[metaslider id=2951] … Read More
Archives for February 2016
Beware downloading some apps or risk “being spied on”
From 10 News
Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.
A security firm found that between 75 and 80 percent of the top free apps on Android phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.
Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.
California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.
“It was something you purchased once, for like $15,” Harvey said.
When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.
“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.
That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.
Today, smartphones carry your private data, which is the most convenient way of doing all online banking transactions smoothly, only when your data is completely protected from the bank’s network to your smartphone. Meanwhile those banks you are doing business with might not have enough network security protection in place, behind their corporate firewall.
SnoopWall is the world’s first counterveillance security company delivering a suite of network, mobile and app security products as well as cloud-based services, protecting all computing devices from prying eyes and new threats through patented cloaking technology.
SnoopWall secures mission critical and highly valuable confidential information behind firewalls and on mobile devices with next generation technology that detects and blocks all remote control, eavesdropping and spying. SnoopWall’s software products and hardware appliances are all made in the U.S.A.
Gary Miliefsky, Masterful Cyber Security Professional
Gary Miliefsky, founder and CEO of SnoopWall, is a consumer advocate and a cyber-security expert who frequently appears on ABC, CBS, NBC, Fox News, CNN and many other media outlets to share his expert opinion. He is a member of ISC2, CISSP® and Advisory Board of the Center for the Study of Counter-Terrorism and Cyber Crime at Norwich University. He also advised the National Infrastructure Advisory Council (NIAC) which operates within the United State. DHS for the National Strategy to Secure Cyberspace. Gary is a Founding Member of the US Department of Homeland Security, served on the OVAL advisory board of MITRE and is a strong supporter of the CVE Program, plus he is a founding Board member of the National Information Security Group.
Subduing, the Biggest Challenge in Cyber Security
SnoopWall is growing rapidly, as their NetSHIELD appliances, MobileSHIELD endpoint agent and AppSHIELD SDK are critical to network and mobile security.
Firstly, SnoopWall’s NetSHIELD appliances solve internal network access control and dramatically reduce internal risk for a fraction of the cost of competition. SnoopWall’s MobileSHIELD endpoint agent solves the data leakage risks inherent in the BYOD dilemma, which is the second biggest problem in cyber security. And finally with their AppSHIELD SDK, they are protecting mobile banking, wallet and retail apps on smartphones from losing consumer information (PII) to cyber criminals. The market is very receptive, with their amazing network of channel partners and their phenomenal corporate team; SnoopWall is expanding their network throughout the globe through multi-tier distribution.
Most exploitation happens behind firewalls – either through malicious insiders, rogue devices, new forms of malware, trusted, yet infected employee owned equipment and SnoopWall’s NetSHIELD appliances as well as MobileSHIELD agents for the Bring Your Own Device (BYOD) dilemma continues to solve these problems for their customers.
Honest, Ethical, Passionate Information Security Team
Proudly, SnoopWall has customers around the globe who have not experienced a single breach since properly deploying their solutions. They have ‘INFOSEC professionals’ that care deeply for their customers and the protection of their networks and mobile devices. With this drive and passion, SnoopWall continues to build innovative, next generation security solutions that solve the worst problems in network security not resolved by firewalls and antivirus solutions, alone.
They would like to continue to grow and expand their international channels with the future possibility of being the worldwide market leader in network and mobile device security for small to medium sized enterprise (SME).
Protect File Data Before Cyberattacks Materialize
New Varonis Integration With LogRhythm Helps Customers Gain Unprecedented Insight Into the Security of Their Unstructured Data
NEW YORK, Feb. 24, 2016 (GLOBE NEWSWIRE) — Varonis Systems, Inc. (Nasdaq:VRNS), a leading provider of software solutions that protect data from insider threats and cyberattacks, today announced the interoperability of its DatAdvantage and DatAlert solutions with the LogRhythm Security Intelligence Platform.
Protecting the Most Valuable Data
With the interoperability of Varonis and LogRhythm, customers can now gain unprecedented intelligence in their file systems and vast stores of unstructured data. Organizations store massive quantities of unstructured data – such as files, emails, spreadsheets, and presentations – and it comprises some of their most valuable and sensitive information assets. These assets are frequently exposed or stolen in high-profile breaches, either by insiders who abuse their access or by outsiders who compromise insiders’ credentials. Varonis has helped thousands of customers protect their file systems and unstructured data stores through analyzing user and data activity, permissions and file system metadata, and file content.
Matthew Winter, LogRhythm Vice President of Corporate and Business Development said, “Visibility into user activity surrounding unstructured data is critically important to enabling the rapid detection of and response to potentially harmful threats and incidents. By combining dynamic user activity telemetry from Varonis with the petabytes of other machine data LogRhythm collects and analyzes from across the distributed environment, our joint customers can optimally detect user-based threats before they result in high-impact incidents or data breaches.”
Varonis can automatically send alerts from Varonis DatAdvantage and DatAlert into LogRhythm Security Intelligence Platform and thereby increase the speed and accuracy with which customers are able to identify, prioritize and investigate unusual user behavior surrounding unstructured data. Anomalous activity spotted by Varonis analytics includes unusual access to sensitive and stale data, mass deletions and modifications, malware and ransomware infections like CryptoLocker and Cryptowall, privilege escalations, unusual access to PII, multiple failed login attempts, and many more potential warning signs. Installation of Varonis DatAdvantage and DatAlert can take as little as an hour, and integration with LogRhythm is as simple as configuring an IP address.
David Gibson, Varonis Vice President of Strategy and Market Development said, “Insiders threats can be devastating and hackers are getting better at becoming insiders through phishing and other vectors. With the new interoperability, customers can combine critical security insight from LogRhythm with Varonis intelligence about file systems and unstructured data – the type of data they typically have the most of and know the least about. Varonis and LogRhythm can help organizations proactively spot the warning signs before they end up in the news because of a data breach.”
In the report, Gartner identifies four primary stages in the security life cycle: Setting policy, prevention, detection and remediation, and evaluated EPP vendors based on whether the features their solutions offer address these four stages.
According to the report: “Most enterprise buyers are starting to look at EPP products that can address not only Windows, but a broad array of servers and clients. We evaluated a vendor’s ability to protect and manage a wide array of endpoints (such as Mac, iOS and Android devices), and to integrate those into the management console. Today, many large enterprise buyers are selecting a best-of-breed EMM (enterprise mobility management) capability; however, within the next two years, we expect the EPP market to subsume this function (which is already happening at the SME end of the market).”
For more information on Sophos Endpoint Protection – contact us
The vulnerable products include the Enterprise Agent for Windows, MS SQL and the open Sourced Agent for Windows. At this time there is no patch for the open sourced Windows agent.
Also released is the Snare Server Version 7.1.0, which also provides for a patch of the latest libc DNS vulnerability.
All release notes are available within the client areas or click here.