Today is World IPV6 Day with a number of organisations starting to offer Internet services using the replacement Internet Protocol version 6 (IPv6) standard, that contains a number of improvements over the legacy IPv4. A key benefit is a huge increase in possible address space.
From a security perspective, Symantec feels this move raises some new and potentially interesting problems for malware authors, anti-virus companies and system/network administrators. With the introduction of IPv6, it is now unlikely for cyber criminals to perform brute force IPv6 address scans to profile a network or identify a possible attack vector in this way.
Events like World IPv6 Day are important steps towards a full adoption of the replacement protocol. But as we move towards this goal, we are facing a learning curve where new threats while not yet fully apparent, will gradually emerge as malware authors are certain to take note and begin adapting.
As always, Symantec recommends that you keep your definitions, signatures and firewall rules up to date to ensure protection against threats.
Read more about this brave new world of IPv6 at Symantec’s security blog.
Well looks like Symantec does it again. 3rd and 4th year consecutive wins are pretty impressive results, if you ask me.
SINGAPORE – December 8, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced that Symantec Endpoint Protection 11.0 and its VeriSign Identity Protection Authentication Service have won the 2010 NetworkWorld Asia Readers’ Choice Product Excellence Awards for Best Anti-Spyware/ Malware and Best Identity Management Suite categories respectively. This is Symantec’s fourth consecutive win for Symantec Endpoint Protection and its third consecutive win for the VeriSign Identity Protection Authentication Service.
Facebook has announced its new email service which brings together Facebook messages, instant messaging chat and SMS messages in one place.
This geek was alerted to some of the security implications through an FAQ guide which Sophos has setup.
"Before signing up, users need to realise that these new features increase the attack surface on the Facebook platform, and make personal accounts all the more alluring for cybercriminals to break into," said Graham Cluley, senior technology consultant at Sophos. More from Sophos after the break.
Sounds like something straight out of a spy movie? In this day and age, you never know especially after Google claimed that the Chinese government orchestrated an attack on their services just early this year. Read the full release from Symantec for yourself and be your own judge:
SINGAPORE, October 7, 2010 – Symantec Corp. (Nasdaq: SYMC) has released the findings of its 2010 Critical Information Infrastructure Protection (CIP) Survey, which highlights that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks. Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 to their businesses. Survey participants from the energy industry reported that they were best prepared for such an attack, while participants from the communications industry reported that they were the least prepared. Critical infrastructure providers represent industries that are of such importance either to a nation’s economy or society that if their cyber networks were successfully attacked and damaged, the result would threaten national security.
Norton Cybercrime Report is the First Study to Gauge Emotional Impact of Cybercrime on Internet Users and reports of victims feeling very ripped off and upset.
Singapore – September 9, 2010 – The next time you surf the Internet, consider this: you might just be one click away from becoming the next cybercrime victim. A new study released today from security software maker Norton, reveals the prevalence of cybercrime in Singapore where 70 percent of Internet users have fallen victim to cybercrimes, including computer viruses, online credit card fraud and identity theft. This silent digital epidemic is the result of consumers‟ apathy, which leaves them vulnerable and exposed in the online world.
The Norton Cybercrime Report: The Human Impact
Club Penguin arrived in Singapore this week. This geek has always heard about Club Penguin making millions of dollars getting kids to dress up Penguins but never understood the reason behind their wild success until now. While I’m working on a story on my CNET Blog now, you can read the full press release after the break.
Singapore: 8th September 2010:
When 2009 came to a close, Symantec made a few predictions regarding what online security trends that were expected in 2010. They have just released this mid-year status check, pretty interesting. Check it out:
Antivirus is Not Enough – With the rise of polymorphic threats and the explosion of unique malware variants in 2009, the industry is quickly realizing that traditional approaches to antivirus, both file signatures and heuristic/behavioral capabilities, are not enough to protect against today’s threats. We have reached an inflection point where new malicious programs are created at a higher rate than good programs. As such, we have also reached a point where it no longer makes sense to focus solely on analyzing malware. Instead, approaches to security that look to ways to include all software files, such as Reputation-Based Security, will become key in 2010.
Status: On track
This appeared in my inbox yesterday:
”PLEASE THIS LETTER MUST REMAIN SECRET”
I am Olarn Chaipravat, former deputy prime minister during Thaksin Shinawatra regime which was ousted by a military coup on Sept 19 2006,and Martial law was imposed by the Council for Democratic Reform, now called the Council for National Security . After the Sept 19 coup, i would have called you on phone , but because the new government is taping the past goverment officials phone numbers, so it is no longer safe for me to call you, that is why i think it is safe to send you this mail. we are placed under surveillance.
However my main point of contacting you is to seek your sincere suggestion and guideline to invest in your country. And please because of my previous position in the government, i do not need to tell you of the absolute confidentiality which we both must have to observe, if we are to go into investment, or rather if you are to help me in investing in your country.
I desided to contact you now that I am very sure that all eyes are not on us as it was when the problem first began though we are still going to court but the environment is good now to handle the transaction very safely.
From the news publications attached here in respect of the goverment probes into much of the projects my ministry executed will make you to understand my position with the govenment now.
I thank you very much for taking time to go through my mail, and hope to read from your reply soon, .Thanks for your anticipated co-operation and my
regards to your family.
Good luck,and feel free to contact me on my email for now, until arrangements are made.
Please reply me for further details to (email removed by this geek)
I attach herewith my international passport. (picture after the break)
This is interesting. First of all, to have boot camps sprout out all over China for “internet addicts”. I’ve seen TV reports of these addicts given jabs daily but nobody knows what is contained in the jabs. And now this mutiny. Makes me wonder if these boot camps will ever open in countries like Singapore and Korea?
Search engine results poisoned with links to fake antivirus software have been a constant problem for Internet users. However, it is an effective way for cyber attackers to infect users’ machines. Google recently presented a research paper regarding websites that offer fake antivirus software and part of Google’s research shows that search engine results can lead to such pages. The presentation demonstrates that Google is working hard at preventing these search poisoning attempts.
According to Symantec’s Report on Rogue Security Software, the culprits of these “toxic” search results are typically scam perpetrators who use