Clavister secures Mexican universities Wi-Fi netwo... » Clavister has announced a deployment of its solutions, sold in 2014 and now in operation, to provide... Lancope drives specialised threat analysis and pro... » LONDON (UK): Lancope, Inc. is already achieving significant corporate momentum in 2015 as it helps d... Ted Plumis, Vice President of World Wide Channel... » London, UK: Imperva Inc. has announced that Ted Plumis, vice president of World Wide Channels for Im... PixAlert launches integrated OCR capability to str... » PixAlert has introduced integrated, optical character recognition (OCR) capability to their portfoli... Blesma Chief Executive leads team to scale ne... » This summer, former Brigadier and Blesma Chief Executive, Barry Le Grys, will be leading a team of a... Championship teams unite in support of injured s... » Nottingham Forest and Bolton Wanderers players and fans pulled out all the stops on Saturday in supp... AdaptiveMobile launches SS7 Protection to sec... » DUBLIN & DALLAS: AdaptiveMobile has launched SS7 Protection – a new product that secures mobile oper... Portal wins 2015 IBM Beacon Award for Outstandin... » UK: Portal was named a winner of a 2015 IBM Beacon Award for Outstanding Solution for Midsize Busine... Moxa's new EDR-810 Firmware to support transpare... » Munich: Moxa has released a new firmware for the EDR-810 industrial 8+2G multiport secure router to ... Cubic receives additional $2.9 million training or... » SAN DIEGO, Calif.: Cubic Corporation has been awarded a contract modification valued at more than $2...

CLICK HERE TO

Energy Security Summit

ABCER Summit

 

pentestmag.com

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Useful Links

SIA Logo

Who's Online

We have 341 guests online

#BringBackOurGirls

Asia Pacific (Apac) countries present enormous opportunities for oil and gas companies, with some oil leaders recently announcing further expenditure for hydrocarbon production development as the region’s energy market has the highest contribution to the global energy demand. In order to produce hydrocarbons in this region, oil and gas companies must address its particular security challenges.

Ultra Electronics AEP announces its PayGate™ Online secure payments processing service is now available to public sector organisations via the government’s Digital Marketplace.

Reports have been flooding in about computer maker, Levono. It has been installing adware onto new consumer computers that activates when taken out of the box for the first time. The adware, named Superfish, is reportedly installed on a number of Levono's consumer laptops out of the box. The software injects third party ads on Google searches and websites without the user's permission.

Responding to the news that the company (Komodia) behind the Superfish technology that caused Lenovo great headache this week is under a DDoS attack, Dave Larson, CTO of Corero Network Security, said:

Last week President Obama discussed cybersecurity at the White House Summit. In this article Simon Crosby, Co-founder and CTO at Bromium, gives his thoughts as below:

At last week’s Cyber Security Summit at Stanford, President Obama sought to reset his administration’s relationship with a tech community alienated by an endless stream of disclosures of the government’s penetration of technology companies to achieve its surveillance goals. He appealed for both sides to unite to build an “Internet Cathedral” that will protect our online society. It’s a nice idea – but who are the priests?

Knowledge of security keys used in SIM cards can have wide reaching consequences. As prior research (https://media.defcon.org/DEF%20CON%2021/DEF%20CON%2021%20presentations/Karl%20Koscher%20and%20Eric%20Butler-Updated/DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf) has described, SIM cards are much like little computers with the ability to run applications at a lower level than the phone’s operating system (i.e. Android or iOS). Information obtained by hacking the SIM manufacturer could not only be used to decrypt protected phone communication but it could also likely be used to deploy malicious Java applets to targeted SIM cards by way of special SMS messages or signals from fake cell towers (referred to as sting rays in law enforcement terms). This also potentially opens up new techniques for sophisticated MiTM attacks against cellular data connections authenticated by the compromised SIM cards.--- Craig Young, CyberSecurity Researcher for Tripwire

Clavister has received a renewed order from one of South East Asia’s largest telecommunications providers, signing an agreement to secure business critical infrastructure used by its millions of subscribers.