Endpoint
12/18/2012
03:19 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AVG And Yahoo Team On Secure Search

AVG is now offering Yahoo customers more choice when it comes to search providers

AMSTERDAM and SAN FRANCISCO, Dec. 13, 2012 /PRNewswire/ -- AVG Technologies N.V.

(NYSE: AVG), the provider of Internet and mobile security to 143 million active users, today announced a new Search and Distribution relationship with Yahoo!

Inc. (NASDAQ: YHOO).

AVG Secure Search, now also powered by Yahoo!, protects users from dangerous websites and online threats, via AVG's LinkScanner® technology. Under this agreement, AVG is now offering their customers more choice when it comes to search providers; and Yahoo! is extending its search presence to even more users.

"AVG is excited to team up with Yahoo! to help provide Internet users with peace of mind when searching the web or accessing their favorite online properties,"

said JR Smith, CEO, AVG Technologies. "This relationship represents a shift from the company's previous strategy of entering into exclusive search agreements in its search and advertising services business. Consumers have many choices when it comes to how they access the Internet, and our objective is simply to keep them secure, each step of the way."

"Internet users everywhere want to be able to access online content easily without having to worry about security threats," said Shashi Seth, senior vice president of Connections at Yahoo!. "We're committed to providing a rich search experience to AVG users and see this relationship as a strategic way for us to enrich and broaden our search footprint moving forward."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.