Inside the Briefcase


Beginners Guide to SSL

Beginners Guide to SSL

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. This guide will de-mystify the technology involved and give you the...

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Symantec EV SSL turns address bars green in high-security browsers for an extra layer of website security that customers can see and trust.

Choosing a Cloud Supplier with Confidence

Choosing a Cloud Supplier with Confidence

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting...

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.

Internet Security Threat Report 2012

Internet Security Threat Report 2012

These resources give Symantec’s analysts’ unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report....





Briefcase Highlights


DATA SECURITY

Symantec and VMware Accelerate Business Critical Virtualization and Help Customers and Partners Confidently Transition to the Cloud

August 27, 2012 No Comments

Symantec Corp. (NASDAQ: SYMC) today announced new solutions and technical integrations with VMware across its product portfolio to provide higher levels of protection for virtualized environments. Together, Symantec and VMware enable SMBs and enterprises to use the benefits of virtualization without compromising protection.

New Version of McAfee Mobile Security Provides Advanced Privacy Features For Smartphone and Tablet Users

August 27, 2012 No Comments

McAfee today announced enhancements to its McAfee® Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure apps are not accessing their personal information without their knowledge. This new offering gives consumers access to an added layer of protection to preserve their privacy and protection against financial fraud, identity theft and viruses.

McAfee Offers New Privacy Protection to Android Device Users

August 27, 2012 No Comments

McAfee is expanding its mobile security solution with privacy features to protect Android tablet and smartphone users from apps that may look to access personal information on their devices.

Futura Mobility, MobileIron Team Up on BYOD and Mobile Security, Management

August 22, 2012 No Comments

Futura Mobility, an enterprise provider of end-to-end mobile technology solutions, is teaming up with MobileIron, a provider of security and management for mobile apps, content, and devices, to expand BYOD and other enterprise mobility strategies that require ease of management and rich security services.

Beginners Guide to SSL

August 22, 2012 No Comments

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

August 21, 2012 No Comments

Symantec EV SSL turns address bars green in high-security browsers for an extra layer of website security that customers can see and trust.

Choosing a Cloud Supplier with Confidence

August 21, 2012 No Comments

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

August 21, 2012 No Comments

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.

Internet Security Threat Report 2012

August 21, 2012 No Comments

These resources give Symantec’s analysts’ unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report.

iPhone reportedly vulnerable to text message spoofing flaw

August 17, 2012 No Comments

If you’re an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future.

Can the Cloud Shield Google Wallet From Pickpockets?

August 6, 2012 No Comments

Google has redesigned its Wallet mobile payment system with an eye on security. Instead of stashing credit card info on the phone itself, the user’s digits are stored in the cloud. That way, if a phone is lost or stolen, it’s easier to protect the user’s payment information.

Dropbox Admits to Being Hacked

August 1, 2012 No Comments

Dropbox reports that the recent spam attacks that impacted some European customers occurred when hackers used passwords obtained from outside sites to access some Dropbox accounts. The company promised a new two-factor authentication option and offered other tips.

Splunk Showcases Security Intelligence Solutions at Black Hat 2012

August 1, 2012 No Comments

Splunk is proud to be part of one of the premier security events in the world where we will share the latest solutions that are relevant for the security threats organizations face today

IBM Introduces New Class of Network Security Appliance to Control Social Media and Web Browsing Risks

August 1, 2012 No Comments

As employee access to the Web has become ubiquitous, enterprises are struggling with massive increases in malware as well as Advanced Persistent Threats (APTs), which can compromise proprietary data. Many of today’s security solutions often offer limited visibility and control over network activity, putting the company at risk.

Facial Recognition Faces Congressional Scrutiny

July 24, 2012 No Comments

Facial recognition technology is quickly becoming ubiquitous, used by Facebook, Google, law enforcement, and many other companies and organizations. Lawmakers and regulators are taking notice. “Facial recognition is a very tech-forward technology,” noted the FTC’s Mark Eichorn. “It instinctively raises alarm bells with people.”

Security Gurus: Jelly Bean Is Super Chewy

July 20, 2012 No Comments

The latest version of Android, Jelly Bean, has been strengthened with extra security measures that make it especially difficult for hackers to crack, according to researchers. Those fortifications won’t necessarily prevent rogue app makers from hijacking devices, which has proven a somewhat effective method of attacking the platform. However, other Google efforts in that regard have made a difference.

