Network Security
38 views | +0 today
Your new post is loading...
Your new post is loading...
Rescooped by Brian Stevenson from Technology and Gadgets
Scoop.it!

Top 10 Tech News Websites

Top 10 Tech News Websites | Network Security | Scoop.it
list of top tech news websites, best tech news sites, popular sites for gadgets, latest technology trends website, technical news websites, latest tech news

Via Tiaan Jonker
more...
Rescooped by Brian Stevenson from 21st Century Learning and Teaching
Scoop.it!

Google Docs hijacked by Trojan.APT.Seinup malware

Google Docs hijacked by Trojan.APT.Seinup malware | Network Security | Scoop.it
FireEye spots crooks using old tricks to avoid detection

 

A cyber attack that uses Google Docs to avoid detection in order to steal information has been spotted in the wild.

 

Security firm FireEye reported uncovering the campaign, warning that the crooks are using advanced malware to mount a targeted spear phishing campaign designed to steal corporate and personal data from a variety of victims.

 

FireEye researcher Chong Rong Hwa wrote: "The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN [Association of Southeast Asian Nations]. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."

 


Via Gust MEES
more...
Gust MEES's curator insight, June 23, 2013 10:23 AM

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Gust MEES's curator insight, June 23, 2013 10:28 AM

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Jason Toy's curator insight, June 23, 2013 11:04 AM

Interesting read. Looks like FireEye's sandboxing techniques paid off in this regard.

Scooped by Brian Stevenson
Scoop.it!

BYOD & Mobility – Effects on Network Security | DDoS and Security ...

Gary Sockrider, Arbor Networks' Solutions Architect for the Americas, took some time to discuss the topics of BYOD (bring your own device) and mobile.
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

Survey: Companies Aren't Ready to Respond to Cyber Attacks - eSecurity Planet

Survey: Companies Aren't Ready to Respond to Cyber Attacks - eSecurity Planet | Network Security | Scoop.it
A Protiviti survey found that 21 percent of companies don't have a formal crisis response plan for use following a breach.
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

Network security is hard.

Network security is hard. | Network Security | Scoop.it
Network Security can make or break your Organization (Need a security assessment on your network? http://t.co/G0E0I5vjtM)
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

Citrix Continues Mobility Momentum, Positioned as Leader in ...

In today's technology market, companies are constantly touting the unique and vast benefits of their products, and often times, the consumer is left scratching their heads about who actually has a superior solution.
more...
No comment yet.
Rescooped by Brian Stevenson from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Startup Bromium Could End Computer Viruses Forever

Startup Bromium Could End Computer Viruses Forever | Network Security | Scoop.it
Bromium is a fantastic idea for stopping hackers once and for all.

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Brian Stevenson from Cloud Central
Scoop.it!

How Big Data and Cloud Computing Are Pushing Networks to the Brink

How Big Data and Cloud Computing Are Pushing Networks to the Brink | Network Security | Scoop.it
A survey by Juniper Networks finds that a majority of senior IT executives say their networks aren't up to the tasks that are being demanded of them.

Via Peter Azzopardi
more...
No comment yet.
Rescooped by Brian Stevenson from 21st Century Learning and Teaching
Scoop.it!

Malware tries to invade technology companies once every 60 seconds

Malware tries to invade technology companies once every 60 seconds | Network Security | Scoop.it
No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.

Via Gust MEES
more...
Rescooped by Brian Stevenson from Chinese Cyber Code Conflict
Scoop.it!

Chinese Whispers, Chinese Lies: Analyzing Mandiant's APT1 Report | SecurityWeek.Com

Chinese Whispers, Chinese Lies: Analyzing Mandiant's APT1 Report | SecurityWeek.Com | Network Security | Scoop.it
The foremost problem Mandiant's APT1 report is that it relies on a view of China and the Chinese Cyber-Operations that has very little to do with situational conditions on the ground.

Via Red-DragonRising
more...
No comment yet.
Rescooped by Brian Stevenson from Chinese Cyber Code Conflict
Scoop.it!

OP Red Star (紅星): Another advanced hacking crew from the People's Republic of China is revealed

OP Red Star (紅星): Another advanced hacking crew from the People's Republic of China is revealed | Network Security | Scoop.it
red star victims In the spirit of last February’s report by Mandiant detailing the exploits of a Chinese-government-linked hacker group, Russian IT security giant Kaspersky Lab today released a report on another sophisticated Chinese...

Via Red-DragonRising
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

Enterprise Mobility: How Fast Can Development Go?

Enterprise Mobility: How Fast Can Development Go? | Network Security | Scoop.it

Mobile developers have never had it so good

 

SUMMARY: Mobile developers, rejoice! New tools and coding protocols -- such as Backend-as-a-Service and Cloud Extend Mobile -- make it easier than ever to deliver enterprise mobile applications in creative, cost-effective ways, writes Michael Facemire. "There's never been a better time to be a mobile developer," he asserts.

 

READ ARTICLE 

more...
No comment yet.
Rescooped by Brian Stevenson from SEO Tips, Advice, Help
Scoop.it!

Are You Safe Online? [Infographic]

Are You Safe Online? [Infographic] | Network Security | Scoop.it
As more people engage in various online activities, threats become more prevalent and sophisticated. The basic threat protection we were used to may not be enough to protect us when these new generation risks reach us.

Via Bonnie Burns
more...
Usuario en Prácticas's curator insight, July 29, 2013 4:32 AM

Primer elemento de seguridad

Nirmalya Ghosh's comment, July 31, 2013 5:16 AM
Nice work..we have to think twice before doing important transaction over internet.
Te L - Us Business Solutions's comment, July 31, 2013 9:11 PM
That is what I say Nirmalya. Everyone doesn't play nice on the internet. Which makes it hard for people who are serious about their craft and servicing their clients.
Rescooped by Brian Stevenson from visualizing social media
Scoop.it!

The Future of Mobility [Infographic]

The Future of Mobility [Infographic] | Network Security | Scoop.it

An astounding 80 percent of the world’s population now has a mobile phone—and 84 percent is unwilling to go a single day without their phone. About 45 percent of Americans say they can’t go more than a few hours without checking their phones. In 2012 there were five billion mobile phones in the world—1.8 billion of these were smart phones.


Facebook now reaches 76 percent of the smartphone market, and it accounts for 23 percent of total time spent using apps each month.

The next five most used applications are Google apps, and they account for 10 percent of app usage time. One of the latest smartphone trends is that things are getting less touchy but more sensitive. Gestures and other non-tap inputs are on the rise. Casting a sidelong glance, for example, can pause a video. Some apps are being developed that will switch from manual to voice to text to gesture, depending on what you are doing...


Via Lauren Moss
more...
Christel Binnie's curator insight, July 10, 2013 10:09 PM

80 percent of the world’s population now has a mobile phone, and other interesting facts.

sophiedesc's curator insight, July 19, 2013 7:21 AM

Mobile Commerce: 

 

> "Mobile Shopping accounted for 11% of e-commerce in the 4th quarter of 2012 (up from 3% 2 years earlier)."

> Roughly 58% of smartphone users have made purchases on their smartphones.

> These Mobile Shoppers typically use smartphones for 50 to 60% of the Shopping."

Katie Muirhead's curator insight, August 20, 2014 12:17 PM

Seeking to manage our attention and avoid distraction is one thing, but first we need to be aware of where our attention is going. As smartphones are increasingly used, this infographic highlights in just what way we use our phones. 1 in 5 people check their phone every ten minutes... something tells me that the smartphone may be one of the biggest sources of modern distraction!

Scooped by Brian Stevenson
Scoop.it!

How BYOD brings security risks into corporate networks - USA TODAY

How BYOD brings security risks into corporate networks - USA TODAY | Network Security | Scoop.it
How BYOD brings security risks into corporate networks USA TODAY (Editor's note: In this guest essay, Brian Foster, chief technology officer at advanced threat protection company Damballa, outlines security exposures introduced by the BYOD craze.)...
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

Security engineer hides hacking device in laptop power supply to create ... - MedCity News

Security engineer hides hacking device in laptop power supply to create ... - MedCity News | Network Security | Scoop.it
Security engineer hides hacking device in laptop power supply to create ...
more...
No comment yet.
Scooped by Brian Stevenson
Scoop.it!

