STE WILLIAMS

Another 5 tips to help keep you safe on Facebook

Last month we gave you 5 tips to make your Facebook account safer. Following on from that, here’s another five…

1. Stop search engines from indexing your profile

Facebook’s great for keeping in touch with friends and family but you might not want just anyone finding your profile via Google or other search engines. Here’s how to fix that:

Click on the cog icon at the top right of your screen and then click Privacy Settings.

Privacy Settings

Now that you are in the Privacy Settings and Tools area of Facebook, find ‘Who can look me up?’ and the setting that says ‘Do you want other search engines to link to your timeline?’

Who can look me up

This is likely on by default, so click Edit and then remove the tick from the box which says ‘Let other search engines link to your timeline’.

Search engines off

Note: It may take a bit of time for search engines to stop showing the link to your timeline in their results so don’t expect it to disappear immediately from search results.

2. Block someone on Facebook

Just as in real life, some people on the web can prove challenging for a number of reasons. If you don’t want someone to see your profile or things you write on Facebook, you can block them – and here’s how to do just that.

Click on the padlock icon that you see in the top right hand corner of the screen. Now click on How do I stop someone from bothering me?

How do i stop someone from bothering me

Now either enter a name or email address and click Block.

Block someone

The person you block won’t get any notification that they’ve been blocked and they will now no longer be able to initiate conversations with you or see anything that you post on your timeline either.

3. Public computer? Use a one-time password

If you would like to use Facebook from a public location, such as a computer in an internet cafe or library, you can use a one-time password to access your Facebook account, keeping your actual password safe. This password is sent to you by text message and will expire after 20 minutes.

Note: you do have to link your mobile number with your Facebook account in order to use this function.

All you need to do is send “otp” as a text message to the number listed next to your country and mobile carrier on the one-time password list on Facebook. If you’re in the US, you can send the same message to 32665. Unfortunately, it isn’t available everywhere, and the number of countries and carriers is fairly limited at the moment.

After you’ve sent the message, you will receive a reply from Facebook with your OTP, a one-time password of eight characters (or with instructions on how to link your mobile to your Facebook account).

You can now login to Facebook in the normal way, substituting this temporary password for your regular one.

*Always* remember to sign out of Facebook once you are finished, especially if you are signed in on a public computer. If you do leave your account signed in the next person to use the computer will have access to it, even without your password.

→ Even though we’ve just showed you how to use OTPs, we recommend avoiding public computers, such as those in libraries and internet cafes, as much as your digital lifestyle will permit. At the least, work on the (admittedly pessimistic) assumption that anything you type in or view on screen may be sent to cybercrooks, and stick to things you don’t mind being public.

4. Block an app from accessing your information

If you already have an app installed on Facebook but you now want to prevent it from accessing your personal information then blocking it is quite simple.

Click on the cog icon found at the top right of the screen and then click on Account Settings.

Account settings

Look to the left pane and click on the fifth option from the top; Blocking.

Blocking

Then look for the last option – Block apps.

Block apps

All you need to do is put in the name of the app you want to block and then press enter.

5. Remove something from your timeline

If you or someone else has put something on your timeline which you want to remove, it’s pretty easy to do.

Firstly, navigate to your timeline and find the story you wish to block from appearing. Next, move your mouse to the top right corner of the story and you will see what looks like an arrow head appear. Click on that and you’ll be shown a box.

You now have two options here. You can either choose to Hide from timeline which will stop the post from showing on your page (but it will still appear in newsfeeds and search).

Hide from timeline

Or you can remove it completely by clicking on Delete.

Delete post

This is just a small selection of tips to help you safeguard your Facebook profile. If you have any others please do add them in the comments below.

And if you would like to stay up to date on the latest Facebook scams and other internet threats then please do consider liking the Naked Security page on Facebook if you haven’t done so already.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/UaoyK6vEorU/

myOpenID to close down for good in February 2014

Win a Samsung 40-inch LED HDTV with The Reg and HP!

MyOpenID, a major provider of open source authentication system OpenID, is set to close for good on February 1st 2014.

The free service, provided by self-styled “social login” firm Janrain, was first launched back in 2006 as a way for users to authenticate easily by using just one log-in across a range of sites.


However, the number of sites supporting OpenID has dwindled in recent years as users increasingly use their Google or Facebook credentials to log-in to their favourite sites and services.

In an email to users spotted by The Reg, Janrain CEO Larry Drebes claimed that social network and email providers including Facebook, Google, Twitter, LinkedIn and Yahoo! have effectively beaten OpenID at its own game by adopting open identity standards.

He continued with the following:

And now, billions of people who have created accounts with these services can use their identities to easily register and login to sites across the web in the way myOpenID was intended.

By 2009 it had become obvious that the vast majority of consumers would prefer to utilise an existing identity from a recognised provider rather than create their own myOpenID account. As a result, our business focus changed to address this desire, and we introduced social login technology. While the technology is slightly different from where we were in 2006, I’m confident that we are still delivering on our initial promise – that people should take control of their online identity and are empowered to carry those identities with them as they navigate the web.

Debes said myOpenID would continue until the February 2014 deadline to allow any remaining users to “begin using other identities” across their favourite sites. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/09/05/myopenid_closes_for_good_2014/

The Future Of IPS

Lauded long ago as a miracle pill for security operations, intrusion prevention systems (IPS) have been there and back again along the hype cycle curve. Now, as next-generation IPS (NGIPS) products are being put through their paces in real-world IT environments, the question is whether IPS will maintain its relevance in the enterprise or fade away as organizations put less emphasis on perimeter security and look to bundle up similar feature in unified threat management and next-generation firewall deployments.

There’s no real consensus answer to that question. But if you average out the noise from promoters of NGIPS and non-believers on either side of the table, a middle ground emerges. As with many re-engineered products in the pantheon of old-school security technology, IPS continues to maintain a valid place in enterprise IT security roster when deployed well and supported by skilled staff.

“Despite the significant trend of de-perimiterzation (which has largely happened), IPS is still useful,” says James Lyne, director of technology strategy at Sophos. “You may no longer depend on your network as the boundary of security, (but) it does not detract from the benefits of keeping your network clean and spotting unusual activity.”

That’s not to say there aren’t naysayers. Take security consultant Nathaniel Couper-Noles, who considers himself a skeptic when it comes to IDS/IPS.

“For many of my clients there’s better bang-for-buck focusing on fundamentals like strategy and process before diving into complex reactive solutions they may not have the organizational capacity to use effectively,” says Couper-Noles, principal security consultant for Neohapsis, explaining that trends around mobile, cloud computing IPv6 and censorship-evasion technologies all pose challenges to the economics behind IPS. “IDS/IPS will probably not go away altogether, but current architectures may lose some mindshare, akin to how AV has lost some ground to the face of advanced and polymorphic attacks.”

[Are you missing the downsides of big data security analysis? See 3 Inconvenient Truths About Big Data In Security Analysis.]

Nevertheless, other practitioners find that with the refinements offered by the latest crop of NGIPS, the technology helps beat the numbers game of risk reduction. Namely, not shooting for perfection but instead for incremental improvement.

“All of these solutions can be bypassed, but the evolving nature and comprehensive monitoring that they offer decrease the number of incidents where hackers are able to evade the technology,” says Joshua Crumbaugh, lead penetration tester at IT Cyber Security. “Another benefit of these systems is their application awareness and full stack visibility features. These features allow for strict enforcement of corporate acceptable use policy and prevent unauthorized use of restricted operating systems and software.”

Perhaps most important in evaluating NGIPS is understanding that the ‘next’ in next-gen is not revolutionary.

“They could of named it ‘A Little Better than Before IPS’ (ALBtBIPS)–who in technology doesn’t like a new acronym?” jokes Alex Chaveriat, consultant for SystemExpert. “These devices are getting better but not by introducing new methods but vastly improving old methods like network heuristics–contextual awareness, security reporting, application awareness, and overall deeper inspection.”

That context piece is perhaps the most crucial addition to the quiver of IPS features, says Marty Roesch, founder and CTO of Sourcefire.

“A next generation IPS is built on a foundation of information about the network its protecting, continuously updated in real time,” says Roesch, explaining that the system builds a map of the environment it protects and uses that to inform the IPS, “telling us how important the events are for a given specific network at a specific point in time.”

This kind of context can be useful in better gauging the severity of perimeter threats by helping organization evaluate them and look at their contextual significance, Chaveriat says.

“Also, the NGIPS devices are starting to handle security reporting in better ways by
providing a easy platform to review all data in one place,” he says. “This data can be used to create plans not only to deal with the immediate threat but also
create future plans to prevent threats using analytics and metrics gathering from the new reporting platforms.”

And however an organization may feel about the death of the perimeter, IPS still holds relevance as a segmentation tool, says Michael Patterson, CEO of Plixer International.

“Some companies should consider deploying an IDS/IPS on the internal network,” Patterson says. “Monitoring for odd behavior patterns on the edge can miss visibility into threats trying to move laterally within the organization.”

Even if an organization considers perimeter protection a priority, though, IPS solutions are not necessarily a lock for all organizations. According to some, the more NGIPS adds features to its bag of tricks, the more it starts bleeding over into other categories that are already performing those functions.

“NGIPS shares a lot of cross-over with the functionality of UTM and NGFW. Both those solutions have the functionality of NGIPS, plus other capabilities as well,” says Corey Nachreiner, director of security strategy for WatchGuard, which incidentally offers UTM technology. “If you believe you can benefit by consolidating the functionality found in NGIPS, then why not consolidate even more?”

Regardless, though of whether choosing the features in UTM or NGIPS, Nachreiner says organizations seeking to up their network control and visibility should be on the hunt for a tool that offers granular information about application activity, can decrypt HTTPS, and can integrate with a range of authentication platforms. Most importantly, organizations should pay close attention to reporting and management consoles.

“Many of these solutions might look similar on paper, but the real differentiation is in how easy they are to manage, and how many useful reports are,” Nachreiner says. “Look for features and functionality that will save you time in management and up keep without sacrificing security.”

And just as with traditional IPS, organizations newly deploying NGIPS should avoid ‘turning it to 11’ when starting out.

“I think the biggest mistake, always, with intrusion prevention systems is to start with the kitchen sink approach: turning everything on and letting the chips fall where they may,” Roesch says. “That’s where people run into trouble with their intrusion prevention. People need to be willing to invest the time into configuring it properly, but you’ve got to start simple and build from there.”

Herein may lay the root of disillusion that many organizations have experienced with IPS in the past. According to Ron Schlecht of security service provider BTB Security, traditional signature-based technology is easily evaded but as IPS added anomaly-based solutions and other advanced features the learning curve has steepened.

“The appetite to continue to buy in to these solutions is low and people are more aware of the heavy lifting that goes in to correctly implementing the solutions,” he says. “Additionally, companies have to be mature enough to not only understand what they should be looking for, but have the capability to take action when something is detected.”

The fact, agrees Chaveriat, is that organizations need the systems, processes and skill sets in place to respond to threats or the investment is for naught. However, if those processes have already been honed then NGIPS can be a successful part of the security equation.

“If IDS/IPS detection is a large part of your security program, then the upgrade (to NGIPS) is worth it as systems are constantly improving, offering less false positives and more detail,” he says.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/perimeter/the-future-of-ips/240160823

Faces, gestures, heartbeats – how will the passwords of the future work?

Researchers regularly come up with revolutionary ideas to replace the clunky, fiddly and mostly rather insecure passwords we use for almost all of our authentication needs.

The latest schemes to hit the headlines involve using features of our bodies, internal or external, to reassure our devices that we are who we claim to be.

Will any of them ever become the new standard for authentication? Are we going to be stuck with passwords forever, or is there a brighter future out there somewhere?

Security folk talk a lot about passwords. How long or complex they need to be, how bad people tend to be at choosing them and not reusing them, how they should be recorded and stored, how easily they can be cracked.

Occasionally a shiny new idea pops up – most recently we saw biostamps and swallowable dongles – but they generally disappear again just as quickly, leaving us stuck with the status quo.

In your face

In the news this week, Australian researchers have been promoting their work on facial recognition as a means of authentication.

As an idea this seems obvious – faces are the main means we use to identify each other in the real world, if we want to avoid being identified a mask is a standard first step. So it makes sense to have computers recognise our faces, or at least bits of our faces, too.

It’s an approach that has become fairly common of late, with PC login systems and mobile apps trying to use our faces to authenticate us to various things. Only a few weeks ago we heard about a Finnish company’s plans to use faces in place of credit cards.

In general these schemes have proven less than perfect, either easily fooled by photos, similar-looking people or technical tricks, or failing to authenticate real users thanks to bad hair days or bad moods affecting how we look.

Similar issues have blighted fingerprint-based authentication, which remains too unstable and unreliable for general use.

It’s not yet entirely clear what will separate the work being done by the University of Queensland researchers from the crowd, other than vague mentions of improved accuracy and security, and being able to work from a single initial still image and recognise the face from different angles and in different lighting conditions, which sounds like a must for any decent recognition system.

Either way, they don’t expect to have a working prototype for at least another year.

The way you move

The good thing about the face recognition approach is that it’s relatively low-tech, using a component (the rear-facing camera) that has become a standard component of most of the devices we use.

Another potential password replacement emerging from the world of smartphones and tablets is gesture-based authentication. Hand movements repeated often enough can lead to muscle-memory, so quite complex patterns can become quite easy to reproduce reliably and accurately.

