Google Analytics

Search This Blog

Thursday, November 13, 2014

Computer Security Updates Week 3 of Nov 2014

Refer to Computer Security Updates Week 5 of Oct 2014, the biggest news was the announcement CyberArk Integrates Privileged Threat Analytics with McAfee’s Next Generation SIEM.
  • PR- Nov 14, 2014 - CyberArk Announces Strong Third Quarter 2014 Results
  • PR - Nov 13, 2014 - Huawei Receives "Cyber Security Organization of the Year" Award from CSM
  • PR - Nov 12, 2014 - CSM and Microsoft Announced Cyber Threat Intelligence Program
  • PR - Nov 12,2014 -Stuxnet Patient Zero: First Victims of the Infamous Worm Revealed
  • PR - Nov, 12 - 2014 - Sophos Announces Expanded Security Security as a server through AWS Marketplace
  • PR - Nov 10, 2014 - Kaspersky Lab sheds light on “Darkhotels”
  • PR - Nov 10, 2014 - NSS Labs Test Validates Barracuda WAF Security Effectiveness
  • PR - Nov 7, 2014 - Kaspersky Lab Adds 20+ Patents to its Intellectual Property Portfolio in Q3 2014
  • PR - Nov 6, 2014 - Infowatch Will Prove Scientific Value of Its Content Analysis Technologies at ICCICS2014!



PR- Nov 14, 2014 - CyberArk Announces Strong Third Quarter 2014 Results

CyberArk today announced financial results for the third quarter ended September 30, 2014.

Total revenue was $28.0 million, up 66% year-over-year compared with the third quarter of 2013. For the first nine months of 2014, total revenue increased 45% compared with the first nine months of 2013.
  • License revenue was $16.6 million, up 67% compared with the third quarter of 2013.
  • Maintenance and Professional Services revenue was $11.3 million, up 64% year-over-year.

Email team@it-sideways.com for details.

PR - Nov 13, 2014 - Huawei Receives "Cyber Security Organization of the Year" Award from CSM

Huawei has won the “Cyber Security Organization of the Year” Award! Bestowed the recognition at the 4th Cyber Security Malaysia – Awards, Conference and Exhibition (CSM-ACE) in Perak from the CyberSecurity Malaysia, which comes under the Ministry of Science, Technology and Innovation (MOSTI), the prestigious award is testament of Huawei’s substantial contribution to Malaysia’s cyber security.

Sultan of Perak, Sultan Nazrin Muizzuddin Shah ibni Almarhum Sultan Azlan Muhibbuddin Shah Al-Maghfurlah presenting the “Cyber Security Organization of the Year” Award to Huawei at the 4th Cyber Security Malaysia - Awards, Conference and Exhibition.

Huawei established an auditable, sustainable, and reliable cyber security assurance system that is supported by policies, organizational structures, designated personnel, governance, technologies, and regulations, which together safeguard the Malaysian ICT network.

Email team@it-sideways.com for details.

PR - Nov 12, 2014 - CSM and Microsoft Announced Cyber Threat Intelligence Program

CyberSecurity Malaysia (CSM), the National cyber security agency under the purview of the Ministry of Science, Technology and Innovation (MOSTI), today announced the Cyber Threat Intelligence Program (CTIP) activation in partnership with Microsoft Malaysia.

Microsoft’s CTIP is a powerful big-data resource that will allow CSM to have a better situational awareness of existing cyber threats and potential malware related security issues in Malaysia. It comprises threat intelligence gathered pursuant to the successful worldwide botnet and malicious software takedown and disruption operations led by Microsoft’s Digital Crimes Unit (DCU) and its Cybercrime Center, headquartered in Redmond, Washington, USA.

YAB. Dato’ Seri Diraja Dr. Zambry bin Abd. Kadir, Chief Minister of Perak delivering his opening speech at the CSM ACE 2014

The activation was under the auspices of YB. Datuk Dr. Ewon Ebin, Minister of MOSTI; YB. Datuk Dr. Abu Bakar Mohamad Diah, Deputy Minister, MOSTI; YAB. Dato’ Seri Diraja Dr. Zambry bin Abd. Kadir, Chief Minister of Perak; Dr. Amirudin Abdul Wahab CSM’s Chief Executive Officer and Keshav Dhakad, Regional Director, IPR & DCU, Microsoft Asia, Legal & Corporate Affairs.

Email team@it-sideways.com for details.

PR - Nov 12,2014 -Stuxnet Patient Zero: First Victims of the Infamous Worm Revealed

More than four years have passed since the discovery of one of the most sophisticated and dangerous malicious program – the Stuxnet worm, considered to be the first cyber-weapon – but many mysteries still swirl around the story. One major question is: what were the exact goals of the whole Stuxnet operation? Now, after analyzing more than 2,000 Stuxnet files collected over a two–year period, Kaspersky Lab researchers can identify the first victims of the worm.

