Cisco Issues Patch for Email Security App Vulnerabilities
Posted on June 27th, 2013 at 7:49 pm by Hannah
Security issues in web apps, such as emails, are quite common and CISCO’s Email Security Appliance is no different. In fact, according to Cisco’s security advisory, there are multiple vulnerabilities in their email app.
The vulnerabilities include the following:
1. Web Framework Authenticated Command Injection Vulnerability,
2. IronPort Spam Quarantine Denial of Service Vulnerability, and
3. Management GUI Denial of Service Vulnerability
In response to these issues, Cisco released a free software update containing workarounds to the said vulnerabilities.
Again, just like software security issues, software updates are very common and are issued by software makers left and right. These updates may contain anything, from service upgrades to security patches, which is why it is of utmost importance that as a user you download these whenever they are made available. This is especially true for security software.
The easiest way to ensure that your computer software stays updated is by enabling automatic updaters, which is something most software these days provide.
Twitter Login Verification Feature Now Available
Posted on May 25th, 2013 at 3:23 am by Hannah
Last month, we reported that Twitter was stepping up their game to put new security measures in place.
As expected, Twitter took the two-factor authentication approach with their new login verification feature. The feature, which is optional, can be set up on the account settings page. You need to add your phone number to the account, after which Twitter will always send a six-digit verification code to that phone that you will be required to enter every time you try to sign into your Twitter account. You may turn off login verification anytime, but as long as it is on, you won’t be able to sign in on any computer without your phone on hand.
For those that access Twitter via an app on their phone, Twitter warns that it may not work with some cell phone providers because the current release of login verification “is built on top of Twitter via SMS, so we need to be able to send a text to your phone before you can enroll in login verification.”
Posted on May 3rd, 2013 at 9:58 am by Hannah
McAfee is a known company that caters to securing the numerous forms of technology. The following are just some of the uses of the McAfee Security: Protection of Data and Database, Email and Web Security, and Network and Mobile Security. Taking for instance its feature that focus on Email and Web Security, this is important mainly because the Web involves a wide range of programs, applications, and users that make it more susceptible to infection and breakdown due to increasing viruses and malware. Features of this email and web security aim to protect the web from threats, prevent the occurrence of loss data, and resist malwares. Through these features, users will definitely enjoy the usage of both the email and the web and not worrying about the increase in viruses and threats. With McAfee Security, one is given that secured usage ensuring that one’s technology is safe from corruption and the risk of system failure is minimized.
Posted on May 3rd, 2013 at 9:57 am by Hannah
Computer Viruses lead to harmful effects from the simple deleting of one’s files to having the aim of getting important information from one’s computer to be used to further infect other users. File infection virus and email virus are the most evident types at present. File infection virus is made to attach to programs and files resulting to these being deleted, corrupted, or transferred to another location. If this kind of virus is not detected, this will just eventually affect every program in the computer and worst, affect its functionality as a whole. On the other hand, email viruses are most often seen in the spam folder. Also, it may be in a form of a message that appears to be sent by one of the existing email addresses in one’s account. This message usually consists a link that when clicked, will result to a virus. It is very important that when one uses any form of technology, he or she must know if a virus is present. Nevertheless, the usage of the Internet should as well involve limitations such as visiting restricted sites.
Web Security: Why is it needed?
Posted on May 3rd, 2013 at 9:56 am by Hannah
Web-based application and programs are known for its wide use therefore being easily accessed by almost all users. With this being said, it is inevitable that there will be occurring problems related to viruses, hacking, and illegal usage that if not considered, could lead to Web malfunction and breakdown. These problems are main reasons on to why there is a need for web security. This can be done in ways such as ensuring that information and involved networks are remained confidential. Also, it is helpful if the programmer is aware of all possible occurring threats at the very instant that a web application is made. This is to know if there are viruses and malwares being presented to the Web and knowing that there is a need to prevent them. Most importantly, a Web Security System is encouraged. This is to cater to the continuous increase in threats in the web that usually arise from users’ unawareness of illegal and restricted sites.
