Reading Time: 2 minutes
Symantec’s Norton Internet Security Software.
You can see their big-bucks commercials on your TV almost any night of the week. And find their full page ads in popular magazines everywhere. They’re all over the radio, Internet and trade show circuit. Making big claims, and even bigger promises.
No question about it. For years, Norton has spent millions on its marketing. Hyping the superiority of its Internet Security products loudly, lavishly and relentlessly.
All while failing to develop — it is now clear — the kind of cutting edge technology their ads claimed they had!
This is a cautionary tale about what happens when Hype prevails over Science.
On Tuesday, January 17, 2012, Symantec, the parent company of Norton, reluctantly announced that hackers had succeeded in stealing the software source code – or blueprint – for Norton Internet Security, Norton antivirus Corporate Edition, Norton GoBack, Norton Utilities and pcAnywhere.
This earthquake of an announcement bears repeating: The biggest name and world’s most aggressively promoted Internet Security products admitted that its own computers were infiltrated by the very hackers they’ve told us all their top-notch technology stops cold!
And when did this theft occur? In 2006. Six years ago!
By Tuesday afternoon, Reuters Science and Technology Editor Jim Finkle had reported that, “Companies typically heavily guard their source code, which is considered the crown jewel of most software makers. The reason for all the secrecy is that companies fear rivals could use the code to figure out the secret sauce behind their technology, and that hackers could use it to plan attacks.”
Let’s consider the ramifications.
FIRST: If you are one of the millions of PC users who bought into the superiority of the Norton brand, you now know that your computer has actually been a poacher’s paradise for hackers for up to six years!
SECOND: If it took six years for Symantec and Norton to discover this breach, that reflects very badly on the quality of their Internet Security products. Yet, if Symantec and Norton have known about the breach for months, a year, or all six years, it reflects very badly on the integrity of those companies, their product claims, and their products’ quality.
Either way, consumers have every right to be appalled!
But THIRD, and most important of all: If hackers know how to infiltrate computers that use Norton Internet Security software, they will CONTINUE to know how to reign down havoc on your PC, your identity, your credit cards, your bank accounts and your life. UNTIL Norton announces the technological advances necessary to save their customers from on-going devastation!
In fact, we’ll do better than that. Give us a call Norton, and we’ll be glad to help!
Comodo. Science Not Hype.
– Glenn Scheuer
Airgain unveils extended portfolio of 5G OMNIMAX Dipole series antennas for M2M and IoT apps
Airgain announced the release of its OMNIMAX Next Dipole antennas, the latest addition to Airgain’s 5G product portfolio designed to deliver ultra-wideband connectivity for 5G NR sub-6GHz IoT and M2M applications.
The OMNIMAX Next Dipole series includes 5G NR sub-6GHz products for low profile and shock resistant outdoor applications, including “salt shaker” style antennas, indoor dipole “paddle” antennas, and outdoor “candlestick” dipole antennas.
Each product is designed to blend into the environment, with flexible mounting options while providing ultra-wideband connectivity for virtually any indoor or outdoor cellular module, modem, or gateway. The 5G ready OMNIMAX Next Dipole series provides future-proof performance, with backward compatibility from 5G to 4G and 3G global frequency bands.
“Supporting sub-6GHz 5G, particularly the lower bands approaching 600MHz, is challenging for the form factors of these products,” said Kevin Thill, Airgain’s Senior Vice President of Engineering.
“These antennas achieve excellent broadband performance without compromising the form factor, while outperforming competing solutions that we have seen in the market today. These antennas feature a unique and patent pending Coplanar Waveguide feed, which is key to enabling the ultra-wideband performance in the given form factors.
“We are excited to offer the expansion of our product portfolio of 5G ready antennas designed to accommodate wider bandwidth requirements demanded by 5G. The OMNIMAX Next Dipole series provides a cost-effective solution while delivering dependable quality.”
Building on Airgain’s antenna design expertise of CENTURION Next, the industry’s first 9-in-1 5G and Wi-Fi 6 fleet antenna, the OMNIMAX Next Dipole series includes 617 MHz to 6 GHz wideband cellular 5G support. OMNIMAX Indoor Dipole Next, OMNIMAX Outdoor Dipole Next, and M2M SN Next are available through our trusted channel partners or direct at 1-855-AIRGAIN.
You Are The Weakest Link
Tom Finan on human imperfection and cyber security culture
A craftsman never blames their tools. It is not the systems that ultimately fail cyber security professionals- it’s the people. Insider threats do abound but more often than malfeasance, misfeasance is the key to a breach. It wasn’t the firewall that failed Capitol One, it was a misconfiguration. Tom Finan dives in on culure vs. strategy quoting both Peter Drucker and…Barbara Streisand.
Covid 19 has changed 2020 in unprecedented ways in how we work, live our lives, and measure Cyber Risk. Listen to Episode #141 of Task Force 7 Radio as the Cyber Growth Leader from Willis Towers Watson, Tom Finan and Co-Host Andy Bonillo dive into how the “Cyber Security Superheroes” are working together to manage the human element during the pandemic. As claims data shows, effective Cyber Risk prevention and mitigation is largely a people problem. In response, companies need to assess and analyze the elements of their cultures that shape both positive and negative cyber attitudes and behaviors that makes the human element one of the largest risks to a company.
Axio360 platform to provide holistic view and identify financial impact of risk for Archer’s clients
Axio announced a strategic partnership with cybersecurity consulting firm Archer. This partnership will merge Archer’s expertise in critical infrastructure protection with the Axio360 platform and allow clients to measure cyber risk exposure in financial terms and manage their cybersecurity program from a holistic point of view.
The Axio360 platform will assist Archer’s clients in identifying cyber risks across business units and threat vectors that may not have previously been considered. The platform estimates all-in costs of exposure and evaluates how specific controls and mitigations will reduce risk.
“The Axio platform was built to fundamentally redefine how organizations solve cybersecurity problems. Our intention is to enable business-centric decision-making by putting the risk in financial terms,” said Brendan T. Fitzpatrick, Senior Vice President of Channels & Partnerships for Axio.
“Our operating system aligns all key constituents and delivers clarity in real-time. This partnership with Archer allows our software to make critical infrastructure safer and more secure.”
“This partnership allows our asset owners to receive tailored recommendations from Axio and our dedicated team. For the first time, our clients will be able to measure their cybersecurity program and benchmark it across their industry peers,” stated Patrick C. Miller, Managing Partner for Archer.
“This collaboration will help the overall assessment and understanding of cybersecurity risk for critical infrastructure.”
Axio360’s methodology and software empowers organizations to continuously answer the four most critical questions for cyber risk:
- What’s my exposure in financial terms?
- How should I manage my cyber program?
- Do I have the financial ability to recover?
- Where should I invest?
Automotive1 week ago
Variables Complicate Safety-Critical Device Verification
Business Insider5 days ago
A 17-year-old entrepreneur made nearly $500,000 reselling sneakers during a quarantine. Here’s a look inside his pandemic-proof business model.
Gaming6 days ago
Fortnite Floating Rings Locations: Where To Collect Rings At Lazy Lake
Blockchain1 week ago
Bitcoin Solves This: $2.8 Billion Worth of Gold Counterfeited by Chinese Company from Wuhan
Blockchain1 week ago
ABA Global Signed Strategic Partnership with GCOX
AI1 week ago
This Tiny House Is 3D Printed, Floats, and Will Last Over 100 Years
Gaming1 week ago
Rat King – The Last of Us Part 2
Gaming1 week ago
Nier Creator’s New Game SinoAlice Is Out Now