Mon, Jan 11, 2016
Google Chrome is now the most popular web browser in the world, with an estimated 45% of all website views. Google claims that security is a top priority, which is why they push frequent automatic updates and use a sandbox. But an even higher priority for Google is speed.
Sometimes they need to make the choice between speed and security, and this article lists two cases where they chose a minimal speed improvement at the expense of introducing a much larger security risk.
Mon, Apr 6, 2015
We recently added a new feature to Light Point Web that warrants some extra recognition. We have added a server-side integration with OPSWAT’s Metascan Online service to provide yet another best-in-class layer of security for our users.
Metascan Online is a cloud service that can scan files with over 40 anti-virus engines, and do so in a matter of seconds. With our integration with Metascan Online, our users will get an extra level of assurance that every file they download is safe without having to wait around for the results. This all happens seamlessly to the user, so no extra work is required by the user to get this additional layer of protection.
Mon, May 5, 2014
Are your employees creating a security risk in your company? Did you know that employees were the second highest cause for data breaches, after criminal attacks? Here are some common ways well-meaning employees can cause data breaches.
Fri, May 2, 2014
Ryan McDonald, the Digital Producer for the Baltimore Business Journal, recently interviewed me for the publication’s latest cybersecurity story, “As cyber attacks multiply, so do insurance policies that cover damages,” where he discusses the pros and cons of purchasing cybersecurity insurance and how to go about it. I thought it was worth sharing here on our blog in case any of you missed it. Below is an excerpt from the story.
In the wake of high-profile security breaches that have affected major companies and universities, a growing number of firms are pushing a relatively new product for businesses: cyber security insurance.
Wed, Nov 30, 2011
Today, I’m going to walk you through the process of being able to browse the web in complete safety. The title of this post explicitly mentions “viruses”, but I’m using this as a more well-known moniker for the term “malware”. Malware is a more generic term which encompasses viruses, spyware, trojans, etc.
What I mean by “complete safety”, is that you do not have to worry about malware infecting your computer. It does not mean you are safe from being tricked into giving your banking passwords to a site that is only pretending to be your bank.
Mon, Nov 21, 2011
Does Light Point Security track our users’ browsing? I get this question a lot, so I’d like to clarify this in a blog post. We absolutely do not track our users’ activities online. In fact, that goes totally against what we stand for – to protect you while on the web.
Wed, Oct 5, 2011
October is National Cyber Security Awareness Month. Through a series of events across the country, National Cyber Security Awareness Month engages public and private sector partners to raise awareness and educate the public about cybersecurity.
Mon, Sep 19, 2011
Light Point Security has just released Light Point Web 1.1. While this version contains updates to our open source code, and small usability related bug fixes, the main improvement is flash video playback.
Sun, Jul 31, 2011
There are usually a lot of events scheduled the week of the Black Hat conference. I’ll be attending some of these events, and I encourage you to attend some as well. This is a list of after parties and Black Hat sponsored special events that will keep you busy all week.
Mon, Jul 18, 2011
I have come to realize recently that almost all computer security products (including antivirus) are what I call “filter-based”. The problem though is that when (not if) the filter is wrong, the user’s security is compromised.
A filter-based security product is any security product which roots its security in the premise that it can filter all the bad things that might happen away from the non-bad things. So for anything that a user tries to do, the security product first attempts to decide if that thing is bad. If it’s bad, the product will stop that thing from happening. Thus, the effectiveness of the product is totally dependent on the accuracy of the filter.