Security Issues in Web Applications
Posted on May 3rd, 2013 at 9:55 am by Hannah
There is an alarming increase of security issues in Web Applications and these include problems on access control and insecure storage. Problems on access control include unauthorized access of user accounts. Also, under this falls the increase in users abusing the freedom of web applications functions making them use these for illegal purposes and benefits arising to spams and viruses. On the other hand, there are as well problems related to insecure storage. Nowadays, the increase in users didn’t only lead to an increase in market of these web applications but also to the increase in unauthorized users that result to personal information being illegally accessed. This led to the rise of web applications that involve weak protection. There are more to these two stated issues which users should always be cautious about. These issues, if taken for granted, may lead to even more serious problems such as system breakdown.
Twitter Taking Measures to Step Up Security
Posted on April 25th, 2013 at 3:26 am by Hannah
CNet recently reported that Twitter is working on stepping up security, probably via two-factor authentication. This came in the heels of security breaches that resulted in the hacking of Twitter accounts of popular new programs from CBS.
According to CNET’s Dara Kerr, that Twitter is already “currently carrying out internal testing before rolling out the new security control” shouldn’t come as a surprise since the social site was looking for a software engineer back in February whose job description called for designing and developing security measures using “multifactor authentication”.
While two-factor authentication might not be enough to deter the best hackers, it is still a positive step towards better website security on the website since it will make it harder for them to log into Twitter accounts. Of course, this will also making logging in a bit of a hassle for the actual account owner, but that’s something we’d gladly take on if only it will keep our accounts more secure.
NBC Malware Attack
Posted on February 22nd, 2013 at 10:49 am by Hannah
Even the most popular of sites get hacked despite the security measures they put in place. The frightening thing though is that malicious attacks are not confined to obvious targets like financial institutions such as banks, but even entertainment sites like NBC.com.
NBC’s website was blocked yesterday both by Google and Facebook after it fell victim to the Citadel Trojan. The malware, which usually attacks financial institutions, harvests sensitive data from users and visitors of the affected site. It also further affects visitors since the malware embeds itself on individual PCs.
While NBC’s site is up and running again, malware attacks such as this are becoming even more common each day. This makes finding new approaches to web security, like the start-up ReShape is supposedly working on, even more important. After all, playing catch-up with hackers is something that everyone agrees would be better if it were a thing of the past.
Image via NBC.com
Data Loss: Not a Problem with These Basic Web Security Techniques
Posted on February 3rd, 2013 at 5:58 pm by Mish Asia
Security issues, one topic that scores of programmers worry about. In this day and age, offline or online, no one is exempted from the bad elements this world has to offer. However it is more unlikely to occur that web security can be that of an issue today, since there are security protocols and backups provided by the latest technology. Technology can still hold off these cyber infiltrators.
Web security techniques that you can count on are redundant servers. Let us say you have a client, a Thai school and under that site, pages from the home page to the Thai classes page was hacked because you did not avail a backup server that does not have sufficient backups.
Availing a server with redundant servers is a must as these will help you prevent from experiencing data loss. This technique is the best way to tell your clients that whenever a hacker tries to hack their data, a backup is always around to support any illegal access to your files or data. This type of support helps both the programmer and the client save their effort, money and time from hackers. The only party that looses something here is the hacker.
Start-up Out to ReShape the Web Security Scene
Posted on January 22nd, 2013 at 4:04 pm by Hannah
Very little is still known about the actual web security product that start-up Shape Security is working on, but the excitement and full support of its big name investors are quickly drawing everyone’s eyes on what they claim would reshape the whole web security industry.
All we know so far is what Shape Security claims on its site:
“Shape alters the economics of web hacking. We shift costs from defenders to attackers, forcing hackers to spend much more to achieve much less. Our military-grade technology doesn’t rely on past signatures, so it uniquely protects against zero-day and other advanced threats.”
It has also been reported that the new product will be released by the end of the year if not early 2014. This means that while we may not really understand what’s in the works right now and just how exactly they will improve cyber security, relying on conventional malware and spyware software may be a thing of the past really soon.
Image via Shape Security