systems administrators who then gets a detailed report on what was done. This allows them to review and take further action if the file was simply quarantined and not deleted by the system. They can then be submitted to the software vendor so they can analyze and formulate a solution to the threat providing feedback to prevent further infections.

Start-up Out to ReShape the Web Security Scene
Posted on June 19th, 2015 at 1:13 pm by Hannah

shape-security-logoVery little is still known about the actual web security product that start-up Shape Security is working on, but the excitement and full support of its big name investors are quickly drawing everyone’s eyes on what they claim would reshape the whole web security industry.

All we know so far is what Shape Security claims on its site:

“Shape alters the economics of web hacking. We shift costs from defenders to attackers, forcing hackers to spend much more to achieve much less. Our military-grade technology doesn’t rely on past signatures, so it uniquely protects against zero-day and other advanced threats.”

It has also been reported that the new product will be released by the end of the year if not early 2014. This means that while we may not really understand what’s in the works right now and just how exactly they will improve cyber security, relying on conventional malware and spyware software may be a thing of the past really soon.

Image via Shape Security

Google Earth’s Web Security
Posted on June 12th, 2015 at 12:35 pm by Grace

21.jpgby Andrea Mella

F-Secure moved toward with attractive and conspicuous ground-breaking scheme wherever they are following spams, worms and malwares and incorporating it with them unswervingly and reliably on to Google Earth. This offers a beautiful and orderly proposal from where things are coming. As a matter of fact, they are pursuing first with IP which is rehabilitated to leeway and longitude and creates and generated it in Google Earth. In consequence, they have produced a world map which allocates an absolute examination and level of infection of worms, malwares according to continent and how the virus has changed over the period of time. 

NBC Malware Attack
Posted on June 5th, 2015 at 11:07 am by Hannah

NBC logoEven the most popular of sites get hacked despite the security measures they put in place. The frightening thing though is that malicious attacks are not confined to obvious targets like financial institutions such as banks, but even entertainment sites like NBC.com.

NBC’s website was blocked yesterday both by Google and Facebook after it fell victim to the Citadel Trojan. The malware, which usually attacks financial institutions, harvests sensitive data from users and visitors of the affected site. It also further affects visitors since the malware embeds itself on individual PCs.

While NBC’s site is up and running again, malware attacks such as this are becoming even more common each day. This makes finding new approaches to web security, like the start-up ReShape is supposedly working on, even more important. After all, playing catch-up with hackers is something that everyone agrees would be better if it were a thing of the past.

Image via NBC.com

SharePoint Server 2010 Data Connection Library
Posted on May 29th, 2015 at 10:09 am by Grace

What is a Data Connection Library in SharePoint Server 2010?
A Data Connection Library in Microsoft SharePoint Server 2010 is a library that can contain two kinds of data connections: an Office Data Connection (ODC) file or a Universal Data Connection (UDC) file. Microsoft InfoPath 2010 uses data connections that comply with the Universal Data Connection (UDC) file schema and typically have either a *.udcx or *.xml file name extension. Data sources described by these data connections are stored on the server and can be used in standard form templates and browser-enabled form templates. (Read the rest of this story.)

China Tops Exploitation
Posted on May 22nd, 2015 at 9:19 am by Grace

Image Source: techshout.com

Trojans are still the biggest threats in the internet today. Although vulnerabilities like the one recently found in Microsoft MS08-067, is fast decreasing, it is much more easy to attck or exploit. and recent studioes show that Chinese computers are the number one most infected with exploits that are browser based. In the last 12 months, vulnerabilities have decreased by 20% compared to last year. But the percentage of the known vulnerabilities that are easy to exploit has gone up 56%. Vulnerabilities in operating systems have continually declined . it is reported that Microsoft have already released many patches for the security flaws amounting to almost 77 vulnerabilities in the first half of the year. The lowest rate of infection is in Japan.

Symantec Releases Threat Analysis for 2007 (Part 2)
Posted on May 15th, 2015 at 9:07 am by Avatar

sym2.jpgThey also report that the amount of malware has increased significantly with them growing ever complex making it harder for industry to cope unless there is mass infections. The initial detection of a threat mobilizes emergency centers that these software company’s have who work against the clock to provide updates to their many registered subscribers which they send updates to once they have the cure. They also send out updates to virus signature databases which allows the anti-virus, Intrusion detection and Prevention Systems to counter attacks by letting them recognize them hopefully in time to prevent mass infection.

Conficker Awakens
Posted on May 8th, 2015 at 8:28 am by Grace

confickerAs expected, the much awaited zero day for the Conficker worm (aka. Downadup) has sprung back to life when the date turned to April 1, the set date for the malicious activity of the said malware. Security centers have been waiting for the worm to come back to life and as expected it did, issuing re-configured processes and spreading malware to more computers worldwide. The widespread distribution of the worm has been worrying security experts who have been working hard to counter the damage the malicious worm causes, to some success for the world’s security software have been able to protect the rest of the world form the damage it would have caused.
(Read the rest of this story.)

McAfee Security
Posted on May 1st, 2015 at 7:26 am by Hannah

McAfee is a known company that caters to securing the numerous forms of technology. The following are just some of the uses of the McAfee Security: Protection of Data and Database, Email and Web Security, and Network and Mobile Security. Taking for instance its feature that focus on Email and Web Security, this is important mainly because the Web involves a wide range of programs, applications, and users that make it more susceptible to infection and breakdown due to increasing viruses and malware. Features of this email and web security aim to protect the web from threats, prevent the occurrence of loss data, and resist malwares. Through these features, users will definitely enjoy the usage of both the email and the web and not worrying about the increase in viruses and threats. With McAfee Security, one is given that secured usage ensuring that one’s technology is safe from corruption and the risk of system failure is minimized.

Data Center Services Security in Northern Europe Gets a Boost from NTT
Posted on April 24th, 2015 at 5:46 am by Grace

The global data center service industry has been relatively flourishing despite the prevailing economic difficulties in the past couple of years. Business continue to survive, and many of these businesses rely on data center providers for their information handling needs.

Perhaps one indication that the industry is thriving is the recent news that NTT Communications made a move to acquire Secode AB, a leading name in the managed-security and security-consulting arena in Northern Europe. This move has been hailed by many as beneficial to all the parties involved.

NTT Communications is the long distance and international arm of the well known company, NTT. Having established the brand worldwide, it has been the main choice of many businesses. NTT Communications offer various data center services to its customers from all corners of the world. With this acquisition, it only hopes to further strengthen its services in terms of security.

NTT Communications offers data center services in more than 31 cities in 20 countries/regions. Any client can expect excellent quality, characterized by:

  • Full-scale preparations for power outage and fire disaster.
  • Green data center equipped with efficient cooling facilities.
  • Security system installing the latest authentication methods.
  • 24 ⁄ 7 operation and maintenance system
  • System redundancy in power supply, air conditioning and network.
  • Stable network achieved by using backbones and access lines from multiple carriers
  • Quality is certified by NTT Communications Data Center standards.

While the acquisition involves a company local to a certain region, the effects on the security of the data center services of NTT shall certainly be felt system-wide, geographic barriers notwithstanding.

« Previous Entries