security companies

security companies

The Power Of Data Exhaust

techcrunch.com
Scott Brown had a question about the number of parked domains he was hearing about: Do the domain providers have an email reply set up? What he found has led to the launch of Bounce.io, a five-month company that harvests 20 to 30 million bounced emails per day in what...
The Power Of Data Exhaust
How to combat online advertising fraud

Apple iPhone Is The Most Hacked Mobile Device By Far (AAPL)

www.businessinsider.com
The same platforms which helped give Apple its rise have also contributed to its rising vulnerability. This month, web security company SourceFire issued a report called "25 Years of Vulnerabilities" that charted the Critical Vulnerabilities and Exposures (CVE) of various software and mobile devices. A CVE is "the international standard for...
Apple iPhone Is The Most Hacked Mobile Device By Far (AAPL)

Confirmed: US and Israel waged cyberwar on Iran

www.extremetech.com
In an unsurprising and yet wholly unsettling twist, it has emerged that Stuxnet — the virus that sabotaged part of the Iranian uranium enrichment program — was developed by the US and Israeli governments, and sanctioned by President Obama himself.According to numerous American, European, and Israeli officials, Stuxnet was part...
Confirmed: US and Israel waged cyberwar on Iran

Facebook expands its anti-virus marketplace to help keep its users' computers secure

thenextweb.com
Facebook has become a major part of the way we interact with one another. Unfortunately with its growing popularity, the service has been plagued by spam and phishing scams and many have been affected by this. To help combat this, the social network established its anti-virus marketplace six months ago...
Facebook expands its anti-virus marketplace to help keep its users' computers secure

Cybercriminals are increasingly abusing .eu domains in attacks

www.pcworld.com
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. "Numerous malicious .eu domains have been registered during November which are being used to infect PCs with malware via the Blackhole exploit kit," said Fraser Howard, principal virus researcher at security...
Cybercriminals are increasingly abusing .eu domains in attacks

Google-backed DMARC system aims to block phishers

www.zdnet.co.uk
Email giants Google, Microsoft and Yahoo, as well as Facebook and email security companies, have joined forces to create the DMARC verification system that they hope will become an anti-phishing standard(ZDNet UK - Security Management)...
Google-backed DMARC system aims to block phishers

Be Very Afraid: Notes from a 'Data Privacy Day' Town Hall

www.geekwire.com
Happy Data Privacy Day. Or maybe another way to think of it is Happy Halloween in January. After attending this week’s Data Privacy Day Town Hall meeting at the Seattle Art Museum (SAM), sponsored by the Online Trust Alliance (OTA), you’d be right to be afraid, very afraid. Data Privacy...
Be Very Afraid: Notes from a 'Data Privacy Day' Town Hall
Dylan's Desk: New security threats target intellectual property, infrastructure

After 6 Months, 30M Visitors, And Trillions Of Clicks Scanned, Facebook Expands Anti-Virus Marketplace To Mobile

techcrunch.com
Facebook is seeing more and more mobile usage, and wants to make sure those users aren’t spreading scams and malware so today it begins offering free mobile anti-virus software downloads. The expansion of the Anti-Virus Marketplace also adds 7 more security companies so 12 are now providing software and contributing...
After 6 Months, 30M Visitors, And Trillions Of Clicks Scanned, Facebook Expands Anti-Virus Marketplace To Mobile
Mobile security companies are 'tripping up' says Mocana

3 Ways Social Media Can Put Enterprises at Risk

www.readwriteweb.com
While the basic risks of social media are well known to most enterprise security managers, there are many dark corners of social media that can be just as dangerous or even more so. Here are three ways that social media can sneak malware and exploits across your corporate firewalls, and...
3 Ways Social Media Can Put Enterprises at Risk

iSmart Alarm turns iPhone into a home guard dog

ces.cnet.com
Debuting a working version at CES, iSmart Alarm is looking to take home security out of the hands of security companies and put it into the hands of your iPhone. [Read more]...
iSmart Alarm turns iPhone into a home guard dog

Seven Questions For Palo Alto Networks Founder and CTO Nir Zuk

allthingsd.com
On Friday, Palo Alto Networks debuted for trading on the NASDAQ national market. Having priced the previous evening at $42 a share, the shares finished their first day of trading at $53.13, amounting to a rise of 26.5 percent. The company raised $260 million. Combined as it was with the...
Seven Questions For Palo Alto Networks Founder and CTO Nir Zuk