First five victims of the Stuxnet Worm

All five of the organizations that were initially attacked are working in the ICS area in Iran, developing ICS or supplying materials and parts. The organization attacked fifth is the most intriguing because, among other products for industrial automation, it produces uranium enrichment centrifuges. This is precisely the kind of equipment that is believed to be the main target of Stuxnet.

Email team@it-sideways.com for details.

PR - Nov 12, 2014 - Sophos Announces Expanded Security Security as a server through AWS Marketplace

Sophos announced the addition of a new enterprise security secure server option – Sophos Secure OS, to deliver comprehensive security for customers on Amazon Web Services (AWS). It combines CentOS with preinstalled anti-malware protection in a single Amazon Machine Instance (AMI).

The secure server option provides a time-saving and cost-effective alternative to IT professionals building their own infrastructure to manage security in a cloud-based server environment.

Sophos is also adding a new AWS Test Drive for their endpoint security solution, featuring Sophos Enterprise Console. AWS Test Drives lets customers evaluate products using a private IT sandbox environment containing preconfigured server-based solutions. The new offering complements an existing AWS Test Drive available for the Sophos UTM.

Email team@it-sideways.com for details.

PR - Nov 10, 2014 - Kaspersky Lab sheds light on “Darkhotels”

Kaspersky Lab’s Global Research and Analysis Team experts researched the “Darkhotel” espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives travelling abroad.

The Darkhotel actor maintains an effective intrusion set on hotel networks, providing ample access over the years, even to systems that were believed to be private and secure. They wait until, after check-in, the victim connects to the hotel Wi-Fi network, submitting his room number and surname at the login. The attackers see him in the compromised network and trick him into downloading and installing a backdoor that pretends to be an update for legitimate software - Google Toolbar, Adobe Flash or Windows Messenger. The unsuspecting executive downloads this hotel “welcome package”, only to infect his machine with a backdoor, Darkhotel’s spying software.

Email team@it-sideways.com for details.

PR - Nov 10, 2014 - NSS Labs Test Validates Barracuda WAF Security Effectiveness

Barracuda announced that its Web Application Firewall (WAF) has achieved high performance results in a product analysis test conducted by NSS Labs.

Thiban Darmalinggam, Regional Manager for Barracuda in Malaysia says, “The Barracuda WAF managed to block 99.97 percent of attacks and passed all stability and reliability tests with a low false positive rate of 0.715, ranking it among the most powerful web application security solutions available.”

Thiban Darmalinggam,
Regional Manager for Barracuda, Malaysia

“NSS Labs’ test reports are designed to address the challenges faced by IT professionals in selecting and managing security products,” said Vikram Phatak, CEO, NSS Labs. “The Barracuda Web Application Firewall performed well in all testing conducted by NSS Labs, achieving the highest block rate for security effectiveness, and offering good value for the cost.”

Email team@it-sideways.com for details.

PR - Nov 7, 2014 - Kaspersky Lab Adds 20+ Patents to its Intellectual Property Portfolio in Q3 2014

Patent: the system and method for the dynamic generation of anti-virus databases – forms part of most of the company’s products (the patent was applied for three and a half years ago but the USPTO patent was only taken out in the third quarter of 2014).

It makes it possible to generate an anti-virus database based on the parameters of a particular user computer.

The technology works like this: the security solution collects information about the system and formulates filters that can keep databases free of threats that are known to be unable to do any harm to the user of this system, as well as excluding data intended for inactive subsystems. This reduces the volume of updates, making downloads faster and significantly improving the performance and efficiency of the solution because a smaller base means a faster processing time.

In addition Kaspersky Lab was granted the following USPTO patents:
  • The system for permanent file deletion
  • Automatic analysis of security related incidents in computer networks

Email team@it-sideways.com for details.

PR - Nov 6, 2014 - Infowatch Will Prove Scientific Value of Its Content Analysis Technologies at ICCICS2014!

InfoWatch linguistic technology experts will present the latest developments in company’s proprietary content analysis technologies on the International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014.

The scientific conference is a part of The Third World Congress on Computing and Information Technology (WCIT). InfoWatch input will demonstrate how linguistic humanitarian technologies are successfully used in a technical sphere, and how information security technologies (DLP in particular) contribute to the development of modern science.

ICCICS2014 attendance is the 3-rd international scientific experience of InfoWatch in 2014. Earlier this year InfoWatch technical experts presented their technologies on the International Conference on Computing Technology and Information Management (ICCTIM2014) in Dubai and on the International Conference on Digital Security and Forensics (DigitalSec2014) in Czech Republic.

Email team@it-sideways.com for details.

No comments: