Category Archives: Abuse

Axiomatics offers fine-grained policy-based access control and dynamic data masking and filtering

CHICAGO, Oct-05-2017 — /EuropaWire/ — Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “Executive View – Axiomatics Data Security.” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these data stores.

KuppingerCole’s Executive View describes the solutions in detail and offers advice to IT professionals looking for data-centric security. The Axiomatics Data Access Filter offers policy-based access control and dynamic data masking and filtering for relational databases. Implemented as a database proxy, the product intercepts all connections to the database from any user or application and analyzes every SQL statement for potential violations of applicable security policies. In accordance to the ABAC approach, the authorization service may query multiple attribute sources for additional context information needed for a fine-grained access decision.

SmartGuard™ for Big Data (the most recent addition to Axiomatics’ data security portfolio) extends ABAC-based dynamic authorization to Hadoop Big Data stores. There’s a growing need to ensure consistent fine-grained access control and maintain regulatory compliance for Hadoop. These infrastructures often comprise multiple loosely coupled components, and Big Data stores are used to store massive amounts of data from numerous sources with multiple applications accessing them simultaneously. Utilizing ABAC for transparent dynamic access control to a Big Data store for multiple analytics applications allows enterprises to combine all the benefits of a single data warehouse with the traditional siloed approach, where each application has access only to its own data silo.

“For years, we have been tracking the information security market. As data security threats rise, Axiomatics continues to lead by offering solutions that help companies with fine-grained policy-based access control and dynamic data masking and filtering. Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data are a natural expansion of the company’s comprehensive suite of dynamic authorization solutions,” said Alexei Balaganski, lead analyst for KuppingerCole and author of the report. “Whether deployed standalone or as a part of an enterprise-wide ABAC infrastructure, these products provide an additional dynamic security and access control layer around multiple data stores transparently and without any application changes.”

“Our relentless focus on solving the toughest problems in data-centric security, have made Axiomatics the choice for IT professionals and companies looking for data security solutions to complex big data environments,” said Gerry Gebel, vice president of business development at Axiomatics. “We are honored to have such a distinguished analyst like KuppingerCole continue to review our suite of products. Their reports further underscore its commitment to delivering cutting-edge information on data security in the era of digital transformation.”

For more information about Axiomatics, visit www.axiomatics.com. For more information on KuppingerCole, visit https://www.kuppingercole.com.

SOURCE: EuropaWire

SecBI’s software provides early and accurate detection of advanced cyber threats

Tel Aviv, Israel and Rome, Italy, 26-Sep-2017 — /EuropaWire/ — SecBI, a leading developer of advanced cybersecurity threat detection solutions, and Innovery, a leading ICT services provider and software developer, today announced a partnership for distributing SecBI products in Italy and Spain.

“Traditional security means are simply insufficient in dealing with advanced threats, leading to an average dwell time of 100 days before the attack is identified,” said Gilad Peleg, CEO of SecBI. “With SecBI, we can drastically reduce this time span to hours and provide the analyst with early and accurate detection with no false alerts. We are delighted to partner with Innovery, who have the expertise and reach to promote SecBI’s solution to the Italian and Spanish customers who need it.”

“In order to be always ahead of our competitors and offer the best possible services, Innovery invests a lot in new technologies,” said Mr. Gianvittorio Abate, CEO and co-founder, Innovery. “Hence our collaboration with SecBI, a company that we feel has the potential for a great future in the security arena.”

SecBI’s software provides early and accurate detection of advanced cyber threats, including those that are hidden from other systems. By providing full-scope analysis of threats — including all involved users, devices, domains, IPs, C&C servers, drop points and more — SecBI makes mitigation fast and accurate.

Innovera and SecBI will present SecBI’s solution at Cybertech Europe 2017, taking place on September 26-27 at Roma Convention Center – La Nuvola.

