Hybrid Containment of Detection of Proximity Malware in Delay Tolerant Network

With the universal presence of short-range connectivity technologies (e.g., Bluetooth and more recently, Wi-Fi direct) in the consumer electronics market, the Delay Tolerant-Network (DTN) model is becoming a viable alternative to the traditional infrastructural model. Proximity malware, which exploits the temporal dimension and distributed nature of DTNs in self-propagation, poses threats to users of new technologies. In this paper, the authors address the proximity malware detection and containment problem with explicit consideration for the unique characteristics of DTNs.

Spotlight

MetaCert

MetaCert protects companies of all sizes from phishing attacks when using mobile email and messaging app. Whether it's a mobile app or an loT device, if it communicates over http, the MetaCert Security API can add a thin but very powerful layer of security to help protect consumers from malicious attacks over the Internet. MetaCert's patent-pending Security API checks the reputation of http requests in real time, warning consumers of potential threats before allowing known malicious web pages (or other resources) from loading inside the app. MetaCert also offers a content-based filtering service for developers that want to block pornography inside their apps.

OTHER WHITEPAPERS
news image

Multiverse Security: Easy, Built-in, Comprehensive and Continuous

whitePaper | December 12, 2022

In the evolution of Internet-based technologies, Web 2.0 introduced popular decentralized services that accelerated interactivity between websites and users. Looking to capitalize on this innovation, businesses rushed to launch applications to the market. However, both the Web 2.0 architecture and dependent businesses failed to incorporate key security principles into the design and implementation of these services, resulting in critical vulnerabilities.

Read More
news image

How to Build and Mature Your AppSec Program

whitePaper | January 24, 2023

Achieving an optimal security posture for your business happens when technology, automation, infrastructure, architecture, and security policies are in alignment across the company. This white paper provides concrete strategies to mature your AppSec program and achieve code security at scale based on your organization’s needs.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More

Spotlight

MetaCert

MetaCert protects companies of all sizes from phishing attacks when using mobile email and messaging app. Whether it's a mobile app or an loT device, if it communicates over http, the MetaCert Security API can add a thin but very powerful layer of security to help protect consumers from malicious attacks over the Internet. MetaCert's patent-pending Security API checks the reputation of http requests in real time, warning consumers of potential threats before allowing known malicious web pages (or other resources) from loading inside the app. MetaCert also offers a content-based filtering service for developers that want to block pornography inside their apps.

Events