Author Archives: cbox
AT Launches New Security Tools
June 15, 2005 Over the years the Internet has turned into a breeding ground for malicious security threats, unsolicited email, and inappropriate content.
Backed by its global network of 26 Internet data centers, AT service provides protection from malicious and unwanted attacks that either enter or leave the customer corporate network.
of our Internet data centers reside on AT core IP background, says Quintana, we able to provide the necessary resilient communication infrastructure that most customers require. says AT secure email gateway service reduces the load on customers mail servers, while improving bandwidth utilization and providing centrally controlled network managers that ease the flow of incoming and outgoing email.
As with all of AT services, the email gateway solution is offered as a stand alone service or as an option for customers of the AT network based firewall service. This allows customers a flexibility not normally associated with security services.
In its goal to offer Internet security focused managed services, AT incorporates a variety of security services not normally offered in a one stop solution.
network based security platforms incorporate our knowledge based predictive and mining capabilities built into our core IP backbone, allowing us to predict worms and viruses and the precursors to worms and viruses, says Quintana. The services include AT Network Based Firewall Service, AT Enhanced Managed Intrusion Detection Service and AT Application Firewall Service. Read More
Catching Them Is Usually Not This Easy
Those statistics are of little comfort to people who wind up bearing the financial burden. McCambridge reports that the thieves used her social security number to rack up thousands of dollars in charges. But through an amazing coincidence McCambridge was able to turn the tables. Penny was standing behind the counter when a customer approached requesting to open a department store account. When the person presented McCambridge with the necessary information needless to say she was shocked.
The "customer" gave Cambridge’s name as well as phony identification. "I was a little panicked. I was a little shaky," said the 23 year old college student. But she managed to pull herself together slip away from the counter and alert store security.
By doing so, McCambridge started a whole of chain of events that led not only to the arrest of the suspect but the dismantling of an identity theft ring.
The circumstances are to say the least extraordinary. As Joseph Velling, a special agent for the Social Security Administration explains "Identity theft crimes are some of the most difficult criminal cases to investigate. It is not that law enforcement does not know what crime was committed. Rather, it is a simpler question who did it?"
This may explain why the majority of identity theft cases remain unsolved. If that was not bad enough, factor in that an overwhelming number of identity crimes never get reported. Is it any wonder that for nearly a decade identity theft has topped the list as the number one consumer complaint?
No it will probably never be this easy. If you are the victim of identity theft the chances that the thief will show up at your place of business and present their (your) information is not very likely. But even if you are not that fortunate, what happened to Michelle McCambridge should serve as an example about the importance of fighting back.
5 Things You Must Bring to Your Tax Preparer’s Office
The American taxpayer has plenty of options for filing income tax returns. If you have a relatively simple tax situation you make a modest income, work for someone else, and don’t own a home or manage a lot of investments then online tax preparation Web sites are a safe bet. The services are inexpensive, quick and guaranteed to produce an accurate tax return. In addition to popular Web based services like Turbotax, most of the brick and mortar tax preparation companies now offer their own online preparation services, too.
But not all tax situations are created equal. What if you’re self employed, manage some rental property, operate a farm or small business, or earn a lot of income from investments? In situations like these, you need a tax expert who can help you maximize your deductions and lower your overall tax burden. Your best bet is to hire an accountant or make an appointment at a local tax preparer’s office. These folks know the tax code inside and out and can help you claim all of the deductions, exemptions and credits you deserve.
To guarantee a successful trip to the tax preparer’s office, you need to do some preparation yourself. The following is a list of the five major areas you need to consider when gathering W2s, receipts and invoices to bring to the tax preparer’s office. Let’s start with one of the basics: identification.
Five Things to Know About The Transition From Homeschool to University
Graduating from homeschool to university is an exciting time and also a little intimidating. Here’s the good news: plenty of homeschooled students have made the transition, and we know many times over that these students are more than up to the challenges of college.
