Reading Time: 4 minutes
According to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of thirteen hours a week on the Web. That’s just a few minutes shy of two full hours every day! (There are countries in Europe and Asia that yield similar statistics.)
And with so many people spending so much time interacting within this medium, it should come as no surprise that it’s given petty plunderers and long-con thieves alike boundless opportunities.
We call them hackers, spear phishers, ID thieves and botnet engineers. They launch more than 50,000 new viruses, worms and Trojans a day. Plus spyware, phishing sites and phony anti virus scan scams. Their ranks are larger than any country’s army. They’re more conniving than any underworld crime boss. They steal millions of dollars from us every year. And yet, over the past decade and a half, less than one percent of them have been caught, convicted and incarcerated.
Worst of all, anybody can become one of their victims the second they click on their desktop’s Web browser to go online. And almost every one of the Internet’s most popular browsers lack the security technology to stop them!
The proof? In late January and early February of 2009, Roger Grimes, senior editor and investigative reporter for InfoWorld, presented his readers with reports on each of the best known browsers. Subsequently, his findings were also picked up by PC World. Below, you will find key excerpts from his reports. These are startling observations. On each browser. Including Chrome.
INTERNET EXPLORER, January 29, 2009: “Internet Explorer… is still the market leader. (Its) dominance and complexity have made it the browser to attack…(So) Internet Explorer has had at least 70 announced vulnerabilities.”
FIREFOX, January 28, 2009: “(This) popular Web browser is long on user-friendly features and third-party extensions, and short on granular security controls.”
SAFARI, February 1, 2009: “Safari…has many security weaknesses. (For instance) the Safari installer also installs a service called Bonjour… Bonjour is used to automatically configure printers, hunt for file sharing opportunities and find instant messaging peers… Most security experts are wary of auto-discovery programs like Bonjour… Bonjour itself has been involved in at least three known exploits.”
OPERA, January 28, 2009: “Opera’s unfortunate lack of support for DEP and ASLR make the Opera process the weakest protected of any of the browsers I’ve tested… This weakness is exacerbated by 45 announced vulnerabilities.”
In an age in which cybercrime is proliferating, Grimes’ revelations are both timely and crucial. Because they point to one of the Internet’s central “Red-Alert Realities.” Staying out of the clutches of the thieves, con artists and contraband ID traffickers on the Web requires security precautions. And those precautions must take affect the moment you log on. Unfortunately, according to Grimes, not a single one of the Internet’s most popular browsers provide you with the impenetrable security you need.
Comodo agrees. That’s why Comodo R&D, the inventors of so much of the Internet Security industry’s most unbreachable software, took Chrome – the world’s fastest and most stable browser – and retooled it to include the one thing it lacks. Impenetrable security. The result? Comodo Dragon. A Chromium technology-based browser that offers you all of Chrome’s features PLUS the unparalleled level of security and privacy you get only from Comodo.
What makes Comodo Dragon the best browser available today? It’s this simple. Chromium technology was engineered to offer Web users an Internet browser that surpassed Internet Explorer, Firefox, Safari and Opera. Especially when it comes to functional speed, stability and convenience. But Comodo Dragon surpasses Chrome by providing superior security features, too. And Comodo Dragon will run on all Microsoft Windows 7, Vista and XP computers.
But that’s not all. Comodo Dragon also comes with privacy enhancements that surpass Google’s Chrome. It features domain validation technology that alerts you to questionable Web sites. And it stops cookies, other Web spies and browser download tracking cold.
But fair is fair. The Internet’s best known browsers aren’t the only ones reporters have reviewed. Comodo Dragon has been critiqued by PC World, as well. In his April 2010 report, here’s what technology reporter Steve Horton had to say.
COMODO DRAGON, April 13, 2010: “What separates Comodo Dragon from the other Chromium browsers is the added level of security…Comodo Dragon boasts what’s called Incognito Mode, which allows you to surf with all cookies turned off, no download tracking, and no other trace of your existence…Comodo Dragon’s user interface is minimalist, leaving a lot of room for the screen. And it renders pages very quickly…If you want more security than the standard level, check out the free Comodo Dragon.”
Which brings me to the Dragon’s most inviting feature of all. It’s FREE.
So the question you must ask yourself is this. Why would you choose a browser that might cost you your identity, privacy, or bank balance when you can choose one modeled after Chrome, with better security — and no cost at all?
Comodo. Science Not Hype.
– Glenn Scheuer
To learn more, simply visit Comodo.com/home/browsers-toolbars/browser.php.
Airgain unveils extended portfolio of 5G OMNIMAX Dipole series antennas for M2M and IoT apps
Airgain announced the release of its OMNIMAX Next Dipole antennas, the latest addition to Airgain’s 5G product portfolio designed to deliver ultra-wideband connectivity for 5G NR sub-6GHz IoT and M2M applications.
