Archive for Maj, 2014

Surge in phishing attacks on e-Stores, says Kaspersky Lab

By admin, 1 maja, 2014, No Comment

Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites (23.5%). In March, users of LinkedIn risked giving away their personal data as a result of phishing scams.

There were also lots of malicious attachments sent on behalf of various well-known financial organisations. These attachments often contained malware that stole browser cookies or passwords for email programmes and sent the data to a remote server run by cybercriminals.

Phishing:
Social networks were once again the organisations most frequently used in phishing attacks. March saw cybercriminals compromise LinkedIn, a business-oriented social network with 200 million members all over the world. A mass mailing with a St. Patrick’s Day theme offered users a free premium account with the networking site. To enter the account the recipient had to click a link that led to a phishing page rather than to the official LinkedIn site. The login and password entered by the user were forwarded to the fraudsters.

Second after social networks was the email and instant messenger services category (16.6%). The share of search engines (14.4%) and financial and e-pay organisations dropped by 2 and 3.5 percentage points respectively, resulting in search engines leapfrogging financial services into third place. The proportion of phishing attacks on online stores grew by 8.9 percentage points, moving that category up two places to fifth (12.8%).

The most widespread malicious email attachments in March:

  • Trojan-Spy.HTML.Fraud.gen – a fake HTML page sent to users by email disguised as an important message from large commercial banks, online stores, software companies etc.
  • Aspxor network worm – automatically infects websites, downloads and executes other software, and collects valuable data on the computer.
  • Email-Worm.Win32.Bagle.gt – an email worm that sends copies of itself to all email addresses found on an infected computer. The worm also downloads files from the Internet without the user’s knowledge.
  • Zbot Trojan that specialises in stealing confidential information.
  • The Bublik family of Trojan downloaders – downloads malicious files to user machines and then launches them.
  • The Andromeda family of backdoors that allows cybercriminals to secretly control infected computers and add them to botnets.

Maria Vergelis, Spam Analyst at Kaspersky Lab commented: “Suppose you get a notification about undeclared income or a message stating that a previously filed tax return was fake. The temptation to find out more is bound to be great, which is why many recipients open the attachments in emails like these. Instead of a financial report, the attachment usually contains a Trojan that steals personal information. Cybercriminals are very resourceful and are constantly coming up with new ways to trick users. Any messages from unknown senders, no matter how important they may seem, should be treated with a lot of scepticism.”

Sources of spam by country:
China was the leading spam source with 24.6% of all distributed spam, an increase of 1.7 percentage points from the previous month. The US was second (17%; a decrease of 2 percentage points). South Korea came third having spread 13.6% of the world’s spam, 0.8 percentage points more than in February. These three countries accounted for over half of all spam sent worldwide.

Mail antivirus detections by country – Top 3:
US (12%), UK (9.8%) and Germany (9.1%).

Proportion of spam in email traffic:
The percentage of spam in global email traffic in March decreased by 6.4 percentage points and averaged 63.5%.

The full report is available at securelist.com

CommVault accelerates and simplifies application recovery

By admin, 1 maja, 2014, No Comment
  • CommVault and Hitachi are working together to enable modern data protection for large databases, file systems and virtualised environments
  • Integration of CommVault Simpana IntelliSnap snapshot management technology with Hitachi Virtual Storage Platform G1000 (VSP G1000) and Hitachi Storage Virtualisation Operating System (SVOS) supports faster, more efficient recovery of data and applications to increase availability
  • New integration simplifies management of Hitachi Thin Image, Hitachi ShadowImage and Hitachi Open Remote Copy Manager technologies from Simpana software’s single console to accelerate time to value for Hitachi enterprise storage platforms

CommVault has announced immediate support for Hitachi Data Systems Virtual Storage Platform G1000 (VSP G1000) and Storage Virtualisation Operating System (SVOS). Customers can use Hitachi Data Protection Suite with CommVault Simpana IntelliSnap technology to manage array-based snapshots and accelerate recovery for applications, file systems and Microsoft Hyper-V and VMware vSphere environments. This development, the industry’s first application-consistent hardware snapshot support for the Hitachi VSP G1000, enables storage customers to more easily adopt modern data recovery techniques that reduce cost, risk and complexity.

As data sets grow in size and business value, hardware snapshot integration plays an increasingly important role in delivering instant application protection and recovery. Together, CommVault and Hitachi Data Systems (HDS) provide enterprises of all sizes with a single view of their data environment, allowing users to easily virtualise and manage disparate silos of storage and data. Global systems integrators are able to simplify design and speed implementation of their complete HDS solution for customers, with backup and recovery software powered by CommVault.

