Exciting information to share!! KrowTen Security is proud to announce its affiliation with WildPort Security. WildPort is an Information Security firm that delivers top-notch support and services to match. They specialize in network assessments and measuring security performance. Check them out http://wildportsecurity.com
Big things coming from these two companies. Stay tuned…..
KrowTen has been off for awhile. Getting established and learning new things. Stay tuned! Lots of info on the way.
Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection — Kaspersky PURE 2.0 Total Security. Using Kaspersky Lab’s award-winning anti-malware protection and an array of additional security tools, Kaspersky PURE 2.0 Total Security is the easiest way to keep multiple PCs secure, irreplaceable digital assets protected, and children safe and responsible online.
Central Home PC Management
Ideal for households with multiple computers, including families with children, Kaspersky PURE uses Home Network Management to easily protect, manage and monitor every PC in the household from a single machine.
— Run all scans, updates, and backup tasks on every PC in the house automatically or on-demand
— Fix security issues without getting up from your desk
— Manage parental controls from anywhere in the house, so your kids are protected even when they’re out of view
— Conveniently update the Kaspersky PURE licenses throughout your home
Total Package of Security Tools
Kaspersky PURE also includes everything you need to secure your online identity and protect your irreplaceable digital property. When you install Kaspersky PURE, our extra layers of security mean you can say good-bye to overpriced and inefficient niche products.
This is great work. I am demoing the product now and will post my review shortly. Very excited about how this will shape the home and small business central management landscape. Will vendors pile on?
More on this breaking news can be found here: http://www.marketwatch.com/story/kaspersky-lab-announces-new-generation-of-ultimate-pc-protection-for-your-home-2012-03-26
The NSA‘s new spy center will see everything
Imagine a massive supercomputer in the desert, watched around the clock by armed guards, capable of intercepting and decrypting virtually every piece of information in the world. Sounds like science fiction doesn’t it? Well, according to Wired, the NSA is in the process of building just such a place, and they’ve madeleaps and bounds of progress at breaking the standard AES encryption algorithm that keeps your emails and other private information secure.
This new surveillance center is being constructed in the Utah desert, near a town called Bluffdale. When it’s finished, you’ll be able to fit five US Capitols inside, and most of that space will be occupied by supercomputers capable of storing more data than you can even imagine (you can imagine a lot, can’t you?). Your private emails, Google searches, receipts, travel information – pretty much ever scrap of data generated – will be stored here, while sophisticated software sifts through it in search of anything remotely suspicious.
More on this interesting story here: http://www.neowin.net/news/the-nsas-new-spy-center-will-see-everything
- Everybody’s a Target: NSA Building Largest Spy Center Ever (musicians4freedom.com)
- The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say) (wired.com)
- National Security Agency To Build Spy Center That Will Track All Electronic Communication (inquisitr.com)
- RT News – NSA Utah ‘Data Center’: Biggest-ever domestic spying lab? – RT (2012indyinfo.com)
From SophosLabs: on March 6, 2012
The patch addresses two CVEs in Flash Player, CVE-2012-0768 and CVE-2012-0769, both reported to Adobe by Google researchers.
Chrome users should restart their browser as soon as possible as Google has automatically provided the fix in the latest Chrome update.
CVE-2012-0768 is a memory corruption vulnerability that could lead to remote code execution by exploiting a flaw in Matrix3D.
CVE-2012-0769 is an information disclosure vulnerability as a result of integer errors in Flash Player.
As always we recommend deploying these updates as soon as possible. While we do not have any evidence of these flaws being exploited in the wild, past patterns indicate it won’t be long.
- Adobe Patches Flash Player for Second Time in 20 Days (pcworld.com)
- Adobe patches Flash Player for second time in 20 days (infoworld.com)
- Google patches 14 Chrome bugs, pays record $47K in bounties and bonuses (macworld.com)
- Important BlackBerry Tablet OS Update: Includes Fix for Adobe Flash Player (blogs.blackberry.com)
Cisco WLCs and Cisco WiSMs are responsible for system-wide wireless
LAN functions, such as security policies, intrusion prevention, RF
management, quality of service (QoS), and mobility.
These devices communicate with controller-based access points over any Layer 2 (Ethernet) or Layer 3 (IP) infrastructure using the Lightweight Access Point Protocol (LWAPP) and the Control and Provisioning of Wireless Access Points (CAPWAP) protocol.
The Cisco Wireless LAN Controller (WLC) product family is affected by
the following vulnerabilities:
* Cisco Wireless LAN Controllers HTTP Denial of Service Vulnerability
* Cisco Wireless LAN Controllers IPv6 Denial of Service Vulnerability
* Cisco Wireless LAN Controllers WebAuth Denial of Service Vulnerability
* Cisco Wireless LAN Controllers Unauthorized Access Vulnerability
Cisco has released free software updates that address these vulnerabilities. Workarounds are available that mitigate some of these vulnerabilities.
This advisory is available at the following link:
The Cisco WLC product family is affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability.
Each of the following products is affected by at least one of the vulnerabilities covered in this Security Advisory:
* Cisco 2000 Series WLC
* Cisco 2100 Series WLC
* Cisco 2500 Series WLC
* Cisco 4100 Series WLC
* Cisco 4400 Series WLC
* Cisco 5500 Series WLC
* Cisco 500 Series Wireless Express Mobility Controllers
* Cisco Wireless Services Modules (WiSM)
* Cisco Wireless Services Modules version 2 (WiSM version 2)
* Cisco NME-AIR-WLC Modules for Integrated Services Routers (ISRs)
* Cisco NM-AIR-WLC Modules for Integrated Services Routers (ISRs)
* Cisco Catalyst 3750G Integrated WLCs
* Cisco Flex 7500 Series Cloud Controllers
Measures to mitigate these risks can be found here: http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20120229-wlc
- Cisco Releases Multiple Security Advisories (netsecurityit.wordpress.com)
- Cisco Security Advisory: Cisco Small Business SRP 500 Series (netsecurityit.wordpress.com)
- Cisco Security Advisory: Cisco NX-OS (netsecurityit.wordpress.com)