10:15 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Cloud Security Corporation And App Ventures Limited Sign Asset Purchase Agreement

Cmpanies formed a joint venture agreement to pursue technology and intellectual property that was equally owned

NEWPORT BEACH, Calif., Dec. 4, 2013 /PRNewswire/ -- Cloud Security Corporation

(OTCBB: CLDS), an emerging technology company focused on the next generation of Internet and mobile security, today announced that the Company signed an asset purchase agreement to acquire the assets of Hong Kong-based App Ventures. The acquisition of App Ventures' assets will allow Cloud Security the opportunity to expand its App and website security technology and marketing in North America, as well as give it access to critical Asian markets.

The two companies formed a joint venture agreement to pursue technology and intellectual property that was equally owned. Cloud Security Corporation and the joint venture filed a patent (US Serial Number 61/832,534) for a process and methods for one-time password generation on mobile computing devices. This patent-pending process reduces several risk factors related to current one-time password technology. Cloud Security Corporation now owns 100% of this patent following signature of the asset purchase agreement.

In addition to the aforementioned intellectual property, the Company also gains access to AppSecure(TM), part of the AppFence technology, a cutting-edge sensor technology with a secure communication framework that detects web-based attacks on web apps and websites. While continuing to vigilantly monitor security, the built-in intelligence provides analysis, affirmation and impediment of cyber attacks in real time instead of after the fact. The asset purchase agreement will include AppVentures' interest in AppSecure(TM) and AppFence.

Safa Movassaghi, President of Cloud Security commented, "We are pleased to sign this asset purchase agreement adding to our product line with App Secure(TM) and other App Fence products from the App Ventures' assets. A key advantage is that App Secure is ready-for-market and is already being used."

Kerry Singh, President of App Ventures Ltd. stated, "Signing the asset purchase agreement completes our alignment with a growing Company in the cloud security sector and further provides access to new markets. As part of this asset purchase agreement, we will be offering our extensive developer and business relationships in Asia to Cloud Security Corporation."

About Cloud Security Corporation

Cloud Security Corporation is an innovative cloud computing company whose technology and products allow for secure data connections to the cloud, through networks, traditional computers and mobile devices such as smartphones and tablets. The Company's flagship product - MyComputerKey(TM) - provides the ability for remote access security to any computer around the world. The Company also develops online application security products and mobile security technology in the Bring-Your-Own-Device (BYOD) market, a growing trend in today's mobile workforce. For more information about the Company, please visit www.cloudsecuritycorporation.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before on Ubuntu 8.0...

Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web