Zscaler in the media: research, information, and perspectives
2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
December 23, 2010

Zscaler Labs recently announced Security Predictions related to Flash mob, Niche malware ,Cloud-hosted botnets, Social networks and Information security market. "Its not only the season of giving and but forecasting as well, and I recently received the following Information Security Predictions from Zscaler Labs"

December 6, 2010

"Copiers often are leased, returned and then leased again or sold," the FTC said. "It's important to know how to secure data that may be retained on a copier hard drive, and what to do with a hard drive when you return a leased copier or dispose of one you own."

November 22, 2010

Malvertising is a well-known technique, whereby attackers lease advertising space on popular websites in order to facilitate an attack. The ads are there to lure users to a malicious secondary site; sometimes it involves a browser-based vulnerability to deliver a malicious file. With rise in usage of mobile devices and smart phones, for business and personal purpose, malvertising in this area is also on the rise.

November 12, 2010

A new variant of the Lethic botnet agent comes signed with a digital certificate from the same firm whose identity was abused by the infamous Stuxnet industrial control system worm.

November 9, 2010

If you're concerned about using open Wi-Fi networks because of Firesheep, the highly popular new hacking tool, you should check out BlackSheep, a Firefox add-on that makes surfing on open networks safe once again.

November 4, 2010

"I'd collected somewhere between 20 and 40 identities." Most were Facebook identities. So Gary started sending people messages from their own Facebook accounts warning them he had just hijacked their Facebook accounts.

September 10, 2010

We tested a cloud-based Web security service from Zscaler, a startup founded in 2007. On the whole, it had an extremely impressive showing in the lab. We came to this review highly skeptical of anyone's ability to match the efficiency and feature set of a premises product, but Zscaler is turning us into believers. [Refer pg. 32]

September 2, 2010

The feature, called WebScan, allows a user to remotely trigger the scanning functionality and retrieve scanned images via a web browser. This capability could allow anyone on the local area network (LAN) to remotely connect to the scanner and retrieve documents that have been left behind on the scanner

August 25, 2010

Zscaler researcher Julien Sobrier recently sounded the alarm on nearly three million pages indexed by Google that were serving Malware. Hours after Sobrier’s blog post, Google now seems to have finally started cleaning house.

July 2, 2010

Introduces the FIRST true web cloud security service in partnership with Zscaler, and powerful network encryption solution for distributed enterprises HONG KONG

May 24, 2010

Zscaler, a software-as-a-service security provider, released its report, on May 24, 2010, the second report of its kind conducted by the company.

May 5, 2010

Google's research echoes findings from a study conducted by ZScaler earlier this year. ZScaler also found similar problems with other popular.

April 30, 2010

Telecoms services provider, Telarus has launched a hosted service providing web traffic filtering, based on Zscaler's technology.

April 19, 2010

Link-shortening services such as TinyURL seem ideal for criminals because they can disguise the names of malicious sites. Yet on Twitter — one of the most popular places for them — they may not be nearly as malicious as many industry experts fear, according to new security research.

March 22, 2010

Microsoft Internet Explorer (IE) 6 continues to be popular at enterprises, despite being targeted in a number of high-profile attacks and the availability.

March 16, 2010

The Jericho Forum proposes security vendors self-assess and certify their security capabilities. Plus: Microsoft might release IE off-cycle update; Koobface shows itself,....of the infected user. Well, Koobface has returned, according to Zscaler researchers, who said that over this past weekend, the Koobface worm.

March 16, 2010

Following evidence detected last week by Kaspersky Lab that the Koobface botnet is able to refresh itself and double ....over the last weekend. Umesh Wanve, senior security research engineer at , said that on Sunday 14th March, it detected a large number...

March 3, 2010

"Conference in San Francisco. And here s an interesting twist: The folks at Zscaler, a cloud security start-up, made their case to me that cloud-centric"

February 22, 2010

According to Mike Geide, senior security researcher at cloud security company zscaler, "there are several exploit kits out there that include rootkit

February 22, 2010

According to Mike Geide, senior security researcher at cloud security company Zscaler, "there are several exploit kits out there that include rootkit

February 22, 2010

A Security View of the State of the Web The abstract of Zscaler's State of the Web report for the fourth quarter of 2009 doesn't pull any

February 12, 2010

While this may restore user trust in Buzz for some, Mike Geide, a senior security researcher with Zscaler who described in a blog post how Buzz could be misused by spammers, says that the service still could be misused.

February 11, 2010

Mike Geide, senior security researcher at Zscaler, agreed with the privacy concerns, and also claimed that there were 'a few other items that Google Buzz brings to the table for an attacker'. It was launched this week to be part of the Gmail web mail service, with Todd Jackson, product manager for Gmail and Google Buzz claiming that ‘Google Buzz is a new way to start conversations about the things you find interesting'.

February 9, 2010

New forms of off-line client-side storage, such as those specified by the emerging HTML 5 set of standards, could open entirely new kinds of attacks to Web application users, according to Michael Sutton, VP of security research for cloud security firm ZScaler

January 26, 2010

Zscaler have discovered the recently patched Internet Explorer vulnerability, which gained fame after it was used in the attacks on Google earlier this month, being

January 15, 2010

Zscaler Research reported that only an hour after the 7.0 earthquake hit on Tuesday afternoon, there was a 1,578 per cent increase in URLs visited, with a corresponding 5,407 per cent increase in bandwidth usage for ‘Haiti' URLs.

January 15, 2010

The attack on Google in China was possible due to a zero-day vulnerability on Internet Explorer. Microsoft said that the vulnerability exists as an invalid pointer reference within Internet.

January 14, 2010

Sites saw a 1,578 percent increase in traffic yesterday, according to Zscaler, a security service for Web traffic. And Twitter's founder Evan

January 14, 2010

The Haiti earthquake has launched a tsunami of sympathy, information and aid through social media such as Facebook, Flickr, Skype, YouTube and Twitter.

January 13, 2010

Increase in traffic and a 5407% jump in bandwidth usage, according to Zscaler, a cloud-based security service for web traffic. A number of citizen

January 13, 2010

Craig Hicks-Frazer in charge of building relationships with service provider partners at Zscaler in the company's bid to gain traction in the within the content security and compliance markets

January 11, 2010

Lends credibility to the predictions made by several security vendors, including , Websense, and Symantec, that Apple would be a larger

January 5, 2010

“My greatest hope for 2010 is that marketing departments will give the term ‘cloud computing’ a well deserved break,” said Michael Sutton, VP of security research at Zscaler. “2009 saw great interest in the development of cloud-computing architectures and one must wonder how often security was sacrificed in order to get to market quickly.”