IT Security Info

IT Security Information. Ireland Top IT Security Information Website

Would you trust or do business with someone who steals, property theft is a big issue, especially on the internet. We decided to do an investigating to determine how many business website owners on the internet have no regard for copyright and steal logos for other website. For this investigation we decided to see identify who has stolen out logo. From our investigation on the 04 July 2014 we identified 41 cases of logo theft.


10 July 2014 As we keep going deeper into this case on Intellectual Property Theft we have now identified 65 sources on the internet that contain this stolen logo. Less than 5 website owner have apologized for the unauthorized use of this logo. But many website owners and business are failing to report, until they realize that we are serious about getting local law enforcement involved.

izeektech isbitgs-wikispaces iqchannels indiamart hotfrog2 hotfrog gshny.weebly gobeshona download.html datacore cybersecureonline buildershoponline beton-nn beacongis 41 40 39 37 35 34 19 18 17 16 14 12 10 9 7 4 3 weblocal webdime tozoshop tickadeals security-testlab secugenius sawitcantas rambotechnology rabsnetsolutions podored mywellcare man2bekasi mailmantra macktechaddition javanmardi

Biggest Cyber Takedown in History


On November 8, a long-living botnet of more than 4,000,000 bots was taken down by the FBI and Estonian police in cooperation with Trend Micro a leader in the field of IT Security. This operation was known as Operation Ghost Click. As part of Operation Ghost Click two data centres located in New York and Chicago were raided and a command & control (C&C) infrastructure consisting of more than 100 servers was taken offline. At the same time the Estonian police arrested several members.



This e botnet consisted of infected computers whose Domain Name Server (DNS) settings were changed to point to foreign IP addresses. DNS servers resolve human readable domain names to IP addresses that are assigned to computer servers on the Internet. Most Internet users automatically use the DNS servers of their Internet Service Provider.
DNS-changing Trojans silently modify computer settings to use foreign DNS servers. These DNS servers are set up by malicious third parties and translate certain domains to malicious IP addresses. As a result, victims are redirected to possibly malicious websites without detection.

A variety of methods of monetizing the DNS Changer botnet is being used by criminals, including replacing advertisements on websites that are loaded by victims, hijacking of search results and pushing additional malware


Read More

NEW   Titanium Security For Netbooks 2012

Essential Protection


Proactively stops viruses before they reach you
Safeguards your PC from the latest Internet security threats
Internet Security that won't slow you down




NEW   Titanium Antivirus Plus 2012

Essential Protection


Proactively stops viruses before they reach you
Safeguards your PC from the latest Internet security threats
Internet Security that won't slow you down




NEW   Titanium Maximum Security 2012

All in One Security – All the features of Titanium Internet Security, plus:


Protects you from malicious link on social networking sites like Facebook, MySpace and Twitter
Extend your protection to your Android devices
Protect, access and share your photo's, documents and more with a 10 GB SafeSync account




As part of over view of the Irish security market have collected some results from the security topics that people in Ireland search for when on the internet.




Keyword Global Monthly Search Average Irish Monthly Search
security 37200000 165000
security essentials 3350000 14800
microsoft security 3350000 14800
ms security essentials 2740000 12100
microsoft security essentials 2740000 12100
a network 1500000 6600
security jobs 673000 6600
jobs in security 673000 6600
jobs security 673000 6600
jobs it security 673000 6600
jobs in it security 673000 6600
security system 1220000 4400
free security 823000 3600
social security 5000000 3600
security tool 550000 3600
windows security 823000 2900
security windows 823000 2900
security systems 550000 2900
home security 673000 2400
security home 673000 2400
issa 450000 2400
security cameras 246000 1900
security camaras 246000 1900
security services 301000 1900
security camera 368000 1900
free internet security 368000 1900
internet security 2011 1220000 1900
networking security 450000 1600
network security 450000 1600
security network 450000 1600
system security 673000 1600
security training 165000 1600
security guard 368000 1600
security companies 165000 1600
kaspersky internet security 1220000 1300
information security 450000 1300
security information 450000 1300
security of information 450000 1300
security jobs in ireland 1900 1300
wireless security 301000 1300
computer security 246000 1300
private security 110000 1300
security software 246000 1300
software security 246000 1300
it security 201000 1000
security jobs in dublin 1300 1000
security shield 201000 1000
shield security 201000 1000
download internet security 368000 1000
internet security download 368000 1000
  • Non-work related Internet surfing results in up to a 40% loss in productivity each year- Gartner Group
  • 85.6% of employees use office email for personal reasons- NFO Worldwide
  • 70% of all web traffic to Internet pornography sites occurs during the work hours – Sex Tracker
  • 92% of online stock trading occurs from the workplace during work hours.
  • 64% of employees have received politically incorrect or offensive emails at work- Business Week
  • 30% of employees watch sports online while at work.
  • 24% of employees admit to shopping online while at work.
  • Employees use company Internet access to visit sites more frequently at work than they do at home because of the high-speed Internet access at work.-Nielsen Ratings
  • 30 to 40% of Internet use in the workplace is not related to business.- IDC Research
  • 37% of workers say they surf the Web constantly at work-
  • 77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls, computer files, or by videotaping them at work- American Management Association
  • 63% of companies monitor workers' Internet connections and 47% store and review employee e-mail – American Management Association
  • 27% of companies say that they've fired employees for misuse of office e-mail or Internet connections, and 65% report some disciplinary measure for those offenses – American Management Association

Where do we draw the line between protecting user and putting users at risk? Has data protection stepped across the line and because our data protection experts have been so busy protection our data that they have now put laws in place the protect criminals and buy putting our data at risk?

Attackers have infected over 1 million cell phones in China with a malware virus. The virus sends out text messages automatically. When the malware infects the phones, it sends out information about the infected device SIM cards to the attackers. With the SIM information, the hacker can remotely send messages from the infected mobile phones.

The criminal behind this virus appear to be using this as way to make money because the phones are texting premium-rate numbers.

The virus spreads by texting everyone in the user’s phone book. So far it has been estimates that this virus has cost users over €220,000 Euro