This is the basis of a very venerable form of authentication, the signature. It should be harder to compromise though, as unlike signatures swipes leave few visible traces to be copied, other than a few greasy smears perhaps.

Android phones have long had swipe-pattern unlock features, and Windows 8 includes a system based on a few swipes around a picture. Some research presented at the recent Usenix conference has poked some serious holes in this approach though, showing that people are just as bad at picking hard-to-guess shapes as they are at choosing passwords.

A combination of face recognition and gestures, recognising patterns of unusual facial expressions, has also been proposed but is widely seen as no more than a gimmick, provoking humorous images of people gurning and grimacing into their webcams.

In a heartbeat

All of these use physical features, aspects of how our bodies look or move, in contrast to the purely cerebral requirements of passwords, which reside only in our minds (in theory at least – they may also reside on post-it notes attached to our monitors).

The biostamp idea proposed a hybrid of body and technology.

Another spin on this hybrid approach uses a bracelet device which measures heart rhythms to check who we are, and then connects to our devices via Bluetooth to pass on that confirmation.

The “Nymi” bracelet, developed by a Canadian startup, certainly sounds like a promising idea.

The actual authentication takes place only when the bracelet is first put on, requiring a quick touch of some sensors, and from then on will continue to confirm you’re you until it’s removed.

It includes motion sensors, so the basic authentication can also be combined with movements and gestures to create multi-factor passwords, using both the body and the mind of the attached user. Gestures could be used to unlock cars, for example.

I’m no expert on heart rhythm patterns, but according to the developers they’re as unique as fingerprints. Just how resilient the authentication will be to stress, fitness, aging and so on may well be a major factor in the success of the idea.

There are also security concerns of course. The connection to the authenticating devices will have to be very secure, and the bracelet will have to ensure it remains connected to a live wrist; as with biostamps, if it can simply be slid (or hacked) off and still work, it’ll be no good.

Also like biostamps, there’s a potential issue with proximity; if it’s simply broadcasting a “yes” to any request for ID, it would seem trivial to sneak up behind someone and steal their login.

The gesture system might help here, to ensure the user actually wants to be identified, and it should also be fairly simple (and unintrusive) to require re-authentication for major transactions – a simple touch of the wristband checks the heart pattern.

It’s also a relatively hi-tech solution, requiring dedicated hardware. The cost is not prohibitively high though; pre-orders are already available at under $80, although it’s not clear how much of that would be subsidised by the device and service providers the makers hope to attract.

With mass adoption and the cost reductions that would bring, it wouldn’t be unreasonable to expect governments to hand one out to every citizen to cover all their ID needs, although here we stray into civil rights territory – not a huge leap from there to barcodes on our foreheads, some will say.

In the future

Over the years the password systems we use have seen various improvements, both in usability (ranging from simple but nowadays indispensable systems for replacing forgotten passwords to the latest secure password management utilities) and security, for example two-factor authentication schemes using dongles or smartphones combined with our computers.

All have helped in some ways, but have also introduced further opportunities for insecurity – recovery systems can be tricked, management tools can have vulnerabilities or simply be insecurely designed, and two-factor approaches can be defeated by man-in-the-mobile techniques.

Despite all the problems, the insecurities on one side and the impeded workflows on the other, passwords remain the simplest solution to the authentication problem. Finding a universal panacea to replace them is going to be difficult.

What it really comes down to is how we define who we are, whether we are the contents of our brains, the shapes, textures and rhythms of our bodies, or the tools and devices we create and use. Perhaps an approach which uses aspects of all of these will best cover all our needs.

A lot depends on popular uptake of course, perhaps more than actual technical innovation, but it could just be that one of these new techniques will become the passwords of the future.


Image of funkified thumbprint courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/hpMPz5W6WS4/

Don’t Let Social Media Ruin Your Life

CUPERTINO, Calif., Sept. 3, 2013 – Those who have ruined their reputations and damaged their careers after posting inappropriate material on social networks include politicians, movie and sports stars as well as teachers, police officers and even fast food restaurant employees. The problem of exposing too much information could continue to plague social media users, a possibility supported in the August 2013 poll by Cint USA and the global security software developer Trend Micro. According to the poll, 24% of the respondents said they have posted something they later regretted or removed, and 36% said they have seen something they regard as inappropriate on Facebook, Twitter or Google +.

While it may be too late for some, Trend Micro, a global leader in security software, has solved the riddle of social network privacy settings for Facebook, Twitter and Google+, which can help prevent life-ruining posts from ever happening in the first place.