“Building on our decade of engineering experience with Hitachi Data Systems, CommVault supports the new Hitachi Virtual Storage Platform G1000 hardware and Hitachi Storage Virtualisation Operating System software platform from day one to automate snapshot management and application-aware recovery,” says Brian Brockway, vice president of worldwide product management, CommVault. “CommVault is committed to offering our joint customers holistic solutions that minimise business disruptions.”

“The deep collaboration between Hitachi Data Systems and CommVault enables enterprises to simplify data recovery and simplify complex environments, as our customers move to a continuous cloud infrastructure,” says Tim Durant, senior director of global ISV alliances and data protection at Hitachi Data Systems. “Having CommVault support across our Hitachi Virtual Storage Platform G1000, Virtual Storage Platform, and Unified Storage VM means HDS and CommVault can help customers quickly realize value from the storage investments they’re making to modernise the data centre and become more business-defined.”

Instant Backup and Recovery for Hitachi Enterprise Storage
Next-generation Hitachi Virtual Storage Platform systems and Unified Storage VM systems work with Hitachi Data Protection Suite, powered by CommVault, to deliver backup, archive, recovery, eDiscovery and search capabilities in a single solution, reducing the complexity of managing multiple products. Additionally, Simpana IntelliSnap technology provides an automated approach to protecting data within the array and speeding recovery for applications, file systems and hypervisor platforms to increase application uptime in heterogeneous environments.

With deep Simpana software integration, VSP G1000 customers can simplify management to provision and manage Hitachi Thin Image snapshots and ShadowImage volume copies at the speed of the storage platform and without the need for scripting. They can also automate management of Hitachi Open Remote Copy Manager (HORCM) tasks and replication pair management to reduce deployment time, maximise storage recovery options and minimise downtime.

Availability
Hitachi Data Protection Suite, powered by CommVault, for Hitachi VSP G1000 is available immediately from Hitachi Data Systems and a joint network of global resellers, systems integrators and solutions providers. Customers that want to quickly deploy modern data protection integrated with HDS systems can purchase a standalone licensing option for snapshot management today.

Safeguarding your corporate information in a BYOD world

By admin, 1 maja, 2014, No Comment

By Fred Mitchell, Symantec Division Manager, Drive Control Corporation

The Bring Your Own Device (BYOD) trend has gained popularity steadily across all sizes of business, from small operations right through to large corporates. This is due to BYOD enabling employees to use the devices of their choosing while business investment in IT is reduced. However, despite the benefits of BYOD, security remains a concern and a factor that may hinder adoption. Aside from the well-known challenges of network access, permissions and bandwidth abuse, information security is another concern, and one that many organisations neglect to consider. BYOD and its related mobility trend require organisations to rethink their information security policies and procedures in order to ensure their sensitive corporate data does not become vulnerable to a variety of breaches.

For large enterprise, BYOD offers the ability to dramatically reduce IT spend on end point devices, while catering to the requirements of their employees to use the device of their choice on the corporate network. This helps to improve productivity. For smaller businesses that may not be able to afford the latest technology, BYOD enables employees to still use this technology without cost to the company. However, if employees are all bringing their own devices onto the business network, and organisations do not control the information on these devices, they are left open to vulnerabilities in that sensitive information can be lost, stolen or can fall into the wrong hands, with potentially dire consequences. Information needs to be managed, especially when employees use the same devices for both work and personal purposes.

Take for example an employee with his or her own personal laptop and mobile phone, which are connected to the company network but are also used after hours for personal functions. For work purposes, this device requires access to corporate networks and corporate data, such as servers, email and other business information, but the device itself does not belong to the organisation. If this employee resigns from their position, and the information on these devices is not backed up, stored and then removed, and access to the network withdrawn, this former employee retains potentially sensitive information outside of the company’s control. With the impending implementation of the Protection of Personal Information (POPI) Act, this poses a serious problem, not to mention the threat of this information falling into the wrong hands or being used against the organisation. In addition, whether the employee remains at the organisation or not, mobile devices by their very nature are prone to theft or to being misplaced, with the result that information is stolen or lost.