Ratcheting Up Your Web-Browsing Privacy

July 19, 2012 No Comments

With a free public proxy, you browse to its Web page and enter the URL of the website you want to visit. The proxy acts as an agent, hides your IP address, and makes the request on your behalf. Thus your browsing is anonymous. However, public proxies are cumbersome to work with because you have two browsing steps for each Web page you want to visit — the proxy and then the website itself.

Our Terrible, Horrible, No Good, Very Bad Password System

July 18, 2012 No Comments

Millions of passwords/password hashes have been disclosed from websites including LinkedIn, eHarmony, Last.fm, Yahoo Voice and Formspring. It is time to get serious about modernizing the approach that corporations take to password security.

U.S. Tightens Security for Economic Data

July 17, 2012 No Comments

Government officials have become increasingly nervous that their security process is vulnerable, and are now overhauling it.

Lookingglass Updates Cyber Security for Enterprise, Cloud

July 17, 2012 No Comments

Cybersecurity company Lookingglass Cyber Solutions is shipping an alert and warning system to suppress threats and protect against network vulnerabilities to enterprise networks as well as to Internet-based connections to partners and providers. The company’s Cyber-Heads-Up-Display (CyberHUD) works with Lookingglass’ appliance-based ScoutVision and cloud-based CloudScout products.

ManageEngine Ships Private Social Network Exclusively for IT

July 17, 2012 No Comments

General Availability of ITPulse Brings Industry’s First Social Network for IT to Teams Seeking Real-Time IT Management in a Secure, Collaborative and Fun Environment

Business file transfer…do it right now, or do it right?

July 16, 2012 No Comments

When a business department contacts IT at 4:30pm on Friday afternoon and wants to find a way to provide a large file to a new contractor, “right now” probably seems more important than “right.”

Managing Data to Improve Disaster Recovery Preparedness

July 16, 2012 No Comments

Disk-based data protection platforms enable large organizations with massive volumes of data to minimize storage costs, reduce risk of data loss and downtime, retain data online longer, and accelerate backup/restore times.

Hacker Exploits a Loophole to Score Free App Goodies

July 16, 2012 No Comments

An iPhone hacker going by the name “ZonD” has figured out a way for iPhone users to make in-app purchases without paying a cent. Apple should handle the problem itself, said Thrillcall’s cofounder Chad Taylor. “For the sake of the community, my hope is that Apple can address this systematically without telling each developer with in-app purchases that the solution is simply to validate all receipts.”

Yahoo Stuck Without SQL Injection Antidote

July 16, 2012 No Comments

An SQL injection gave hackers access to hundreds of thousands of Yahoo users’ email addresses and passwords, which were promptly posted on the Web. Security wonks put Yahoo through the wringer for it, saying SQL injection defense should be part of any decent set of security measures. Meanwhile, the FTC swatted Google, Amazon smartphone rumors bubbled up, and RIM took on an angry crowd of shareholders.

Yahoo’s password hack shows that it failed security 101

July 13, 2012 No Comments

Nearly 443,000 e-mail addresses and passwords for a Yahoo site were exposed late Wednesday. The impact stretched beyond Yahoo because the site allowed users to log in with credentials from other sites.

Cyber Activity is Keeping the CISO Awake at Night

July 12, 2012 No Comments

The most worrying issue for C-level security professionals, and the thing that often keeps them awake at night, is the fear of the unknown. The chief information security officer (CISO) is the person in direct line of fire when security breaches occur, and given the deteriorating state of information security, taking overall responsibility for security-related issues is a perilous role.

Fake Skype app on Android is malware

July 6, 2012 No Comments

Cybercriminals have created a fake Skype app for Android that is really malware in disguise. The idea is to make money by leveraging all the hype surrounding Skype’s mobile growth.

DNSChanger Malware Set to Knock Thousands Off Internet on Monday

July 5, 2012 No Comments

Thousands of PCs worldwide may be unable to access the Internet beginning July 9 unless those machines are rid of the pernicious DNSChanger malware that first surfaced in 2007.

RSA Encryption ‘Crack’ Rattles Infosec Industry

July 3, 2012 No Comments

A team of researchers say they’ve found a method for subverting RSA encryption. “This could be a big deal because there may be applications out there vulnerable to this attack,” said John Hopkins’ Matthew Green. RSA, however, contends the danger attributed to the research is being exaggerated.

ADVERTISEMENT

DTX ExCeL London

WomeninTech