Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Oracle Acquires Datalogix

January 6, 2015 by  
Filed under Computing

Comments Off on Oracle Acquires Datalogix

On Monday, Oracle agreed to purchase Datalogix for an undisclosed sum, saying that together the companies will provide marketers with a richer understanding of what consumers do, say and buy, allowing them to measure the effectiveness of their different campaigns and advertising channels.

Oracle plans to link the Datalogix service, which provides the spending data to customers through a cloud-based tool, to its other cloud-based services via Oracle Identity Graph. This, it said, will allow it to connect consumer identities to build better profiles that can be used to personalize online and mobile services — and even to target them offline and via the TV.

It made no commitment to maintain the existing Datalogix product roadmap, saying that it was still reviewing its plans. The companies set no timeline for completing the deal, which they said must meet customary closing conditions including obtaining regulatory approval.

Source

Phishing Attacks Increasing

July 2, 2013 by  
Filed under Security

Comments Off on Phishing Attacks Increasing

Security researchers at Kaspersky Lab have reported significant growth in phishing attacks over the last year.

In a study entitled “The Evolution of Phishing Attacks”, Kaspersky said it found 37.3 million out of its 50 million customers running its security products that were at risk of being phished from 2012 to the present, an 87 percent increase over the same period between 2011 and 2012.

“The nature of phishing attacks is such that the simplest types can be launched without any major infrastructure investments or in-depth technological research,” Kaspersky said in the report.

“This situation has led to its own form of ‘commercialization’ of these types of attacks, and phishing is now being almost industrialized, both by cybercriminals with professional technological skills and IT dilettantes.”

The security firm explained that overall, the effectiveness of phishing, combined with its profitability for criminals and how simple the process is to undertake has led to a steadily rising number of these types of incidents.

Kaspersky noted that most of the victims in 2012-2013 were located in just ten countries, that is, Russia, the US, India, Germany, Vietnam, the UK, France, Italy, China and Ukraine. These 10 countries were home to 64 percent of all phishing attack victims during this time.

In addition to a rise in the number of users attacked, the number of servers involved in phishing attacks also increased, Kaspersky said, without giving any exact numbers. Though the firm did reveal that internet giants like Yahoo, Google, Facebook and Amazon are the top targets of malicious users.

“Online game services, online payment systems, and the websites of banks and other credit and financial organizations are also common targets,” the firm added, warning users to stay vigilant when entering personal data.

Source

The U.S. Is Falling Behind

February 16, 2012 by  
Filed under Around The Net

Comments Off on The U.S. Is Falling Behind

The U.S. government is losing a race in cyberspace — a social-networking race for the hearts and minds of the Internet community, a computer security expert said Wednesday.

Other countries — and many companies — are using social-networking tools to their advantage, while the U.S. government has taken tiny steps forward, said Rand Waltzman, a program manager focused on cybersecurity at the U.S.Defense Advanced Research Projects Agency (DARPA).

The Chinese government pays citizens to patrol social-networking sites and dispute negative talk about all levels of government or any aspect of Chinese life, and companies such as Dell and Best Buy are training workers to respond to complaints on Facebook and other social-networking services, Waltzman said at the Suits and Spooks security conference in Arlington, Virginia.

U.S. regulations prevent the government from undertaking similar campaigns, he said. “Any time you want to go to the bathroom, you need presidential approval,” he said.

The U.S. will not be able to protect its residents if it cannot engage in its own covert social-media operations, Waltzman said.

Waltzman told about a U.S. special forces unit in Iraq in 2009 that attacked an insurgent paramilitary group, killed 16 of the members of the group and seized a “huge” weapons cache. As soon as the U.S. unit left the scene, the Iraqi group returned, put the bodies on prayer mats, and uploaded a photograph from a cheap mobile phone, he said. The group put out a press release in English and Arabic.

Source…

Google Search To Add Default Encryption

October 25, 2011 by  
Filed under Around The Net

Comments Off on Google Search To Add Default Encryption

Google is implementing over the next few weeks default encryption using SSL on searches for users signing in with their accounts, the company said Tuesday.

The move comes over a year after Google made SSL the default setting for Gmail, and also unveiled an encrypted search service.

“As search becomes an increasingly customized experience, we recognize the growing importance of protecting the personalized search results we deliver,” Google’s product manager, Evelyn Kao said in a blog post on Tuesday.

The encryption is expected to be particularly useful for people using an unsecured Internet connection, such as a Wi-Fi hotspot in an Internet cafe, Kao added.

With Google search over SSL, users get an end-to-end encrypted search channel between their computer and Google. The secured channel helps protect search terms and search results pages from being intercepted by a third party, Google said in a description of SSL search.

Over the next few weeks, users will be redirected to a secure search site when they are signed in with their Google Account. The change encrypts search queries and Google’s
results page.

Users can also navigate directly to the secure search site if they are signed out or don’t have a Google Account.

Source…