“Privacy is a huge concern, and it all starts with making sure that we don’t have ‘I wish I hadn’t done that’ regretful moments,” says Akihiko Omikawa, Executive Vice President, Global Consumer Business at Trend Micro. “Guarding against identity theft, protecting against viruses and keeping families safe online come standard in Trend Micro security solutions. But if you don’t understand how to manage your social network privacy settings, no amount of security software will keep your online reputation protected. The first line of defense in enjoying your digital life safely is to get a handle on social media privacy. Trend Micro gives social media users a simple way to avoid harming themselves or ruining their reputations by sharing too much information with unintended audiences.”

Trend Micro has expanded its unique social network privacy technology, which identifies privacy settings that may leave personal or inappropriate information publicly available or vulnerable to identity theft. Trend Micro also gives users control over which apps can access biographical data, and who can tag and see photos. These features are critical today, considering only 24% of Facebook users change their privacy settings each month or more often, according to the same survey of social media users. The same poll showed that 27% of Twitter users and 30% of Google+ users have never checked their privacy settings and 34% of Twitter users and 39% of Google + users have never updated their privacy settings. Trend Micro’s robust personal privacy management tool now dramatically simplifies privacy settings on Twitter and Google+, and Facebook – for both Mac and PC. Facebook settings can also now be managed on-the-go via an Android app.

The social media privacy management tool is featured in today’s release of Trend Micro’s Titaniumtrade 2014 family of consumer security products. Titanium Security 2014 is a customizable security solution built on Trend Micro’s 25 years of leadership in Internet security.

Titanium Security 2014 solutions provide industry-leading, anti-virus and Web-threat protection that identifies and blocks dangerous links in websites, social networks, emails and instant messaging. It also detects spam emails containing phishing scams that can trick users into revealing private personal information. According to the August 2013 AV Comparatives report, Trend Micro Titanium offers the broadest combination of privacy and Web threat protections for Facebook, Google+, and Twitter across PCs and Macs among 31 security products reviewed (Social Network Protection Review, August 2013, AV Comparatives).

To help fight identity theft, Trend Micro’s password management feature in Titanium Security 2014 includes a secure browser to conduct safe online commerce that is specifically designed to support secure online banking. Based on users from the same poll, respondents have an average of 12 accounts requiring passwords, but are using only eight passwords among those dozen accounts. An identify thief can do more damage to a victim that uses the same password in multiple accounts.

Additionally included in Trend Micro’s customized solutions are robust parental controls to help families protect children from the dangers inherent to Internet use. Titanium Security 2014 empowers parents to restrict and filter their children’s online access, protecting them from inappropriate or harmful websites. In addition, the security solution includes a way to monitor kids’ behavior online – to help parents protect their kids from cyber bullying and encounters with online predators.

For Android smartphone and tablet users, Titanium Security 2014 includes the Facebook privacy management app within the Trend Microtrade Mobile Security. Mobile Security is designed to find a lost or stolen device, identify data-stealing mobile apps, back-up and restore data stored on a device, and remotely lock and wipe out data.

“Life is difficult enough without having to worry whether or not your reputation, your data or your identity is protected,” says Omikawa. “Trend Micro tackles this enormous challenge with Titanium Security 2014. This comprehensive solution provides users with all-in-one protection on PCs, Macs and mobiles devices for practically everything you do online, so you can enjoy your digital life safely.”

About Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Microtrade Smart Protection Networktrade infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.

Article source: http://www.darkreading.com/end-user/dont-let-social-media-ruin-your-life/240160837

Don’t Let Social Media Ruin Your Life

CUPERTINO, Calif., Sept. 3, 2013 – Those who have ruined their reputations and damaged their careers after posting inappropriate material on social networks include politicians, movie and sports stars as well as teachers, police officers and even fast food restaurant employees. The problem of exposing too much information could continue to plague social media users, a possibility supported in the August 2013 poll by Cint USA and the global security software developer Trend Micro. According to the poll, 24% of the respondents said they have posted something they later regretted or removed, and 36% said they have seen something they regard as inappropriate on Facebook, Twitter or Google +.

While it may be too late for some, Trend Micro, a global leader in security software, has solved the riddle of social network privacy settings for Facebook, Twitter and Google+, which can help prevent life-ruining posts from ever happening in the first place.

