February 2014 – Security & Privacy Protection

1Cloud

Akamai and Prolexic have officially joined forces to make the Internet a fast, more reliable and secure place to do business

Akamai, the leading provider of cloud services finally tied the knot with Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services. The deal has been in the making for months now and was officially announced just this week. Together, they are able to offer a more comprehensive portfolio of cloud-based Web […]

Akamai and Prolexic have officially joined forces to make the Internet a fast, more reliable and secure place to do business Read More »

2advanced

Advanced Threat Report reveals global expansion of malware attacks

FireEye’s latest Advanced Threat Report has just been released, detailing malicious activities captured by the FireEye Security Platform throughout 2013. The report shows that malware activity has become so pervasive globally that attack servers communicating with malware are now hosted in 206 countries and territories.

Advanced Threat Report reveals global expansion of malware attacks Read More »

5Yota

Yota Devices partners with Cellrox to provide users work-personal phone functionality, privacy and security

Yota Devices, developer of high tech consumer LTE devices, and Cellrox, a leader in multi-persona solutions for mobile devices, announced at Mobile World Congress (MWC) a partnership agreement to provide Cellrox’s multi-persona technology on the dual-screen YotaPhone. With this technology, YotaPhone will provide functionality, privacy and security for both corporate and personal use.

Yota Devices partners with Cellrox to provide users work-personal phone functionality, privacy and security Read More »

1privacy

A new culture of privacy and trust in the Internet is urgently needed

Concerns about the safety of new services on the Internet are as much part of our virtual life as the carefree spread of personal data on social networks. Obviously, the tension between the need for openness on one hand, and security on the other hand, requires a new culture of privacy and trust on the

A new culture of privacy and trust in the Internet is urgently needed Read More »

2shareeconomy

The shareconomy requires secure exchange of data

“Shareconomy” was the motto of the CeBIT last year, the world’s largest international computer show that will open its doors again next month in Hanover, Germany. What it describes in a condensed matter is the sharing of information which quite obviously requires a secure exchange of data and good solutions to fight viruses, worms and

The shareconomy requires secure exchange of data Read More »

phishing-attack

Phishing attacks up, as fraudsters seek targets of highest return

The Anti-Phishing Working Group (APWG) has been active for more than a decade now to unify the global response to electronic crime and the group just published its new Q3 2013 Phishing Activity Trends Report last week. In general, the APWG measures the evolution, proliferation, and propagation of crimeware by drawing from the research of

Phishing attacks up, as fraudsters seek targets of highest return Read More »