If BYOD devices do not comply with an organisation’s security policy, the company network can be exposed to intruders and attacks. This includes not only information retention and deletion policies, but also traditional threats like viruses, Trojans, worms and the rest of the plethora of cyber malware. Securing the network requires that devices are given the right levels of permission, and that devices are checked and authenticated for applicable levels of protection, including anti-virus and other end-point protection solutions. Remote management and wipe capabilities are also necessary to introduce a level of control over data stored on these BYOD devices.

The reality is that it is simply not possible to manage all of these devices manually. In an organisation with thousands of employees, if each one brings multiple devices onto the network, the scale of the problem has potential to spiral out of control. The chance of human error with regard to manual policy implementation also introduces unacceptable levels of risk. Organisations need to ensure that they have the correct policies and procedures in place, and ensure that they have the right software to implement these policies and procedures and gain the necessary level of control over information on these devices.

Security solutions for a BYOD world need to perform multiple functions beyond traditional vulnerability management. Solutions need to ensure the secure management of devices regardless of their location, deliver a view of compliance for regulations around information such as POPI, streamline the management of devices and applications with support for a broad range of platforms and operating systems, provide automated patch management for up to date software, and provide capabilities that enable mobility without compromising on network and information security. BYOD as a trend is one that is here to stay, and organisations need to address these and other challenges in order to leverage the benefits without falling foul of security vulnerabilities.

Digital pollination for brands – The Ole! Media Group establishes HoneyKome

By admin, 1 maja, 2014, No Comment

Digital media organisation, the Ole! Media Group has launched HoneyKome a specialist agency, which will focus on the creation and implementation of strategic digital engagement models for brands and companies.

Says Group CMO, Desere’ Orrill: “HoneyKome has grown out of our mobile marketing division, MobiMedia, which specializes in mobile communication and helps brands engage with mobile consumers. As a natural progression, and to meet our clients’ requirements, our services have expanded across all digital and social media channels. The formation of HoneyKome is the embodiment of this expansion. “

In choosing the name HoneyKome, the company sought to emphasise the element of engagement which is so central to any marketing campaign. The parallel is drawn between bees pollinating (and thus activating) a garden, and the pivotal role which digital has come to play as the active ingredient in marketing today. With a service offering that promises “digital pollination for brands”, HoneyKome will concentrate on growing customer engagement through ‘sticky’ strategic solutions.

Beekeepers

Dylan Kruger

Dylan Kruger

Heading up HoneyKome as Agency Director is Dylan Kruger, formerly Head of Strategy at HelloComputer. “Because we believe that concept and strategy are the key elements in getting digital right, we specifically recruited a creative digital strategist,” said Orrill, who has been instrumental in establishing HoneyKome. With 15 years’ experience as a marketer and strategist, Kruger has written and implemented digital strategies for major brands such as Coca-Cola, Cadbury, Nivea, Ford, Toyota, Lexus, Samsung, FNB, Standard Bank, as well as various brands in the Pernod Ricard group.

Having worked as a corporate marketer before crossing the agency line, Kruger understands client requirements and business realities. In this he shares the group philosophy that digital should be an integral part of the overall marketing strategy and always serve business objectives and ROI. Said Kruger: “I’ve been on both sides of the table – client and agency – and I have a good insight into client requirements, as well as understanding agency structures. I’m at a stage in my career where I am ready for change, and the opportunity to head up HoneyKome within the Ole! Media Group is a challenge I savour.”

Kruger will add his personal stamp to the HoneyKome team, whose skills include a comprehensive shopping list for brands looking for a winning digital recipe. They include: creative concept and strategy, design and development, content creation and distribution – including in-house copywriting, photography and videography teams, social media management and community building, experiential marketing and the implementation of related technology requirements. The company’s strength as a ‘mobile first’ agency places it in prime position to address an African digital audience, from a simple USSD or SMS engagement campaign to a fully integrated digital and social campaign with multiple touch points and elaborate implementation.

In addition to HoneyKome, the Ole! Media Group comprises the founding company – mobile marketing agency, MobiMedia; digital publisher, TEAMtalk media; and AddSwitch, a specialist premium and programmatic digital media sales, planning and buying agency. The new division will provide the organisation’s well established customer base with strategic digital marketing services, drawing on a dedicated team of “honey bees” as well as the wide range of in-house competencies within the Ole! Media Group as a whole.

wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin skanowanie lublin tanie ksero lublin tanie kopiowanie lublin szybki druk wysokonakładowy projekty powykonawcze dokumentacja powykonawcza skanowanie do pliku wielki format skanowanie