F5's Service Provider Firewall Provides Unrivaled Security and ...

F5's Service Provider Firewall Provides Unrivaled Security and ... | Network Security | Scoop.it
Within F5's intelligent services framework, the S/Gi firewall can be deployed seamlessly with other network and security capabilities, including solutions for policy enforcement, carrier-grade NAT, and IPv6.
more...
No comment yet.
Rescooped by Brian Stevenson from Technological Sparks
Scoop.it!

Bromium: A virtualization technology to kill all malware, forever - ZDNet

Bromium: A virtualization technology to kill all malware, forever - ZDNet | Network Security | Scoop.it
Bromium: A virtualization technology to kill all malware, forever ZDNet Invincea uses host-based virtualization technology on Windows desktops — I believe they actually license a runtime version of Oracle VirtualBox in order to build their product...

Via Monica S Mcfeeters
more...
Monica S Mcfeeters's curator insight, May 15, 2013 1:57 AM

This could be a great day if we can really get rid of malware.

Rescooped by Brian Stevenson from I can explain it to you, but I can't understand it for you.
Scoop.it!

Bromium vSentry 2.0 focuses on collaboration and mobility

Bromium's vSentry for desktop security now adds more secure connections over untrusted Wi-Fi and better collaboration capabilities.


Via Riaz Khan
more...
No comment yet.
Rescooped by Brian Stevenson from Palo Alto Networks
Scoop.it!

Palo Alto Networks Announces GlobalProtect For Android™ Mobile OS - PR Newswire (press release)

Palo Alto Networks Announces GlobalProtect For Android™ Mobile OS
PR Newswire (press release)
...

Via Steinar Aandal-Vanger
more...
No comment yet.
Rescooped by Brian Stevenson from 21st Century Learning and Teaching
Scoop.it!

Google Docs: Trojan.APT.Seinup Hitting ASEAN

Google Docs: Trojan.APT.Seinup Hitting ASEAN | Network Security | Scoop.it
1. Executive Summary The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN.

 

This malware was found to have used a number of advance techniques which makes it interesting:

 

- The malware leverages Google Docs to perform redirection to evade callback detection.

 

- This technique was also found in the malware dubbed “Backdoor.Makadocs” reported by Takashi Katsuki (Katsuki, 2012).It is heavily equipped with a variety of cryptographic functions to perform some of its functions securely.

 

- The malicious DLL is manually loaded into memory which hides from DLL listing.

 


Via Gust MEES
more...
Rescooped by Brian Stevenson from Littlebytesnews Current Events
Scoop.it!

China Weaponizes Cyberspace--The Cyber War is Here;What Will The US Do to Counter It?

China Weaponizes Cyberspace--The Cyber War is Here;What Will The US Do to Counter It? | Network Security | Scoop.it
A damning, 60-page report released by American computer security firm Mandiant reveals that a 12-story building on the outskirts of Shanghai is most likely the epicenter of ongoing cyber attacks perpetrated against a number of American...

Via littlebytesnews
more...
littlebytesnews's curator insight, February 21, 2013 2:37 AM

I guess Obama will just keep spending and borrowing so they can keep funding there cyber war against US businesses and federal agencies until they own us??

Tom Hauck's comment, February 21, 2013 10:56 PM
Take our internet away from us...any other questions..?
littlebytesnews's comment, February 22, 2013 12:06 AM
Yeah that is what I think is coming soon....heard Obama passed some executive order a week ago related to giving him more power of the internet and access to users data??
Scooped by Brian Stevenson
Scoop.it!

Your CMO May Be Your New CIO (And What That Means For Enterprise Mobility)

Your CMO May Be Your New CIO (And What That Means For Enterprise Mobility) | Network Security | Scoop.it

The expanded role of CMOs gives rise to new position titles

 

SUMMARY: The advent of Big Data driving revenue and the rise of software-as-a-service are two reasons marketers are gaining more corporate power at the expense of ITs. The chief marketing technologist and marketing operating officer positions might emerge from the need to bridge the new gaps between marketing and IT. And the rise of mobile enterprise applications will require sophisticated marketing insight as much as technology solutions, SAP's Eric Lai writes.

 

READ ARTICLE 

more...
No comment yet.