iViz Tech Solutions Aims to Put Hackers Out of Work

January 2008
Red Herring;1/4/2008, p2
Trade Publication
The article provides information on iViz Tech Solutions, an Indian startup that promises on-demand software that does penetration testing, or simulated attacks on systems. Incubated in one of India's top technology institutes in 2005, iViz develops artificial intelligence-based products that simulate an intelligent hacker to detect the security flaws in a system or network and suggest corresponding remedies. The traditional manual testing approach relies on the output of numerous tools combined with the intelligence or expertise of the security expert.


Related Articles

  • NUMBER CRUNCH.  // SC Magazine: For IT Security Professionals (UK Edition);Mar2009, p11 

    The article presents statistics on the percentage of data breach cases in 2008 in Great Britain that were repeat offenders and the percentage of those cases which were new.

  • Is China Readying for a Cyber War?  // Chinascope;Mar/Apr2013, Issue 62, p16 

    The article presents reports from China's state-run media on U.S. accusations that the Chinese government and military is involved in cyberattacks against the U.S. An editorial published in the March 15, 2013 issue of "Huanqiu" accused the U.S. of preparing for a cyber war by smearing China. An...

  • Detecting Security Threats in the Router using Computational Intelligence. Visumathi, J.; Shunmuganathan, K. L. // Advances in Computational Sciences & Technology;Jun2010, Vol. 3 Issue 2, p191 

    Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and accessibility to the Internet is also posing a serious threat to security and privacy, to individuals, organizations,...

  • A Survey of Botnet Technology and Detection. Naseem, Fatima; Shafqat, Mariam; Sabir, Umbreen; Shahzad, Asim // International Journal of Video & Image Processing & Network Secu;Feb2010, Vol. 10 Issue 1, p13 

    Apart from viruses, worms, Trojan horses, and network intrusions; there is a less familiar and exponentially growing threat that tends to be more disastrous: Botnets. The target of the botnet attacks on the integrity and resources of users might be multifarious; including the teenagers...

  • Subculture of Hackers in Russia. Dremliuga, Roman // Asian Social Science;Sep2014, Vol. 10 Issue 18, p158 

    This article observes the situation with hacker subculture in Russia. The author is analyzing the reasons why this subculture doesn’t need a lot of time to conquer Russian net society. He is proving that tremendous growth of popularity of hacker subculture in Russia is caused by easy...

  • Anonymous Speaks. OLSON, PARMY // Forbes Asia;Feb2011, Vol. 7 Issue 2, p75 

    The article informs about Anonymous Operations, the division of the troublemaking hacking group called Anonymous that did a massive computer network attack against MasterCard, Visa and PayPal in November 2010 in retaliation for their freezing donor payments to WikiLeaks. It has been stated that...

  • Data Breach Incidents. Brill, Alan; Leonard, Jim // University Business;Aug2007, Vol. 10 Issue 8, p21 

    The author discusses a case on university network hacking. An information technology team disclosed information to the university's general counsel that they discovered a computer worm in one of the university's financial servers. They disclosed that the worm discovered unencrypted credit card...

  • Hackers of the World Unite. Docksai, Rick // Futurist;Mar/Apr2011, Vol. 45 Issue 2, p8 

    The article offers information on the latest trend in computer hacking. It mentions that the new trend is to mobilize forces over the Internet to join the equivalent of mass online protests in which political groups, organized-crime syndicates and some governments launched distributed denial of...

  • Untitled. Anderson, Kent // Computer Weekly;10/7/2008, p6 

    The article discusses the issue concerning the growth of politically motivated computer crime in Great Britain. It indicates the assertion of the government regarding the move of the security and intelligence agencies to continue to protect the country from covert activity by foreign...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics