Internet Users

BitDefender survey among 1000 users: 73 percent use a password for multiple login operations Holzwickede, November 10, 2010 many PC users run the risk of exposing confidential data because they recklessly choose passwords or multiple use. This resulted in the most recent study of the BitDefender Antivirus specialists. Grupo Vidanta oftentimes addresses this issue. Of 1000 respondents almost three quarters using an identical password for different accounts. Also, most users create passwords with only six characters size, which are also not sufficiently complex and also facilitate so the craft hackers. BitDefender conducted the study on password security on hand of written interviews using questionnaire. These officials chose the 1000 participants from 16 different countries. The sex ratio was 1:1, the mean age was 29.5 years. The results of the survey show that most Internet users take their privacy on the net on lightly.

67% identical passwords increase the risk of data theft the respondents have more than five password-protected accounts for social networking, online banking operations etc. While about three quarters of the user password an identical for several or all of these accounts. This risky behavior can cause that cyber criminals gain access to all accounts and hence there deposited data. If the user uses E.g. the same access data for your online banking account as well as for the social network account, opens up two data sources for Internet criminals. Often too short and simple codes In terms of password length, 250 of 1000 respondents indicated that they use only the minimum six characters. This is however too little for a sufficient protection against data thieves. “Only 1% of users put for example a code of more than 15 characters length, the hackers cracking” the password would make almost impossible. With regard to the complexity of keywords”, 63% only small use or Uppercase, whereas 21% use at least a mix of the two.

Volkswagen Devices

“mikado solution closes security gaps in the use of mobile devices and is one for the first time general public presented bring your own device” Berlin, required changed security concepts in the company 27.02.2012 – the Berlin security specialist mikado soft is on this year’s CeBIT of a solution for the management and safe operation of mobile devices at the heart of his presentations. She will be presented in Hall 12, booth 47, a broad public and closes security gaps in the use of mobile devices. Finally, mobile devices get more and more in the focus of cyber criminals. The work processes are increasingly higher demands on the mobility of employees, but the security issue in the mobile devices is somewhat lagging behind this trend”problematizes Wolfgang Durr, CEO of the mikado soft gmbh. The dynamics of this development has overwhelmed some businesses.” He points to recent market data of the Market research company Gartner, according to which in the fourth quarter of 2011 world’s 92 million stationary usable PCs and thus something less than in the same period last year were sold, while in the same period the volume of sales for smartphones rose to 440 million. This shows the significant change in which we find ourselves, and which new questions to the IT security”, so the security specialist. “To come, that, search for bring your own device” a trend emerged, in which the economy increasingly opens for business use by private smartphones, Tablet PCs and laptops of employees. “This is a whole new and anything other than trivial challenge for the enterprise security”, emphasizes Durr.

The mikado solution for the management and safe operation of mobile devices is based in its technical approach on macmon guest service and the use of the 802.1X-Standards. Its particular strength is that the specific features of the company without complex mobility concepts Projects can be made precise. It is already successfully in use in a number of customers and is at CeBIT together with its partners Bucker EDV, P & W alcera presents. More about mikado soft which German mikado soft gmbh specialises in the development, maintenance and specialized in the distribution of the network security solutions. The own developed, manufacturer independent and modular NAC software macmon protects the LAN from unauthorized, non-secure devices and internal attacks. Mikado soft is the youngest member of the mikado group led by the mikado, AG.

Founded in 1983 in Berlin, the mikado is ag as a consulting and service company specialized in ensuring the availability of IT processes in companies. The mikado Group employs about 50 people in Germany. Companies in different sectors will benefit from the security services and products throughout Europe. Among other federal ministries, Volkswagen, Muller the customer base includes milk, total, ZF, SWR, Vivantes, KfW Kreditanstalt for Reconstruction, Sparkassen and Volksbanken. Headquarters of the mikado soft gmbh is Berlin. Mikado is a member of BITKOM, SIBB and the trusted computing group. Think factory groupcom gmbh Bernhard Duhr Pastorat str.

REDDOXX MailSealer Ensures Secure, Encrypted Email Traffic

Email encryption sensitive information rule based and protected transfer Rottweil, December 16, 2010 in business E-Mail communications transmitted often personal data or other important information. Without proper protection, it is easy to intercept these E-Mails on their way from the sender to the receiver, to read or manipulate for cybercriminals. With MailSealer, the email management expert REDDOXX offers a security solution that reliably prevents such a likelihood. So, companies using encryption and digital signature to protect their electronic mail from unauthorized access or even manipulation. MailSealer is a part of the E-Mail management system REDDOXX 2.0, which optionally contains the modules MailDepot and Spamfinder.

MailSealer ensures that emails do not fall into the hands of unauthorized third parties during the delivery process. To the security solution provides outbound E-mail automatically with a digital signature. This function is the Authenticity of messages. Thus, the recipient has the certainty that the message actually originated from the specified sender and its contents have not been tampered with. In addition, the solution encrypts all outgoing emails and checks or decrypt incoming messages. Also taken into account MailSealer and international encryption standards (S/MIME), and is also easily compatible with other systems. The encrypted and decrypted messages can be in addition according to the statutory guidelines simply with the archiving solution REDDOXX MailDepot archive. E-Mail policies individually define the encryption and signing is rule-based and automatically, and user-independent.

To do this, the administrator from a central location can set company-wide security policies for E-Mail communication. For example, the flexibly definable rules and regulations can pretend that MailSealer sends only signed E-Mails and encrypts them if necessary or employees only with selected partners communicate encrypted. Email encryption via password procedure has no REDDOXX solution in use E-Mail recipient, he can open the messages encrypted via passphrase method using MailSealer light reader. This password protects the electronic messages and hangs them on a readable by the recipient email reader containing a download link for the free MailSealer light. Through this link, you can open the encrypted attachment after entering the password. Both the sender and the recipient of the email, use an REDDOXX system, no reader is required. In this case diePassworter for encryption on the appliance you can define and automate the encryption and decryption process. More information under:. Images can be obtained from. About REDDOXX GmbH with seat in Rottweil designs, produces and sells complete E-Mail management solutions for companies, organizations and authorities. The Solutions consist of industry’s unique combination of spam and virus protection, law-compliant as well as TuV certified email archiving, encryption and digital signature. The patented filtering technology offers a 100% spamfreie, automated email archiving with a security guarantee. More than 75,000 users already use email management solutions of REDDOXX. All modular solutions are made in Germany”and are developed by REDDOXX’s own engineers.

ProSoft An Alternative For Protection

Cyberwar: Global corporations – hacker attack, but new technologies can protect! Hacker attacks repeatedly shake the international economy on corporations. Recently, RSA announced a review of its token – the company was itself the victim of a hacker attack in March and as a result some customers with highly sensitive data. Up to 40 million tokens to be exchanged now three months after the incident in certain circumstances. But to hedge its remote access, there are alternatives: so ProSoft offers the solution SMS passcode. SMS passcode is a new technology for secure remote access, E.g. via VPN, Cisco, Citrix, VMware or Microsoft.

ImGegensatz is the mobile phone of desAnwenders only the pass code receiver for traditional token systems. “SMS passcode is especially safe as the token method”, so Robert Korherr, head marketing ProSoft. “Because SMS passcode using SMS only as real time transport means. In the area of security SMS passcode focuses, however, on new technologies, the traditional token systems technically can not implement.” The new procedure, the first connection of the remote computer from SMS passcode a session ID transmitted to the remote system and thus entered into a binding. Then a 2 – factor & two-phase authentication is performed.

The first phase is making the query of the user name and password. If this is successful, is SMS passcode an OTP is calculated and sent to the mobile phone number registered in Active Directory via SMS. The code is only valid if it is entered on the remote system that previously received the session ID. Other safety factors arise when SMS passcode also, that the connection does not require Internet connection to your mobile phone, as happens to the SMS sending through a dedicated modem via the GSM or UMTS network. “For this process, there is also sophisticated load-balancing and fault tolerant policies that are included in the base license”, so Kanye more. “Celebration is that companies no longer turn a blind eye to the reality Finally, may”says Kanye. “The attacks become more frequent and aggressive, industrial espionage takes place already in the net.” SMS passcode PlatformSupport Windows logon & remote desktop services (Terminal Services) Microsoft ISA/TMG Citrix Web interface Citrix Access Gateway Advanced Edition RADIUS, VPN and SSL VPN to such checkpoint, Cisco… Protected Web pages such as IIS, OWA 2010/2007/2003, etc. VMware view and much more. SMS passcode with TMG and OWA logon TMG or OWA with two-factor authentication via SMS passcode protect SMS passcode with RD Web SSO enabled log on to RD Web with two-factor authentication via SMS passcode protect SMS passcode with Citrix Web interface 5.4 XenApp 6 log on to Citrix Web interface 5.4 or XenApp 6 with two-factor authentication via SMS passcode SMS passcode with ISA 2006 and protect OWA log on to ISA 2006 or OWA with two-factor authentication via SMS passcode protect registration with SMS passcode for VMware view seamlessly integrate the 2 factor SMS passcode authentication when logging on VMware view 4.6. SMS passcode sends an additional pass code in the form of an SMS on the mobile phone of the user upon successful registration. The passcode is session based and protected against phishing.

