Archive for November, 2010

The British royal family announced yesterday that Prince William would marry Kate Middleton next year. With an event like this, everyone would naturally be searching the internet for information on the event, so cyber criminal have seen this as an opportunity to take advantage of the news coverage. People who searched for “Kate Middleton” , “Images for Kate Middleton” were ending up on web pages that infected their PC.
According to Websense 22.4% of all searches for current news leads to malicious search results
 

Attackers have infected over 1 million cell phones in China with a malware virus. The virus sends out text messages automatically. When the malware infects the phones, it sends out information about the infected device SIM cards to the attackers. With the SIM information, the hacker can remotely send messages from the infected mobile phones.

The criminal behind this virus appear to be using this as way to make money because the phones are texting premium-rate numbers.

The virus spreads by texting everyone in the user’s phone book. So far it has been estimates that this virus has cost users over €220,000 Euro

 

Tracking documents and printing is not enough yet. SurveilStar also enables you to control over every document operation. You can forbid certain users from accessing some documents, or grant read-only ability to the users.

SurveilStar can block copying files to removable devices, burning files to disc, transferring files via IM/FTP tools, or printing documents.

The document operation log contents include

  • Document operation type
  • Time
  • Computer name
  • User name
  • Source file name
  • File size
  • Path
  • Disk type
  • Application and caption.

If the file is shared via network, SurveilStar will also track who has been operated the shared file and the user’s IP address.

 

SurveilStar makes it easy for administrators or senior-level management to control access to mission-critical files and data. SurveilStar creates a record of who opened what file at what time and made what changes to it.

Thus, SurveilStar is raising the bar in data protection, by taking actions – blocking or tracking access — based on the contents within a file (for example, a Word document or Excel spreadsheet) as well as file names and paths, SurveilStar also eliminates the need for cumbersome fingerprinting of documents, or the need to check all files against a critical document repository on a server.

SurveilStar allows you to enforce individually, on a case-by-case basis, the policies that will affect each employee’s computer use. Example: your CEO can have blanket permission to attach files to an email. A junior member of the accounting team, however, can be blocked from attaching a spreadsheet of your company’s financial data to email.

Read More

  • 30% of people had stolen a contact database when they left an employer
  • 70% of people have stolen key information from work
  • 21% of data theft burn corporate documents and information onto CDs
     
4
Related Posts
ICO Investigating Lost and Found NHS Flash Drive, The UK Information Commissioner's Office (ICO) is investigating the loss of a flash drive that contains information about psychiatric patients from the ...
READ MORE
The microblogger service Twitter is consulting its legal team following a cyber attack that exposed internal documents."We are in touch with our legal counsel about what this theft means for ...
READ MORE
Facebook could be hit with tens of thousands of euros in fines for storing personal data of people who are not Facebook members. German officials have initiated legal proceedings against ...
READ MORE
1200 organisations polled and almost half believe UK data protection laws are too relaxed and need to be revised. 87% of said organisations should be forced to disclose when sensitive data ...
READ MORE
 Verizon Business 2009 Data Breach Investigations Report (April 14 & 16, 2009)According to Verizon Business 2009 Data Breach Investigations Report,the number of records compromised in the breaches it examined ...
READ MORE
ICO Investigating Lost of NHS Flash Drive
Twitter Company Data Compromised
Facebook Facing Allegations of Data Privacy Law Violations
According to nearly half of UK business men
Data Breach Investigations Report
You might also likeclose