SOURCE: EuropaWire

Nothing’s Safe In Cyberspace Says Leo Impact Security

What do the NSA, the Army and Sony Corporation have in common with US embassies around the world? All of them, along with over 2,500 other entities, have been compromised by hackers like Wikileaks and Antisec. The cost of these cyber-crimes has mounted to over $3 billion a year. And “the little guy” isn’t safe, either. Everyone who uses the internet is at risk, despite the increasing use of antivirus software, IDS/IDP and firewalls in the current security models.

Today Leo Impact Security is exposing top secret methods used by cyber criminal’s also defending preventive methods because today all corporate, personal, and government computers are vulnerable to remote cyber attacks.

How do cyber criminals bypass current security model?

1. Antivirus bypass using crypters and protectors with random encryption methods
(ex: cypherx, Themida).
2. Firewall bypass using known ports in malware like port 80 and 8080.
3. IDS/IPS avoid using SSL encryption+ DNS tunneling-based malware (BOTS, RAT).
4. Remote access to any computer using Zero day exploits (.doc, .PPT, and .PDF individual files), Java silent driveway, browser packs, Router DNS MITM, and pen testing tools – Core impact, immunity canvas, Metasploit Pro etc.

For Proof of concepts/Live demos, check our site: http://www.leoimpact.com

How to defend against advanced cyber attacks?

Use m2 security model developed by cyber security expert Manish Kumar, chief research officer at Leo Impact. All of the following services are nonprofit as per our Corporate Social Responsibility (CSR).

1. World’s first free antivirus scanning online engine which protects your PC from viruses, trojans, spyware, rootkits, and other malicious programs (zero day exploits) and attachments by using 32+ antivirus on cloud. Visit: www.balajiplus.com

2. To protect against unknown malware (rootlets, trojans, BOTS-Zesus, spyeye, Ghostrat, etc.) and zero day exploits attacks using Neutron+ Protection system software in PC.

3. To protect against remote-based attacks like DDOS, Sql Injections, XSS, and buffer overflow, use cloudflare.com on servers and Free VPN providers ( www.usaip.euwww.vpnreactor.comwww.torproject.orgwww.hotspotshield.com )

4. To protect against data & information leakage and other attacks, use our two-way authentication and free security analysis and consultancy.

Via EPR Network
More Internet & Online press releases

Review Website Now Available That Is Out To Help The Consumer

People have been dealing with work from home, weight loss & fitness scams for years. With the internet the “Scam” industry multiplied by ten. You rarely ever see honesty when it comes to internet purchases.

Risk Easy Reviews has been one of the few sites that are out there for the consumer. They claim to have success with some of the products they have tested. But they also have some negative claims & put that “do not buy” tag ON some as well.

Bringing honesty to the industry. Risk Easy Reviews has reviewed many products from work from home, forex, health, fitness, weight loss, Warcraft, internet TV and more. They also have made it a point to only try products that come with a great money back guarantee. There are many review sites on the net that have another agenda. And although everybody has got to make a living, Risk Easy Reviews seems to really care what people are reading and knows that their credibility is at stake with each review. It’s good to see that some people can still take the initiative to help people. Helping people better their lives which in turn enhances the world we live in.

Via EPR Network
More Internet & Online press releases

Fasthosts Warns Businesses Not To Copy Others Website Material

Fasthosts Internet Ltd, has warned UK businesses not to be tempted to copy material from other companies’ websites.

This warning comes off the back of findings by the web hosting provider which showed that there was an 89% increase in the number of content disputes reported to its in-house Abuse Department from April 2008 to April 2009. The problem varies from the occasional image being used, right through to entire website designs being replicated. The practice can lead to consumers becoming confused, or even being misled into purchasing from the wrong company.

In many of the cases Fasthosts investigated, the offending businesses stated that they did not realise that copying items of online material could land them in trouble.

A recent Fasthosts’ commissioned survey of 152 UK businesses also found that ‘web envy’ can be a real temptation for time-stretched business owners, with 39% admitting they are presently envious of the website of a closely competing business. Additionally the survey showed that 1 in 4 companies are actually considering reducing their use of external website design services in order to cut costs despite the average company only rating their own website at just 6 out of 10 for effectiveness, yet aiming to treble its online revenue in 2009. At a time when there is a huge amount of pressure on small business owners’ to maximise their use of the web, the temptation to take shortcuts by duplicating material from other companies’ websites can sometimes prove overwhelming.