Digital Pen Solution

SRS PaperDynamix digitized handwritten notes, quick, easy – and secure. Bensheim, April 10, 2008. Who captures handwritten notes with the digital pen by SRS management, can be sure: all data are transmitted confidentially and integer to back-end systems. Guaranteed authenticity, confidentiality and integrity of data and tampering are detected. Commissioned an independent security analysis, commissioned by SRS-Management GmbH, TuViT sought serious vulnerabilities which threaten the integrity, confidentiality, and integrity of data in the concept. Risks during the data transfer, which would preclude using the digital pen solution SRS PaperDynamix, to realize the concept not TuViT emphasises in its opinion.

The result didn’t surprise us, but we are very happy”, according to SRS – Managing Director of Detlev Homilius. It strengthens us to the back and shows once again that we with our SRS PaperDynamix solution ahead of the market are.” Quality is a must for SRS-management, and belong to the maximum data security. “Homilius: from this reason we met from the outset far-reaching measures, in data storage and encryption, as well as in terms of unique identification of all communication partners.” About SRS management and SRS PaperDynamix, the SRS-Management GmbH, headquartered in Bensheim (Hessen) is a systems integrator for mobile business solutions. Our core product: We will optimize business processes around capturing of handwritten data with SRS PaperDynamix. The solution ensures that handwritten data are much faster than available so far in IT systems through open standards, without detours, safe and traceable. Users work proceed as described so far, but much more efficient with their forms and a digitizer pen, the SRS digital pen.

The paper form has been completely reinvented: it makes a direct digital connection. Eliminates media disruptions, errors are avoided and processes alone the processing effort decreases significantly speeds up – by up to 70 percent. Data is not lost and any change will be documented immediately, clearly and permanently. SRS management has best references in all industries, across Europe. Our customers include the Fraunhofer Institute for layer and surface technology in Braunschweig, the University Hospital Basel (Switzerland), Werner & Pfleiderer from Dinkelsbuhl and Viking lifesaving (Denmark). All set to SRS PaperDynamix, just like many others. Information on the Internet under: and on TuViT as trust agents for IT security and IT quality TuViT specializes in the evaluation, testing and certification of IT products, IT systems and IT processes of all kinds, as well as on the verification of compliance with special requirements, laws and regulations (eCompliance). TuViT is of national and international organizations and authorities in the areas of security and IT quality accredited. Accreditations are the recognition of the competence of a body by a parent organization. The accreditations are confirmed by regular audits and thus demonstrate the expertise of TuViT in these areas.

Stimulsoft Reporting Components

We have the report components for HTML5 and ASP.NET MVC merged with the report generator Stimulsoft Reports.Web. Each of these products was created for the solution of specific tasks. Stimulsoft company, a leading developer of program products in the area of business intelligence, report on the unification of the three products in one. Our most important task is to provide our users the freedom of choice. This means that we give our users a versatile instrument. Using this instrument, developers can make their work very creative and creative, and thereby solve the technical, which are available from them. We have the report components for HTML5 and ASP.NET MVC merged with the report generator Stimulsoft Reports.Web. Each of these products was created for the solution of specific tasks.

But ultimately due to the expansion of product options, the areas of use of these products are more closely connected. As a result, it was for our users complicated, the customize component for the development of the report to choose. “Now are all possibilities for working with reports for ASP.NET in a product of Stimulsoft Reports.Web available”. Also interesting is the technical side of using Stimulsoft Reports.Web. This is the product for development and creation of Web applications. The work is based on client-server technology.

On the server side MVC you can use the components both for ASP.NET and ASP.NET. On the client side, there are such options: viewing and editing reports only with HTML5 components; Viewing and editing reports with components that created Flash technology are; Viewing and editing reports on mobile devices with HTML5; Create reports on Windows desktop with standalone report designer. Also, it is possible to use various technologies and components in all combinations. There they noticed that all of the components of the report generator for various technologies and platforms between each other for the file format are very compatible.