“Privacy is a huge concern, and it all starts with making sure that we don’t have ‘I wish I hadn’t done that’ regretful moments,” says Akihiko Omikawa, Executive Vice President, Global Consumer Business at Trend Micro. “Guarding against identity theft, protecting against viruses and keeping families safe online come standard in Trend Micro security solutions. But if you don’t understand how to manage your social network privacy settings, no amount of security software will keep your online reputation protected. The first line of defense in enjoying your digital life safely is to get a handle on social media privacy. Trend Micro gives social media users a simple way to avoid harming themselves or ruining their reputations by sharing too much information with unintended audiences.”

Trend Micro has expanded its unique social network privacy technology, which identifies privacy settings that may leave personal or inappropriate information publicly available or vulnerable to identity theft. Trend Micro also gives users control over which apps can access biographical data, and who can tag and see photos. These features are critical today, considering only 24% of Facebook users change their privacy settings each month or more often, according to the same survey of social media users. The same poll showed that 27% of Twitter users and 30% of Google+ users have never checked their privacy settings and 34% of Twitter users and 39% of Google + users have never updated their privacy settings. Trend Micro’s robust personal privacy management tool now dramatically simplifies privacy settings on Twitter and Google+, and Facebook – for both Mac and PC. Facebook settings can also now be managed on-the-go via an Android app.

The social media privacy management tool is featured in today’s release of Trend Micro’s Titaniumtrade 2014 family of consumer security products. Titanium Security 2014 is a customizable security solution built on Trend Micro’s 25 years of leadership in Internet security.

Titanium Security 2014 solutions provide industry-leading, anti-virus and Web-threat protection that identifies and blocks dangerous links in websites, social networks, emails and instant messaging. It also detects spam emails containing phishing scams that can trick users into revealing private personal information. According to the August 2013 AV Comparatives report, Trend Micro Titanium offers the broadest combination of privacy and Web threat protections for Facebook, Google+, and Twitter across PCs and Macs among 31 security products reviewed (Social Network Protection Review, August 2013, AV Comparatives).

To help fight identity theft, Trend Micro’s password management feature in Titanium Security 2014 includes a secure browser to conduct safe online commerce that is specifically designed to support secure online banking. Based on users from the same poll, respondents have an average of 12 accounts requiring passwords, but are using only eight passwords among those dozen accounts. An identify thief can do more damage to a victim that uses the same password in multiple accounts.

Additionally included in Trend Micro’s customized solutions are robust parental controls to help families protect children from the dangers inherent to Internet use. Titanium Security 2014 empowers parents to restrict and filter their children’s online access, protecting them from inappropriate or harmful websites. In addition, the security solution includes a way to monitor kids’ behavior online – to help parents protect their kids from cyber bullying and encounters with online predators.

For Android smartphone and tablet users, Titanium Security 2014 includes the Facebook privacy management app within the Trend Microtrade Mobile Security. Mobile Security is designed to find a lost or stolen device, identify data-stealing mobile apps, back-up and restore data stored on a device, and remotely lock and wipe out data.

“Life is difficult enough without having to worry whether or not your reputation, your data or your identity is protected,” says Omikawa. “Trend Micro tackles this enormous challenge with Titanium Security 2014. This comprehensive solution provides users with all-in-one protection on PCs, Macs and mobiles devices for practically everything you do online, so you can enjoy your digital life safely.”

About Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Microtrade Smart Protection Networktrade infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.

Article source: http://www.darkreading.com/end-user/dont-let-social-media-ruin-your-life/240160837

FireEye Announces Oculus, A Real Time, Continuous Protection Platform

MILPITAS, Calif., September 4, 2013 – FireEye, Inc., the leader in stopping today’s advanced cyber attacks, announced Oculus, the industry’s first global, real time, continuous protection platform. The company has combined people, products, and intelligence to deliver what it believes is the world’s strongest defense system to counter today’s targeted cyber attacks.

“Today’s attack landscape knows no boundaries or time zones. Customers need protection around the clock and around the world,” said FireEye CEO David DeWalt. “With Oculus, FireEye has reimagined security to help organizations combat and defeat the menace of cybercrime and espionage. Oculus gives organizations–large and small–a global, real time, continuous protection platform to help protect brand, intellectual property, and data. With Oculus, FireEye brings together what customers have been demanding–a unique combination of virtual machine technology, big data analysis, and 24×7 worldwide support and service infrastructure.”

Oculus is comprised of three components:

• Threat Prevention Platform–The FireEye Threat Prevention Platform addresses today’s advanced cyber attacks. The platform features the patented Multi-Vector Virtual Executiontrade (MVX) engine that conducts signature-less analysis atop a patented, virtualization technology purpose-built for security. The MVX engine is designed to provide scalable, accurate, and timely protection across the primary threat vectors–Web, email, and files. In addition, to counter the growing menace of malicious mobile applications, FireEye plans to augment its MVX technology by releasing a new SaaS-based platform named FireEye Mobile Threat Prevention early next year.