Steve Holford, CMO Fasthosts Internet, said: “Particularly in a challenging economic climate, business owners may be tempted by the quick-fix of copying another firm’s work. Replicating material for commercial use often breaches copyright. Always obtain permission before using anybody’s website material.”

Significantly, the Fasthosts survey also found that 10% of participants had at least one item of their own company website copied by a third party between March 2008 and March 2009. The issue actually proved to be twice as common as cyber-squatting or other online security breaches. As a result Fasthosts is advising all affected users to contact the offending website hosting provider who should then intervene on their behalf.

Holford added, “Website envy is not new, but the tough economy appears to have led more companies to act unfairly upon it. Businesses will gain a better foothold on the Web and earn most value through a regular output of their own compelling material, and applying time to their website in small manageable steps”.

About Fasthosts
Fasthosts is the UK’s number one web hosting company. Based in the UK and operating 24×7 from their dedicated UK data centres, Fasthosts keeps over 1 million domains running smoothly and ensures over 6 million emails are delivered safely each day. All Fasthosts services can be self-managed through the award winning Fasthosts web-based control panel that provides customers with unparalleled online control, enabling them to manage hosted services including domain name registrations, shared web hosting, business-class email, dedicated servers, software-as-a-service, internet merchant accounts, reseller web hosting and unlimited broadband. Fasthosts’ highly successful reseller channel has recently been rated Number 1 for reseller hosting by industry portal Web Host Directory.

Via EPR Network
More Internet & Online press releases

Tracesmart Aim To Make IOD Fraud A Thing Of The Past

Making a concerted effort to stamp out Impersonation of the Deceased (IOD) fraud, Tracesmart, leading suppliers of identity verification tools, have this week launched Existence – a new suite of services with the potential to eliminate IOD fraud.

IOD is a form of identity fraud – it is estimated by the Home Office Identity Fraud Steering Committee, that identity fraud costs the UK economy £1.7 billion annually. Whilst IOD fraud has historically been hard to tackle due to the lack of death records being made available, recent changes in legislation have allowed the UK General Register Offices (GRO) to release death registration information (DRI) to commercial bodies with the aim of preventing fraud. It is this move that has enabled Tracesmart to develop their suite of services which will tackle IOD fraud head on.

Combining in-depth mortality screening and residency verification, the service allows users to ascertain whether an individual is alive and if they reside at their given address. Paul Weathersby, Technical Director at Tracesmart, commented on the data which drives these checks.

“The mortality screening element of our Existence services draws upon the GRO’s DRI data and the residency verifier calls upon a variety of consumer datasets including historic Electoral Rolls, leading gone away files and BT OSIS amongst others. The combination of these checks allows us to confidently identify deceased individuals and gone aways.”

The Existence suite comprises three services with which clients can conduct existence checks. Existence Search is an online facility which can be used to conduct single ad-hoc checks; Existence Batch is a batch screening service where multiple persons can be verified and the third, and possibly most significant service, is Existence Alert – an early warning system that notifies users of mortalities at the earliest possible opportunity.

Tracesmart has long provided tools for conducting identity checks and has a strong history in the field of fraud prevention. The combination of this experience and access to DRI will enable the Existence services to effectively help put an end to IOD fraud. Mike Trezise, Managing Director at Tracesmart, has already seen a high volume of interest in the product.

“Prior to launch we approached several key clients in the pension and financial sectors to gauge market interest in the product. As we suspected, the demand is most certainly there and we already have prominent pensions administrators and large schemes utilising the system to replace certificate of existence exercises, and many in the financial sector are employing it as part of their know your customer checks. Preventing IOD fraud will save businesses considerable amounts of money and protect consumers from both fiscal and emotional harm.”

