Quick pick

NIS2

NIS2

11 posts
ISO 27001

ISO 27001

19 posts
AI & ML

AI & ML

7 posts
SSDLC

SSDLC

14 posts
General

Avira Free Android Security wins perfect score from AV-TEST

Avira Free Android Security app earned a perfect score and a “Certified” rating from AV-TEST. Avira Free Android Security scored a perfect 13 out of 13 points in AV-TEST’s January 2014 Android Mobile Security Test, which reviewed 30 different products on their performance, detection rates, protection from malware and overall product usability. Avira Free Android Security automatically scans the user’s […]

General

Avira Free Mac Security – Update 2 released

We released this week the Update 2 of the Avira Free Mac Security for MacOSX 10.8 and 10.9. This update adds a long awaited feature: turn real-time protection ON and OFF. The functionality is available from the tray bar   and the programs bar     In order to protect your security better, it is required […]

Uncategorized

When the Internet fails on you – IFTTT.com failure

My entire automatic posting on ITSecurityNews.info which is retweeted on @ITSecurityNews, @SorinMustaca and @sorinm_security is built on IFTTT.com. Well, this is why you didn’t get some tweets on time: Last night at approximately 10:00pm PST much of the work IFTTT does in the background stopped due to an issue with one of our backend services. Our monitoring […]

distributed systems quoted Security Spam & Phishing

Some thoughts about the spam attack sent through InternetOfThings (Proofpoint)

http://www.proofpoint.com/about-us/press-releases/01162014.php More than 750,000 Phishing and SPAM emails Launched from “Thingbots” Including Televisions, Fridge Note: An article about this has been published by Richard Adhikari in TechNewsWorld.   A general comment on the entire story. Security researchers usually use spamtraps (an email address that receive nothing else than pure spam) to collect these emails and […]

quoted

Quoted in TechNewsWorld: Beware of the Spam-Sending Fridge

Source: http://www.technewsworld.com/story/79828.html Author: Richard Adhikari   “I don’t think any security software company is able to detect such a small amount of emails that have little or no characteristics in common,” Sorin Mustaca, an IT security expert atAvira, told the E-Commerce Times. Considerable work, including deep analysis, is required to identify the device sending out spam, […]

published-external Security

Protect individuals and their devices within an organisation, not just their desktops

The classic approach to secure a company is to secure its assets against all attack vectors: laptops, workstations, servers, storage entities and programmes. The standard attack methods are usually: infections through files carried on USB sticks, memory cards, mobile hard drives, downloaded files network attacks (spoofing, DOS) vulnerabilities that get exploited in common software   […]