• Dynamic Threat Intelligencetrade (DTI)–FireEye’s global deployments provide the company with rich threat intelligence. On an hourly basis, FireEye customers benefit from updated threat intelligence on worldwide cybercrime networks and nation-state actors. DTI leverages:

o

Big Data analysis: By aggregating and analyzing large volumes of attack data in near real time, FireEye can recognize global attack patterns and pinpoint possible and actual targets, thereby providing customers much needed foresight.

o

APT Discovery Center: The APT Discovery Center catalogs and analyzes current and past APT campaigns. It characterizes APT attacks by technical footprint, vertical industry, geography, and target to help security teams, law enforcement, and governments improve defenses.

• Support and Services: Today’s attacks are global in nature. FireEye protects its global customers via 24×7 worldwide support in all major regions around the world. Organizations are also realizing that security talent is in short supply globally. To address this challenge and to leverage FireEye’s unique insight into today’s advanced threats, FireEye is introducing Continuous Protection Service. This service allows FireEye customers to leverage FireEye’s expertise in addressing today’s cyber threats and gain insight into their security posture relative to their industry vertical, allowing them to conduct a continuous risk assessment of their organization.

About FireEye, Inc.

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Protection platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,100 customers across more than 40 countries, including over 100 of the Fortune 500.

Article source: http://www.darkreading.com/vulnerability/fireeye-announces-oculus-a-real-time-con/240160838

Lookout Enters Business Market; Announces Strategic Partnership With Samsung

San Francisco, CA – September 4, 2013 – Lookout, the leader in mobile security, today announced its expansion into business with a stand-alone mobile security offering for business coming later this year. Additionally, Samsung Electronics and Lookout announced a partnership to bring Lookout to mobile devices with Samsung KNOX.

“We’re excited to partner with Lookout to bring an additional level of security to Samsung KNOX. Lookout is the leader in mobile threat protection, and through attachment scanning and safe browsing they are uniquely equipped to address business mobile security and the evolving challenges in the BYOD movement,” said Dr. Injong Rhee, Senior Vice President of KNOX Business Group at Samsung Electronics.

Samsung KNOX is an end-to-end solution that provides security hardening from the hardware through to the application layer. Lookout for KNOX will include real-time, cloud-based scanning to protect against mobile threats from email attachments, web browsing, and any type of file sharing services.

“Samsung is a market leader in mobile devices for business, and we’re excited to work together to bring Lookout to KNOX,” said John Hering, CEO of Lookout. “Protection against mobile threats for devices in the workplace is critical, and we’re excited to announce we’re expanding to address the unique needs of businesses.”

Lookout’s expansion comes at a critical time. With one and three businesses allowing employees to use devices for work according to Gartner, mobile security is more important than ever. In fact, more than half of Fortune 1000 companies have employees using Lookout on their mobile devices already, and more than 45 million people worldwide use Lookout. With protection against mobile threats critical for businesses, Lookout will introduce Lookout for Business, a standalone offering, later this year.

In partnership with Samsung, the KNOX platform retains full compatibility with Android and the Google ecosystem while engineering fundamental security and management enhancements, including its unique application container technology that enables enterprises to support both BYOD and Corporate-Liable models, without compromising corporate security or employee privacy.

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Lookout created the world’s largest mobile threat dataset and the power of its 40 million users to proactively prevent fraud, protect data and defend privacy on personal and business devices and networks. Lookout’s flagship product, Lookout Mobile Security is available for Android, iOS and Kindle, and received the 2013 Laptop Editors’ Choice Award. A 2013 World Economic Forum Technology Pioneer company, Lookout has offices in San Francisco and London. For more information, please visit www.lookout.com.

Article source: http://www.darkreading.com/mobile/lookout-enters-business-market-announces/240160817

Lookout Enters Business Market; Announces Strategic Partnership With Samsung

San Francisco, CA – September 4, 2013 – Lookout, the leader in mobile security, today announced its expansion into business with a stand-alone mobile security offering for business coming later this year. Additionally, Samsung Electronics and Lookout announced a partnership to bring Lookout to mobile devices with Samsung KNOX.

“We’re excited to partner with Lookout to bring an additional level of security to Samsung KNOX. Lookout is the leader in mobile threat protection, and through attachment scanning and safe browsing they are uniquely equipped to address business mobile security and the evolving challenges in the BYOD movement,” said Dr. Injong Rhee, Senior Vice President of KNOX Business Group at Samsung Electronics.

Samsung KNOX is an end-to-end solution that provides security hardening from the hardware through to the application layer. Lookout for KNOX will include real-time, cloud-based scanning to protect against mobile threats from email attachments, web browsing, and any type of file sharing services.

“Samsung is a market leader in mobile devices for business, and we’re excited to work together to bring Lookout to KNOX,” said John Hering, CEO of Lookout. “Protection against mobile threats for devices in the workplace is critical, and we’re excited to announce we’re expanding to address the unique needs of businesses.”

Lookout’s expansion comes at a critical time. With one and three businesses allowing employees to use devices for work according to Gartner, mobile security is more important than ever. In fact, more than half of Fortune 1000 companies have employees using Lookout on their mobile devices already, and more than 45 million people worldwide use Lookout. With protection against mobile threats critical for businesses, Lookout will introduce Lookout for Business, a standalone offering, later this year.

In partnership with Samsung, the KNOX platform retains full compatibility with Android and the Google ecosystem while engineering fundamental security and management enhancements, including its unique application container technology that enables enterprises to support both BYOD and Corporate-Liable models, without compromising corporate security or employee privacy.

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Lookout created the world’s largest mobile threat dataset and the power of its 40 million users to proactively prevent fraud, protect data and defend privacy on personal and business devices and networks. Lookout’s flagship product, Lookout Mobile Security is available for Android, iOS and Kindle, and received the 2013 Laptop Editors’ Choice Award. A 2013 World Economic Forum Technology Pioneer company, Lookout has offices in San Francisco and London. For more information, please visit www.lookout.com.

Article source: http://www.darkreading.com/mobile/lookout-enters-business-market-announces/240160817

FireEye Announces Oculus, A Real Time, Continuous Protection Platform

MILPITAS, Calif., September 4, 2013 – FireEye, Inc., the leader in stopping today’s advanced cyber attacks, announced Oculus, the industry’s first global, real time, continuous protection platform. The company has combined people, products, and intelligence to deliver what it believes is the world’s strongest defense system to counter today’s targeted cyber attacks.

“Today’s attack landscape knows no boundaries or time zones. Customers need protection around the clock and around the world,” said FireEye CEO David DeWalt. “With Oculus, FireEye has reimagined security to help organizations combat and defeat the menace of cybercrime and espionage. Oculus gives organizations–large and small–a global, real time, continuous protection platform to help protect brand, intellectual property, and data. With Oculus, FireEye brings together what customers have been demanding–a unique combination of virtual machine technology, big data analysis, and 24×7 worldwide support and service infrastructure.”

Oculus is comprised of three components:

• Threat Prevention Platform–The FireEye Threat Prevention Platform addresses today’s advanced cyber attacks. The platform features the patented Multi-Vector Virtual Executiontrade (MVX) engine that conducts signature-less analysis atop a patented, virtualization technology purpose-built for security. The MVX engine is designed to provide scalable, accurate, and timely protection across the primary threat vectors–Web, email, and files. In addition, to counter the growing menace of malicious mobile applications, FireEye plans to augment its MVX technology by releasing a new SaaS-based platform named FireEye Mobile Threat Prevention early next year.

• Dynamic Threat Intelligencetrade (DTI)–FireEye’s global deployments provide the company with rich threat intelligence. On an hourly basis, FireEye customers benefit from updated threat intelligence on worldwide cybercrime networks and nation-state actors. DTI leverages:

o

Big Data analysis: By aggregating and analyzing large volumes of attack data in near real time, FireEye can recognize global attack patterns and pinpoint possible and actual targets, thereby providing customers much needed foresight.

o

APT Discovery Center: The APT Discovery Center catalogs and analyzes current and past APT campaigns. It characterizes APT attacks by technical footprint, vertical industry, geography, and target to help security teams, law enforcement, and governments improve defenses.

• Support and Services: Today’s attacks are global in nature. FireEye protects its global customers via 24×7 worldwide support in all major regions around the world. Organizations are also realizing that security talent is in short supply globally. To address this challenge and to leverage FireEye’s unique insight into today’s advanced threats, FireEye is introducing Continuous Protection Service. This service allows FireEye customers to leverage FireEye’s expertise in addressing today’s cyber threats and gain insight into their security posture relative to their industry vertical, allowing them to conduct a continuous risk assessment of their organization.

About FireEye, Inc.

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Protection platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,100 customers across more than 40 countries, including over 100 of the Fortune 500.

Article source: http://www.darkreading.com/vulnerability/fireeye-announces-oculus-a-real-time-con/240160838