Via EPR Network
More Internet & Online press releases

Netmasterclass Choose Locklizard DRM To Secure Their Online Training Courses, Preventing Intellectual Property Theft

“In recent years, education and training have increasingly been delivered by electronic means,” said Dr Trevor Mathews, Chairman of LockLizard. “What started 20 years ago with television courses and VCR services has become much more sophisticated and much more packaged today. Distance learning courses are now so advanced that in some cases a live instructor is no longer needed, and examinations to follow training can also be taken electronically.”

NetMasterClass, a leading Cisco Certified Learning Partner, has protected its Cisco training courses using the LockLizard DRM service in order to make them readily accessible and deliverable over the Internet, whilst remaining secure against intellectual property theft. “We had previously had the unfortunate experience of seeing our training materials posted on public web sites, effectively giving away the work and expertise that we had used to create new and novel training techniques, and you cannot operate a training business in that kind of environment,” commented NetMasterClass.

Now we are able to deliver on-demand, 24×7 training to customers globally when and where they want it. And without having the underlying worries about what will happen to our proprietary materials.”

Whilst DRM has been seen as a negative addition in the music and video industries, DRM in the online training industry has been welcomed with open arms by many users. The reasoning behind this is that when you are paying upwards of $1000 for a course, you do not want to see others bidding $5 for it on auction sites.

Using Lizard Safeguard or Lizard Protector, publishers of electronic training materials can protect their intellectual property published in the PDF or HTML formats. Courses can be made available for a specific length of time or number of uses, and the number of prints can be limited or prevented altogether. Publishers can now price their courses according to the functionality enabled or limitations imposed, offering more attractive options to customers. Better still, updates can be delivered instantly over the web without fear of them getting into the wrong hands.

“Looking forwards,” said Dr Mathews, “We can see that there will be a rapid and significant move towards complete electronic delivery of training, course materials, lectures and notes, without a physical instructor ever needing to be present. The pressures that the current recession is bringing on the need to increase manpower effectiveness and reduce overall costs are going to accelerate the use of computer based training and education systems, always provided that the content can be adequately secured so that only those who have actually paid for the courses are those who benefit from them.

All of our publishers have noticed a significant increase in their bottom line and many have been amazed at the new revenue streams that have opened up, whilst at the same time benefitting from reduced costs in terms of overheads and distribution. A win-win situation if ever I saw one.”

About LockLizard
LockLizard is a DRM vendor that produces document security, pdf security, elearning security, ebook security, copy protection, and web content encryption products that use DRM technology to protect information from intellectual property theft. Our DRM software prevents copying, printing, screen grabbing, and sharing of information without the use of insecure passwords. http://www.locklizard.com

Via EPR Network
More Internet & Online press releases

Welcome to EPR Internet News

EPR Internet News is a new blog, part of EPR Network, that is going to be focused on and will be covering the Internet news and stories from press releases published on EPR Network.

EPR Network (EPR stands for express press release) is one of the nation’s largest press release distribution networks on Web. The EPR’s nationwide network includes 12 State based PR sites, one major PR forum and a number of industry specific PR blogs and what started as a hobby on Internet years ago turned out to be a rapidly growing business today. EPR Network is also known as one of the most trusted (human optimized, published, edited and monitored, spam/scam/low quality PR content free) PR sites on the web with more than 10,000 company and individual press releases distributed per month. EPR Network is putting your press releases on top of all major search engines’ results and is reaching thousands of individuals, companies, PR specialists, media professionals, bloggers and journalists every day.

EPR Network has thousands of clients around the world including global 500 corporations like Hilton Hotels, Barclays Bank, AXA Insurance, Tesco UK, eBay/Skype, Emirates, just to name a few. The network’s PR web sites are currently reaching from 150,000 to sometimes 500,000 unique visitors per month while our viral reach could possibly go to as much as 1M people per month through our presence across various social media sites. EPR Network was established in 2004 and as of May 2008 it had more than 800,000 press releases (pages) published on its network.

If you have a press release to be distributed, you can do it over here: press release distribution