Below are five things you should know about the transition from homeschool to university. Keeping these tips in mind can ease your mind and help you appreciate everything you’ve accomplished and all that’s ahead of you.
1. Get Oriented Chose a university with a variety of orientation events and training seminars for incoming students. From social events for freshmen to afternoon presentations on how to use the campus library system, such offerings are of value to all students, but of special value to homeschooled students, who may have less experience dealing with an institution.
2. Find Your College Family Before college, homeschooled students enjoy a level of parental support and affirmation that traditional students don’t often experience. So when homeschoolers leave the house and head to the university, building a new support network is critical.
The sooner homeschooled students make friends at college, the sooner they’ll feel at ease in their new home. New students should look for a local church with a strong university fellowship, or join a campusChristian group. Or maybe they can find a good crew of friends in the dorm who enjoy eating dinner together every night. A strong feeling of fellowship makes all the difference.
But remember this: according to a study by Mary Beth Bolle, Roger D. Wessel, and Thalia M. Mulvihill published in the Journal of College Student Development, the more often homeschoolers call their families during the first year, the faster they will make new friends. So neither parents nor students should worry that severing the bond is the only way that a new college student can meet new people. Rather, the feelings of love and support give way to an appealing confidence in a young college student.
3. Trust Your Skills Homeschooling teaches students how to budget their time and learn at their own pace. Also, homeschooled students tend to study in more personal, individualized ways than their private and public school peers.
So when homeschooled students arrive at the university, they should trust the skills they developed while learning at home. Because in college, success depends on time management, self pacing, and study skills. Far from being less prepared for life away from mom and dad’s supervision, homeschoolers know how to work on their own. The skills learned in homeschooling are the very skills needed as a college student.
4. Get to Know Your Professors One of the greatest challenges for the homeschooled graduate entering college is adjusting from the expectations of the parent or primary teacher to the expectations of professors.
During the first week of class, new students should visit all of their instructors during office hours. Ask professors about their expectations, what they look for on tests and in papers, how much they imagine students should study each week. Before the first assignment is due, ask to see a sample of a successful paper or project to see firsthand what they think is exemplary work.
5. Remember, It’s the Same but Different The homeschooled student doesn’t make a transition all that different from the public or private school student. Both adjust to life away from home. Both discover how to responsibly manage their new freedom. Both learn to navigate the services and procedures of campus. And both must discern how to meet new expectations. When you arrive at your new school, look around at your classmates. Take peace in knowing they’re experiencing the same feelings of excitement and intimidation you are.
FireHost Report Shows Cybercriminals Are Using the Cloud to Deploy Attacks
Cloud hosting provider FireHost announced on Tuesday it has published its Q2 2013 Web application attack statistics, which form part of FireHost quarterly Superfecta report.
These statistics track the prevalence of four different kinds of cyberattacks that are believed to cause the most serious threats to businesses, comprising CSRF, XSS, SQL Injection and Directory Traversal.
The report comes the same week of a report by the NASA Office of Inspector General which shows that NASA has overlooked critical security measures and procedures in its implementation of public cloud.
Detailing almost 24 million cyberattacks, FireHost has seen a large percentage rise in the number of common web attacks such as SQL Injection and Cross Site Request Forgery.
FireHost attributes the increase to ease of automation, which lets hackers combine these techniques to quickly steal data, install malware on servers, assimilate new botnet zombies or take down a site.
Subscribe to WHIR Newsletters Get Our Exclusive Report on "The Hosting Infrastructure Ecosystem".
Compared with Q1 2013, the volume of Cross Site Request Forgery attacks increased by 16 percent while SQL Injection attacks, which have increased in each of the last five quarters, saw another 28 percent hike in Q2 2013.
Cross site Scripting continues to be the most prevalent attack type with more than 1.2 million attacks being blocked this quarter.
The small percentage increase in this type of attack suggests that XSS, when used in combination with other exploits, enables cybercriminals to gain access to more complex, higher reward attack vectors.
Perhaps more disconcerting is that these blended, automated attacks are being used increasingly from within cloud service provider networks.
can easily deploy and administer powerful botnets that run on cloud infrastructure, said FireHost founder and CEO Chris Drake. many cloud providers don adequately validate new customer sign ups so opening accounts with fake information is quite easy. Once the account is created, application programming interfaces can be leveraged to deploy a lot of computing power on fast networks, giving a person the ability to create substantial havoc with minimal effort. the start of 2013, FireHost customers have been protected by an IP Reputation Management system, and in the second quarter of 2013, the IPRM system filtered about 10 million instances of illegitimate traffic.
About 1.3 million unique attackers have been blocked to date in 2013, which averages out to 138,000 attacks per day.
FireHost blocked a total number of 23,926,025 attack types in Q2 2013, which includes low level attacks that are automatically blocked by FireHost IP Reputation Management filters.
Meanwhile, Superfecta attacks increased by six percent during the quarter with a total number of 3,643,620 blocked in Q2 2013 an increase from 3,410,212 in Q1 2013.
SQL Injections represent 18 percent of all Superfecta attacks, and CSRF attacks represent 26 percent of the Superfecta total. Both of these attacks have grown in volume since Q1 2013.
Last month, FireHost raised a $12 million Series D funding round led by investment partner The Stephens Group to extend FireHost’s secure cloud solutions.
A FireHost report published earlier this year reported that over 64 million malicious cyberattacks were blocked by its servers in the US and Europe in 2012, and that cross site scripting attacks were the most prevalent attack type in 2012.
CrownPeak Expands Solution Offerings
CrownPeak says Web Site Management 2.0 is an easy and cost effective way to use CrownPeak content management system to publish multiple forms of content from a single source. The company says its CMS enables non technical users to make changes to an existing Web site with little or no training. Delivered as a software service, CrownPeak CMS is built to enable integration with other SaaS products or content feeds such as PRNewswire, Reuters or any XML syndicated feed.
Customers can deploy CrownPeak Web Site Management 2.0 capabilities across any of their Web properties from a single interface to manage their overall site in a more effective way. CrownPeak adds that this also provides end users with more ways to digest content, like blogs, RSS feeds, audio and video podcasts and social networking.
is dedicated to helping our customers succeed in leveraging new capabilities for digital marketing, says Jim Howard, CEO of CrownPeak. it integrating Web 2.0 features, or mashing up software as a service capabilities such as content management, email campaign management and Web analytics, we help customers manage their Web sites in a more effective way.
Corio Supports Naval Surface Warfare Center
January 14, 2003 Enterprise application service provider Corio Inc. (PMC) to supply applications management and infrastructure for the development of future systems at the Crane Division of the US Navy Naval Surface Warfare Center (NSWC Crane).
Corio says it is responsible for quickly setting up application environments and infrastructure enabling Crane to meet systems deployment timelines. The company On Demand solution provides secure and rapid deployment of infrastructure and applications management.
The NSWC Crand division of the US Navy, says Corio, is an important addition to the company growing list of Federal Government customers. The company was awarded a GSA Schedule in November, enabling it to pursue prime contractor positions in future US Government bids. Other federal Corio clients include the US Department of Treasury and the US Coast Guard.