The OMNIMAX Next Dipole series includes 5G NR sub-6GHz products for low profile and shock resistant outdoor applications, including “salt shaker” style antennas, indoor dipole “paddle” antennas, and outdoor “candlestick” dipole antennas.
Each product is designed to blend into the environment, with flexible mounting options while providing ultra-wideband connectivity for virtually any indoor or outdoor cellular module, modem, or gateway. The 5G ready OMNIMAX Next Dipole series provides future-proof performance, with backward compatibility from 5G to 4G and 3G global frequency bands.
“Supporting sub-6GHz 5G, particularly the lower bands approaching 600MHz, is challenging for the form factors of these products,” said Kevin Thill, Airgain’s Senior Vice President of Engineering.
“These antennas achieve excellent broadband performance without compromising the form factor, while outperforming competing solutions that we have seen in the market today. These antennas feature a unique and patent pending Coplanar Waveguide feed, which is key to enabling the ultra-wideband performance in the given form factors.
“We are excited to offer the expansion of our product portfolio of 5G ready antennas designed to accommodate wider bandwidth requirements demanded by 5G. The OMNIMAX Next Dipole series provides a cost-effective solution while delivering dependable quality.”
Building on Airgain’s antenna design expertise of CENTURION Next, the industry’s first 9-in-1 5G and Wi-Fi 6 fleet antenna, the OMNIMAX Next Dipole series includes 617 MHz to 6 GHz wideband cellular 5G support. OMNIMAX Indoor Dipole Next, OMNIMAX Outdoor Dipole Next, and M2M SN Next are available through our trusted channel partners or direct at 1-855-AIRGAIN.
You Are The Weakest Link
Tom Finan on human imperfection and cyber security culture
A craftsman never blames their tools. It is not the systems that ultimately fail cyber security professionals- it’s the people. Insider threats do abound but more often than malfeasance, misfeasance is the key to a breach. It wasn’t the firewall that failed Capitol One, it was a misconfiguration. Tom Finan dives in on culure vs. strategy quoting both Peter Drucker and…Barbara Streisand.
Covid 19 has changed 2020 in unprecedented ways in how we work, live our lives, and measure Cyber Risk. Listen to Episode #141 of Task Force 7 Radio as the Cyber Growth Leader from Willis Towers Watson, Tom Finan and Co-Host Andy Bonillo dive into how the “Cyber Security Superheroes” are working together to manage the human element during the pandemic. As claims data shows, effective Cyber Risk prevention and mitigation is largely a people problem. In response, companies need to assess and analyze the elements of their cultures that shape both positive and negative cyber attitudes and behaviors that makes the human element one of the largest risks to a company.
Axio360 platform to provide holistic view and identify financial impact of risk for Archer’s clients
Axio announced a strategic partnership with cybersecurity consulting firm Archer. This partnership will merge Archer’s expertise in critical infrastructure protection with the Axio360 platform and allow clients to measure cyber risk exposure in financial terms and manage their cybersecurity program from a holistic point of view.
The Axio360 platform will assist Archer’s clients in identifying cyber risks across business units and threat vectors that may not have previously been considered. The platform estimates all-in costs of exposure and evaluates how specific controls and mitigations will reduce risk.
“The Axio platform was built to fundamentally redefine how organizations solve cybersecurity problems. Our intention is to enable business-centric decision-making by putting the risk in financial terms,” said Brendan T. Fitzpatrick, Senior Vice President of Channels & Partnerships for Axio.
“Our operating system aligns all key constituents and delivers clarity in real-time. This partnership with Archer allows our software to make critical infrastructure safer and more secure.”
“This partnership allows our asset owners to receive tailored recommendations from Axio and our dedicated team. For the first time, our clients will be able to measure their cybersecurity program and benchmark it across their industry peers,” stated Patrick C. Miller, Managing Partner for Archer.
“This collaboration will help the overall assessment and understanding of cybersecurity risk for critical infrastructure.”
Axio360’s methodology and software empowers organizations to continuously answer the four most critical questions for cyber risk:
- What’s my exposure in financial terms?
- How should I manage my cyber program?
- Do I have the financial ability to recover?
- Where should I invest?
Automotive1 week ago
Variables Complicate Safety-Critical Device Verification
Business Insider5 days ago
A 17-year-old entrepreneur made nearly $500,000 reselling sneakers during a quarantine. Here’s a look inside his pandemic-proof business model.
Gaming6 days ago
Fortnite Floating Rings Locations: Where To Collect Rings At Lazy Lake
Blockchain1 week ago
Bitcoin Solves This: $2.8 Billion Worth of Gold Counterfeited by Chinese Company from Wuhan
Blockchain1 week ago
ABA Global Signed Strategic Partnership with GCOX
AI1 week ago
This Tiny House Is 3D Printed, Floats, and Will Last Over 100 Years
Gaming1 week ago
Rat King – The Last of Us Part 2
Gaming1 week ago
Nier Creator’s New Game SinoAlice Is Out Now