Trojan Targets Industry, Government with Fake Conference Invitations

www.eweek.com
Attackers targeted executives in the defense industry and government officials with fake invitations to conferences to install the MSUpdater Trojan to steal sensitive data. - Researchers discovered malware that has been used in targeted attacks against defense contractors, government agencies and other organizations since early 2009, according to IT security...
Trojan Targets Industry, Government with Fake Conference Invitations

Symantec, Lookout Mobile Security debate latest Android “malware” attack (Appolicious)

www.androidapps.com
Appolicious - If you have an Android device, malware threats are nothing new, just something with which you’ve learned to deal. Mobile security companies usually alert the public when any major malware or Trojan threat is discovered in the Android Market, but rarely do they disagree over what’s actually considered...
Symantec, Lookout Mobile Security debate latest Android “malware” attack (Appolicious)

Symantec finds a new trojan that steals data from US banks, customers

arstechnica.com
Symantec has discovered a new piece of malware that appears to be targeting financial institutions and their customers in the US. Dubbed Trojan.Stabuniq by Symantec, the malware has been collecting information from infected systems—potentially for the preparation of a more damaging attack. According to a post on Symantec's blog...
Symantec finds a new trojan that steals data from US banks, customers

On The Heels Of Nabbing 7 HP Execs, Cyber Security Startup AlienVault Raises $8 Million

techcrunch.com
Two weeks ago, we covered a fast-growing security startup called AlienVault, which had just stolen seven senior HP security executives. At the time, Barmak Meftah, who left HP Fortify to become president and chief executive at AlienVault told us that the allure was the startup’s technology, which he said is...
On The Heels Of Nabbing 7 HP Execs, Cyber Security Startup AlienVault Raises $8 Million
Over 30M people use Facebook's anti-virus marketplace

Researchers identify Stuxnet-like malware called 'Flame'

www.computerworld.com
A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has been identified and analyzed by researchers from several security companies and organizations....
Researchers identify Stuxnet-like malware called 'Flame'

Stealthy Web server malware spreads further

www.pcworld.com
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why.Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that malware is running on a Web server, victims are redirected to another website...
Stealthy Web server malware spreads further

Shamoon Malware Cripples Windows PCs to Cover Tracks

www.pcworld.com
Security companies, including Moscow-based Kaspersky Lab and U.S. antivirus vendor Symantec, have not yet figured out what kind of data Shamoon is looking for, then stealing....
Shamoon Malware Cripples Windows PCs to Cover Tracks

Last week on GigaOM Research: all cloud, all the time

gigaom.com
While a series of acronyms dominated the news this week – WWDC, PRISM, E3 – over on GigaOM Research, our analysts were laser-focused on the cloud. This week, we’re featuring three in-depth research reports that look at the cloud in three distinct ways. No surprise there, as Structure, our signature...
Last week on GigaOM Research: all cloud, all the time

Ask A VC: Google Ventures' Karim Faris On Why Enterprise Security Is Red Hot And More

techcrunch.com
Google Ventures’ general partner Karim Faris, joined us in the studio this week for Ask A VC, where we put VCs in the hot seat. Faris, who focuses on the enterprise and e-commerce investments for the firm, talked specifically about the opportunity in the enterprise security space, and why...
Ask A VC: Google Ventures' Karim Faris On Why Enterprise Security Is Red Hot And More

Security firms disable second Kelihos botnet

www.computerworld.com
A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the second version of the Kelihos botnet, which is significantly bigger than the one shut down by Microsoft and its partners in September 2011....
Security firms disable second Kelihos botnet

NATO 'Cyberwar' Manual Says Hacktivists Must Wear A Uniform

www.techdirt.com
Last year, Techdirt wrote about an interesting article suggesting that we should welcome "cyberwar" since it would be so much less painful than the ordinary kind. Of course, that begs the question what we actually mean by "cyberwar", since some forms are probably less humane than others. As we...
NATO 'Cyberwar' Manual Says Hacktivists Must Wear A Uniform

Security firms disable the second Kelihos botnet

www.computerworld.com
A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the second version of the Kelihos botnet, which is significantly bigger than the one shut down by Microsoft and its partners in September 2011....
Security firms disable the second Kelihos botnet
FCC: Stop being dumb about mobile security, use this tool

Security Firms Disable the Second Kelihos Botnet

www.pcworld.com
A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the......
Security Firms Disable the Second Kelihos Botnet

Digitally signed malware is increasingly prevalent, researchers say

www.computerworld.com
Security companies have recently identified multiple malware threats that use stolen digital certificates to sign their components in an attempt to avoid detection and bypass Windows defenses....
Digitally signed malware is increasingly prevalent, researchers say
× Just a test of the new info bar. What do you think?