TITLE

iViz Tech Solutions Aims to Put Hackers Out of Work

PUB. DATE
January 2008
SOURCE
Red Herring;1/4/2008, p2
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on iViz Tech Solutions, an Indian startup that promises on-demand software that does penetration testing, or simulated attacks on systems. Incubated in one of India's top technology institutes in 2005, iViz develops artificial intelligence-based products that simulate an intelligent hacker to detect the security flaws in a system or network and suggest corresponding remedies. The traditional manual testing approach relies on the output of numerous tools combined with the intelligence or expertise of the security expert.
ACCESSION #
36961974

 

Related Articles

  • NUMBER CRUNCH.  // SC Magazine: For IT Security Professionals (UK Edition);Mar2009, p11 

    The article presents statistics on the percentage of data breach cases in 2008 in Great Britain that were repeat offenders and the percentage of those cases which were new.

  • Is China Readying for a Cyber War?  // Chinascope;Mar/Apr2013, Issue 62, p16 

    The article presents reports from China's state-run media on U.S. accusations that the Chinese government and military is involved in cyberattacks against the U.S. An editorial published in the March 15, 2013 issue of "Huanqiu" accused the U.S. of preparing for a cyber war by smearing China. An...

  • Detecting Security Threats in the Router using Computational Intelligence. Visumathi, J.; Shunmuganathan, K. L. // Advances in Computational Sciences & Technology;Jun2010, Vol. 3 Issue 2, p191 

    Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and accessibility to the Internet is also posing a serious threat to security and privacy, to individuals, organizations,...

  • A Survey of Botnet Technology and Detection. Naseem, Fatima; Shafqat, Mariam; Sabir, Umbreen; Shahzad, Asim // International Journal of Video & Image Processing & Network Secu;Feb2010, Vol. 10 Issue 1, p13 

    Apart from viruses, worms, Trojan horses, and network intrusions; there is a less familiar and exponentially growing threat that tends to be more disastrous: Botnets. The target of the botnet attacks on the integrity and resources of users might be multifarious; including the teenagers...

  • Subculture of Hackers in Russia. Dremliuga, Roman // Asian Social Science;Sep2014, Vol. 10 Issue 18, p158 

    This article observes the situation with hacker subculture in Russia. The author is analyzing the reasons why this subculture doesn’t need a lot of time to conquer Russian net society. He is proving that tremendous growth of popularity of hacker subculture in Russia is caused by easy...

  • Data Breach Incidents. Brill, Alan; Leonard, Jim // University Business;Aug2007, Vol. 10 Issue 8, p21 

    The author discusses a case on university network hacking. An information technology team disclosed information to the university's general counsel that they discovered a computer worm in one of the university's financial servers. They disclosed that the worm discovered unencrypted credit card...

  • Untitled. Anderson, Kent // Computer Weekly;10/7/2008, p6 

    The article discusses the issue concerning the growth of politically motivated computer crime in Great Britain. It indicates the assertion of the government regarding the move of the security and intelligence agencies to continue to protect the country from covert activity by foreign...

  • Botnet exposes vulnerable networks. Ashford, Warwick // Computer Weekly;4/28/2009, p9 

    The article offers information on a botnet that hijacked 1.9 million computers in Great Britain, which exposed the vulnerability of government, companies and individuals to cyber attack. The botnet was built by a six members of a cybergang that bypassed 90% of antivirus products. It is said that...

  • FACING THE CYBER CHALLENGE. Smith, Geff; Westlund, Doug // Electric Perspectives;May/Jun2008, Vol. 33 Issue 3, p136 

    The article focuses on a 2007 study by the University of Maryland's James Clarke School of Engineering which found that hacker attacks of computers with Internet access occur approximately every 39 seconds. According to Alan Paller, director of the SANS Institute, there has been active and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics