A Brief History of Firewalls and the Rise of UTM
The first article is a guest blog by Richard Stiennon, security expert and Chief Research Analyst for IT Harvest, the article covers one of the most important security device which is the UTM (Unified Threat Management) and firewalls, the post goes over different firewall generations and what have been changed in term of security for protecting corporate network against zero-hours attack.
“We are now well into the appearance of the Next Generation Firewall: network appliances that look at all the packets traversing them and determine their threat potential based on numerous factors such as malware, exploits, and source URL. There is some confusion in the literature over the difference between traditional firewalls and this next generation which has become known as UTM, Unified Threat Management, a term coined by Charles Kolodgy of IDC. Cisco for instance, include IPS or Anti-virus functionality in their ASA firewalls by attaching a separate card that can run separate security applications, but that is just a stepping stone to UTM. “
Trojan Attacks Possible in Quantum Cryptography
This is a new research that comes to discover a new Trojan attack on Quantum Cryptography, Quantum protocols help to provide a highly secure way for key exchange and eliminate the Man in the middle attack, but this paper describe the possibility to use malicious software to store data in one protocol and leak it in subsequent protocols.
“No existing security deﬁnitions address attacks of the type we describe. A theoretically simple way to prevent these attacks is to dispose of – i.e. securely destroy or isolate – untrusted devices after a single use.”
From China with Love: New Android Backdoor Spreading through Hacked Apps
“With the Android OS surpassing more than 50% of market share on mobile devices, the number of malicious attacks has increased considerably. Freshly discovered by Bitdefender, the FakeAngry family of Trojans is just one of the e-threats targeting smartphones running Android, and especially users who rely on third-party Chinese Markets to download applications.”
Zero-day Smartphone Vulnerability exposes location and User Data
“Smartphones are increasingly becoming the preferred device for both personal and professional computing, which has also attracted hackers to increase their focus on creating malware and other security vulnerabilities for these devices. A former McAfee researcher “Dmitri Alperovitch” has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails.”
Compromised Websites an Owner’s Perspective
This is a study report that looks at website attacks and a survey conducted with website owners. The analyses show that many website owners have no abilities to detect and resolve attacks and they have been alerted about the compromise from a third party.
“Diversity of platforms hosting compromised sites, and the variety of methods by which they were compromised, demonstrate the opportunistic nature of cybercriminals. Website owners, hosting providers, security organizations, and other parties will have to work individually and together to create an equally diverse set of innovative solutions to combat the threat of compromised websites”