Two in the iOS Kernel and one in the WebKit, Lookout, and Citizen Lab reported vulnerabilities deemed "Trident" yesterday, heightening concerns over Apple’s security system and sparking discussion.
The Trident vulnerabilities are zero-day threats that allow hackers to access a victim's personal data via SMS phishing. This means that the target device could be potentially jailbroken, remotely, prompting the hacked device to share its private contents with the attacker. This type of attack is especially dangerous because device owners may not even know that their device has been compromised. These vulnerabilities give attackers access to the device's kernel memory where they can then execute arbitrary code when victims are visiting malicious websites.
This year, we received a unique opportunity to help with the filming of the fifth installment of the Bourne Identity series, starring Matt Damon as Jason Bourne, a spy who must face a perilous journey to remember exactly who he is. Along with our Marketing Events Manager, Isabelle Azadmanesh, I flew down to Las Vegas to be part of the filming, which featured the OPSWAT booth and Metadefender Kiosk at the on-set cyber security tradeshow, "Exocon," filmed at the ARIA Resort and Casino. While on set, our Metadefender Kiosk and live threat video (shown below), were showcased. The Threat Map video was created by Kele Todd, our Video Art Director, who was inspired by Metadefender.com's Threat Map. Matt Damon and Tommy Lee Jones were among the stars seen on set.
OPSWAT's educational workshop, designed to help nuclear facilities achieve compliance, was a great success with dozens of attendees from a majority of nuclear facilities in the United States. The event was a great opportunity for our team to train, educate and collect feedback for OPSWAT's Metadefeder product line. The workshop specifically addressed requirements needed for NEI 08-09 Revision 6 (Cyber Security Plan for Nuclear Power Reactors). The event inspired discussion and meaningful feedback from some of our most valued customers in critical infrastructure. OPSWAT's Metadefender threat detection and prevention platform is leveraged by high-security facilities to ensure the safe transfer of data.
Google researcher from Project Zero team, Tavis Ormandy, yesterday discovered numerous critical vulnerabilities in 25 of Symantec and Norton security products. Symantec has released fixes for these exploits with guidance that users should install them immediately.
Read to learn how the OESIS Framework can reduce the probability of an endpoint being compromised.
Just like Metadefender Core (Metascan) 3.x, Metadefender Core 4.x supports deployment in either online or offline environments, although there are some differences between the two versions. Since the process has changed, we would like to provide an update to our users that will be upgrading to Metadefender Core 4.x in an offline environment.
Cybersecurity Ventures just announced the Q2 2016 edition of their list of 500 of the hottest companies providing cybersecurity solutions and services. We are excited to announce that OPSWAT is listed as a leading provider of solutions to secure and manage IT infrastructure. Other companies who made the list include OPSWAT technology partners such as RSA, F5 Networks, and Microsoft, as well as our Metadefender engine suppliers including AhnLab, Avira, CYREN, and many others.
OPSWAT periodically reviews the engines included in each of the standard Metadefender Core engine packages to determine if we are providing the best combination of engines for our customers. With the recent release of Metadefender Core, we have changed the engines included in each of the standard packages.
OPSWAT has recently released a reference implementation to show how Metadefender Kiosk users can use the pcProx Plus RFID reader with their deployment to authenticate users based on RFID cards or badges. The source code and compiled binaries are available for download on the OPSWAT Portal. This reference implementation will read the RFID identifier from a card or badge and use that as the username for a Metadefender Kiosk scanning session. Included in the implementation is also a simple database that shows how cards can be looked up and associated with a specific user. Metadefender Kiosk users can modify this sample for their own user database implementation.