background preloader

1.5.2.5. Network & Security

Facebook Twitter

Cerebro | Privacy Policy. The last update: February 10, 2010. Our company pays a lot of attention to keep your personal information confidential and secure. Please read the following rules and regulations on how we deal with your personal information. Why we need your personal information We collect your personal information first of all, because it helps us provide a high level of services and, secondly it ensures easy access to our products and services. Besides, by using your personal data we are always able to send you timely information on updates of our products and services, special offers and events that you might be interested in. When, what for and what kind of information we collect We collect personal data and other kinds of personal information, related to You, in the following cases: Data you provide us with – when you register on our website, we ask for your personal data (like your name, address, e-mail, account password) Cookies -when you visit our website, your PC sends one or a number of cookies.

Vupen. Vupen Security was a French information security company founded in 2004 and based in Montpellier with a US branch based in Annapolis, MD. Its specialty is in discovering zero-day vulnerabilities in software from major vendors in order to sell them to law enforcement and intelligence agencies which use them to achieve both defensive and offensive cyber-operations.[1] According to the French registrar of companies,[4] Vupen earned a net profit of 1,089,000 Euros in 2013. Some years ago Vupen was still providing information about vulnerabilities in software for free, but then decided to earn money with its services.

Pwn2Own. Origins[edit] The first contest was conceived and developed by Dragos Ruiu in response to his frustration with Apple's lack of response to the Month of Apple Bugs and the Month of Kernel Bugs,[2] as well as Apple's television commercials that trivialized the security built into the competing Windows operating system.[3] At the time, there was a widespread belief that, despite these public displays of vulnerabilities in Apple products, OS X was significantly more secure than any other competitors.[4] On March 20, roughly three weeks before CanSecWest that year, Ruiu announced the Pwn2Own contest to security researchers on the DailyDave mailing list.[1] The contest was to include two MacBook Pros that he would leave on the conference floor hooked up to their own wireless access point.

Any conference attendee that could connect to this wireless access point and exploit one of the devices would be able to leave the conference with that laptop. There was no monetary reward. Contest 2007[edit] 1357 Unified Lawful Interception Suite | Alcatel-Lucent. The Alcatel-Lucent 1357 Unified Lawful Interception Suite (ULIS) enables Network Operators (NWO) / Communication Services Providers (CSP) to comply with government regulations... The Alcatel-Lucent 1357 Unified Lawful Interception Suite (ULIS) enables Network Operators (NWO) / Communication Services Providers (CSP) to comply with government regulations for lawful interception of telecommunications and data retention. It offers a complete system for extracting communications of targeted subscribers in real time. It also provides retention capabilities for a specific set of data related to the activity of all subscribers.

This product acts as a mediation function between NWO / CSP and the Law Enforcement Agencies (LEA) / Authorized Organizations (AO). It is compliant with main standards worldwide (ETSI / 3GPP / CALEA interfaces) and covers any type of network. Spectrum monitoring and homeland security - Thales Group. Lawful Interception & Data Retention | Aqsacom. Deep Packet Inspection (DPI) - Network Intelligence - QOSMOS. Amesys - The Enemies of Internet. Amesys sold its EAGLE spyware to Libya while Muammar Gaddafi was still in power. It was used to spy on journalists and human rights activists there. As a result, the company is now being sued in France by the International Federation for Human Rights (FIDH) for complicity in torture. The lawsuit is still pending. The company Originally called i2e, Amesys is a French firm specializing in information technology that was founded in 1979. It was reorganized under the name of Amesys in 2004 and was taken over by the French technology company Bull in 2010.

In 2011, a French-based NGO, FIDH, made a complaint regarding cases of complicity of torture [1]. Portfolio The EAGLE System allows government agencies to analyse web traffic, store the data and process it for later use by police or intelligence agencies. The system consists of a network probe, storage systems and monitoring centres for the purpose of analysis.

Amesys involvement in Libya. ERCOM, tests and simulations of mobile networks, Securing smartphones. DocuSign eSignature | Digital Transaction Management. Document Control and Analytics | Document Security docTrackr. SSL Europa - Secure your digital world - Certificats SSL, Sylaé. Genymobile. Net Optics, Inc. | Architecting Visibility Into Your Network (TM) KUDELSKI GROUP > Access Emotion. INSIDE Secure ACCROIT SON LEADERSHIP ET SON EXPERTISE EN MATIÈRE DE SÉCURITÉ / Press releases / Media / Home - INSIDE Secure. INSIDE Secure étend sa gamme de produits VaultIC et lance une nouvelle puce sécurisée peu coûteuse, conçue pour protéger les dispositifs connectés contre la fraude et les menaces liées à la sécurité AIX-EN-PROVENCE, France, le 14 mai 2012 – INSIDE Secure, acteur majeur de la conception et de la fourniture de semi-conducteurs dédiés aux transactions sécurisées et aux applications liées à l’identité numérique, annonce aujourd’hui le lancement d’un nouvel ensemble de dispositifs de sécurité afin de contrer les menaces de sécurité qui se développent dans l’univers en pleine expansion des dispositifs, des objets et des individus connectés à Internet (« L’Internet des objets »).

Une plate-forme aux coûts optimisés Les modules VaultIC 441, 421 et 405 sont tous conçus sur la même plate-forme à haute densité, permettant d’utiliser des solutions QFN-20 et SOIC-8 plus compactes. Une sécurité améliorée À propos des modules de sécurité VaultIC A propos d’INSIDE Secure l’information. Mobiles. About Us - Code 42 Software, Inc. About Us Founded in 2001, Code42 is comprised of 400+ engineering, sales, marketing, design, and support professionals located throughout the world, headquartered in Minneapolis, MN. We're best known for CrashPlan, a system that manages and protects your digital life with easy-to-use software and high-performance hardware storage. Philosophy Leveraging our collective experience, we create extraordinary, elegant solutions for everyday problems. Not satisfied with making solutions that simply work; we demand they look amazing and behave intuitively. Our innovative, open, collaborative environment views all challenges as opportunities, new ideas expected, and the best one should always win.

Locations Code42's headquarters are located in Minneapolis, MN, with offices in London and Sydney. Directions to Minneapolis01 Minneapolis 1 Main St. Directions to Sydney02 Sydney Level 10, 221 Miller St.North Sydney NSW 2060Australia Directions to London03 London.