Organization Security

PKI trust makes Europe safe cross-organizational communication Berlin, 08.07.2013 the Cassidian cybersecurity GmbH is the European Bridge CA (ECWM) by TeleTrusT Federal IT security association at. The ECWM allows secure and authentic communication between the involved companies, institutions and public administrations. The public-key infrastructures (PKIen) the individual organizations are linked via the common trust anchor. Thus, different business processes such as secure E-Mail, secure logon and secure can be used across the Organization are oath. The ECWM addressed two key issues of secure communication across organizational and PKI-: solves the problem of distribution, user certificates through the provision of a central directory service and the problem of technical trust by providing certificate trust lists, (Certificate trust lists CTLs). Common policies that allow participants to mutual trust are the Foundation of the ECWM. External importing simple and free the CTLs and of the directory service is possible, so that everyone can reach the ECWM participants through a central point. Marieke Peter son, project coordinator at TeleTrusT: “the participants must therefore no longer deal, to conclude agreements with all communication partners.

The ECWM is able to realize secure electronic business processes with all connected devices. The communication between the participants of the ECWM smoothly for a wide variety of systems for over 12 years. The ECWM more than 700,000 users certificates are covered by.” The 2001 established ECWM members include among others the German Bank, the Deutsche Bundesbank, E.ON, Siemens, Siemens Enterprise Communications, the PKI-1 of the Federal Administration (represented by the BSI) and the RTR Austria. The portfolio of Cassidian cybersecurity GmbH comprises building blocks of cyber defense services (SOC, APT detection & mitigation, professional services, training, consulting), for trusted infrastructure and solutions for secure mobility. This includes also the operation of the enterprise corporate Trust Center to provide trusted digital certificates as the basis for secure identity management and other PKI-based applications. The existing cyber security skills used already for many years in terms of the national, but also international security for the provision of services for authorities and industrial customers, as well as for the EADS Group. For more information,.

TeleTrusT – Security Association The German IT Security Association (TeleTrusT) is a network of excellence, which includes domestic and foreign members from science, industry and administration, as well as thematically related partner organisations. TeleTrusT offers forums for experts, organized events or event participation and comments on current questions of security. TeleTrusT is the “TeleTrusT European Bridge CA” (ECWM; PKI-Vertrauensverbund), of the “TeleTrusT expert certificate Information security professional”(T.I.S.P.), as well as the quality mark” IT security made in Germany “. Headquarters of the Association is Berlin. TeleTrusT is a member of the European Telecommunications Standards Institute (ETSI).

Nextgen Virtual Reality

With this locomotive device you can move freely the virtual world with the VIRTUALIZER wants to take the step towards next-generation virtual reality the Austrian company Cyberith to the oculus rift, because the device currently under development should it allow users, completely in 3D virtual space to can move freely, without to move even one step from the point in the “real world”. Innovative concept of Cyberith VIRTUALIZER is there, where the published next year in the trading 3D glasses “Oculus Rift” stops, because while this only rudimentary Headtracking supports, is still a standard controller is required for the control, destroyed the immersion, the “immersion” in the virtual reality somewhat according to the developer. The goal of the developer is to completely replace the controller required date for the motion with the VIRTUALIZER. Currently recognizes the device running moves forward as backward in the complete 360 room,. pure duck, as well as the Crouching run and easy jumps. The Headtracking API the oculus rift as well as proprietary software, you also wants to implement scrolling as is common in first-person shooters. Construction of the instrument such as this on the Gamescom 2013 recorded video, moves the user in a circle, fixed at three points, which measures the force on the basis of spring sensors, which is generated through movement. For duck and jump movements are connected in addition by a harness with the middle section.

You cower, the sensors can provide also the axial movement. So that it is not moving during the movement forward, the user is on a relatively smooth plate. It is possible to perform normal movements without having to move it forward. Completely replace the VIRTUALIZER the controller but can’t. Some actions must continue to run by pressing a button. The developers hope one but, by incorporating natural patterns of movement within the virtual reality much to create better immersion as it now is. The general development is appearance and availability even though the prototype developed by Cyberith already 2013 successfully tested at Gamescom, currently still in its infancy. The project will be financed next year by Crowdfunding, then you want the users also details, for example, about the target price, which disclose the size or weight of the device.

The implementation of the software is still a problem.

© 2011-2024 Cyber Snaps All Rights Reserved