Security Threat Report 2012


The year 2011 was characterized by major data breaches and targeted attacks on high-profile companies and agencies. Cybercriminals diversified their targets to include new platforms, as business use of mobile devices accelerated. And we saw a number of politically motivated
“hacktivist” groups take the media spotlight, even as the more common threats to our cyber security grew

SOFTWARE SECURITY


software security is the idea of engineering software so that it continues to function correctly under
malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some
help in understanding how to tackle it. This new department aims to provide that help by exploring
software security best practices. The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.


Using Wireless Technology Securely


In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free wireless connections in places like coffee shops and airports.
If you’re using wireless technology, or considering making the move to wireless, you should know about the security threats you may encounter. This paper highlights those threats, and explains what you need to know to use wireless safely, both in the home and in public. You will find definitions of underlined terms in the glossary at the end of this paper.
_____________________________________________________________________


Home Wireless Threats

Scansafe Web Security


As the Internet transforms from a static resource to a utility platform enabling two-way
communications, malicious threats have increased in volume and shifted their focus toward
the Web. Hackers are exploiting the vulnerabilities of an open and dynamic web to distribute
their malware rather than creating their own malicious websites. Web malware infection from
reputable websites that have been compromised is now not only a reality, but is now the
preferred route to infect victims. This change has made traditional methods of control such
as anti-virus less effective and requires an alternative approach to security.
___________________________________________________________________

Cloud-based Web Security