CloudSigma Offers Black Lotus DDoS Mitigation to Cloud Hosting Customers
According to a report from the SANS Institute (PDF), nearly 40 percent of enterprises are unprepared for DDoS attacks, which flood a target website or service with phoney server requests, making it difficult for legitimate users to get through. Attacks can be waged by corporate competitors or ideological groups to disrupt or censor specific servers. Attacks whether short or prolonged can have a detrimental impact on organizations and result in lost revenue for businesses.Black Lotus provides hands on protection to manage attacks and it can be customized to suit specific environments, as opposed to one size fits all, automated DDoS mitigation offerings."Our partnership with Black Lotus enhances our existing core infrastructure DDoS protection with a more user focused, customizable service," CloudSigma CEO Robert Jenkins said in a statement. "It will also complement our firewall policies for greater security in general, giving our customers a more seamless, protected experience in our cloud."According to research from Incapsula presented at a WHIR webinar next week, DDoS attacks are on the rise with 240 percent growth from 2013 to 2014, and are growing in size with over a third of all attacks exceeding 20 Gbps.Sony and tech news website The Register have been among the recent online properties to fall victim to DDoS attacks. Notable DDoS attacks have also targeted web hosting providers including Linode, New Zealand ISP Spark, and Australian ISP Cirrus Communications.Subscribe to WHIR Newsletters Get Our Exclusive Report on "The Hosting Infrastructure Ecosystem".Partnerships between a hosting provider and a third party security provider, like in the case of CloudSigma and Black Lotus, are not uncommon. For instance, SingleHop recently launched its Enterprise On Demand Technology Partner Program which allows its enterprise customers to use Alert Logic and Radware security as part of their SingleHop hosting.by David Hamilton on Friday, January 31 2014The Distributed Denial of Service landscape is significantly changing, according to the January threat report (PDF) from DDoS mitigation provider Black Lotus. Some of the key trends reported include: "Distributed reflection Denial of Service" (or DrDoS) enabling massive attacks exceeding 100 gigabits per second; attacks targeting infrastructure rather than applications directly; and DDoS attacks from mobile devices (or mDDoS) now reaching significant levels. Read More
Colocation Firm VegasNAP Partners with WORLDLINK
VegasNAP says that this partnership will enable both companies to protection and peace of mind by having the option of redundant data and business continuity centers in Las Vegas, NA and Seattle, WA, two major US metropolitan locations.According to the press release, the companies will jointly support clients and protect mission critical equipment in both data centers with access to VegasNAP end user recovery solutions, including colocation and warm sites voice and data connectivity.it natural disasters such as earthquakes, floods, blackouts or even manmade events, clients of both our companies can now take advantage of our colocation, recovery and business continuity solutions, Rob Tyree, VegasNAP chief technical officer said in a statement. companies clients now have colocation centers available in diverse locations. Our customers and prospects can develop localized and regional disaster recovery strategies that make sense. companies claim both facilities are 2N+1 or N+1 redundant, with uninterruptible power supplies, 24/7 access and security monitoring and fire suppression systems.
Data Storage Corporation Names Director of Sales Engineering
Cloud storage provider Data Storage Corporation announced on Monday it has named Guy Sanfilippo its director of sales engineering.
In this new role, Sanfilippo is responsible for communicating technology and product positioning to both business and technical users, as well as providing design and budgetary pricing for the company solutions.
With more than 35 years of experience in the IT industry, Sanfilippo has held many senior technology positions where he has helped organizations manage growth through the adoption of emerging technologies.
Most recently, he was the director of IT for the American Federation of Musicians and Employers Pension Fund, where he managed the development and implementation of a new imaging workflow solution and computerized benefits calculator.
As CTO of Legal Information Technology, Sanfilippo managed the development of the company commercial workflow and imaging products.
Subscribe to WHIR Newsletters Get Our Exclusive Report on "The Hosting Infrastructure Ecosystem".
He also served as the CTO at The United Ways of Tri State where he participated in a major shift in the organization marketing strategy by developing digital solicitation solutions. Earlier in his career, Guy held different sales and technology positions with IBM, Burroughs, and Covenant House.
believe that adding a director of sales engineering position to our management team is essential for ensuring clients and prospects understand not only the technology behind our hosted cloud services, but its costs and business benefits as well, said Chuck Piluso, chairman and CEO at Data Storage Corporation. technical background and his business acumen will prove extremely valuable as a critical resource for customers as well as the field sales force where he will help our team to continue moving the company forward. has also served on the boards of the United Ways of Tri State and the American Federation of Musicians and Employers Pension Fund.
Talk Back: Are you currently offering a cloud storage service? Are you seeing a demand from customers for a cloud storage solution? Let us know in the comments section.