Skip to main content


Showing posts from November 20, 2014

Our global Cyber Awareness System focuses now on a family of malware targeting both Mac OS and iOS systems.

Each day comes with and reveals its batch of threats, techniques, vulnerabilities and tools when it comes to computing security. 
Now,, soon #Retinknow talks about a new research paper, published by PaloAltonetworks on what they call ‘’WireLurker’’, a family of malware targeting both Mac OS and iOS systems for the past six months. 
According to this report, WireLurker can monitor any iOS device connected via USB with an infected OS X computer and installs downloaded third-party applications or automatically generated malicious applications onto the device, regardless of whether it is jailbroken. 
We can also learn that, WireLurker can exhibit complex code structure, multiple component versions, file hiding, code obfuscation and customized encryption to thwart anti-reversing. 
Therefore,, soon #Retinknow encourages Enterprises to: ·assure their mobile device traffic is routed through a threat prevention system, Employ an antivirus or security protection…

New possibilities for smart cities.

With the proliferation and maturation of the emerging technologies such as smart sensors, social media, cloud computing, big data/Analytics, smartdevices and more, government organizations and cities have unmatched new possibilities to improve living conditions, public security, public transport and appropriate the sustainable development. 
Henceforth, the data-driven approach to municipal services management, helps cities operate more efficiently, provide better service to citizens and ensure effective management of resources.
New solutions that inter alia integrate intuitive, flexible, scalable and powerful digital technologies into urban services to improve the efficiency of municipal systems are recommended.

Intelligent security portfolio in our data-driven world.

Threats and attacks are more and more various, sophisticated and come from anywhere.
This means that we need, first, the real-time ability to master the greatest risks to enterprise data. Secondly develop Deep Learning technologies by fostering the culture of collaboration and permanent trainings. At the end you can protect people, data and applications in an environment where advanced persistent threats, zero day attacks, breaches and the accompanying financial impact on an organization continue to rise.

A new data privacy engine in our data-driven world.

If with the Internet (global network), we talk about globalization, right to knowledge and openness anywhere and anytime, it is also obvious that, we observe a growing number of regulations that may vary from country to country.
In this context, global companies and organizations need a new data privacy engine that can help them protect inter alia their personal data as it is transferred between countries.
They need a data privacy engine that helps them manage and remain in accordance with organizational policies and local laws.
As, increasingly, governments are establishing rules that regulate how data may be transmitted from one country to another; a data privacy engine should aggregate international and organizational requirements for data transfers and apply them to individual projects. 
This means inter alia that, organizations with convenience, can see what restrictions, and issues have been put in place for different types of protected information when transferring it between two c…

Security Update for Chrome 39.0.2171.65 for Windows, Mac and Linux and Security Bulletin for Windows Kerberos Vulnerability.

As part of our global Cyber Awareness System,, soon #Retinknow recalls that, Google has released Chrome 39.0.2171.65 for Windows, Mac and Linux. This update addresses multiple vulnerabilities, one of which could cause a denial of service condition. Users and administrators are encouraged to review the Google Chrome blog and apply the necessary updates.
When it comes to Microsoft, they have released security updates to address a remote elevation of privilege vulnerability which exists in implementations of Kerberos KDC in Microsoft Windows. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review Microsoft Security Bulletin MS14-068 , Vulnerability Note VU#213119, and Alert TA14-323A for additional details, and apply the necessary updates.