Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

12/13/2011
04:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NetQin And Commtouch Enter Agreement for Delivery Of Mobile Security And Advanced URL Filtering Solutions

Companies to integrate Commtouch's GlobalView URL Filtering into NetQin Mobile Security

SUNNYVALE, Calif., Dec. 6, 2011 /PRNewswire/ -- NetQin Mobile Inc. (NYSE: NQ), a leading global provider of consumer-centric mobile security and productivity applications, today announced an agreement with Commtouch' (NASDAQ: CTCH) to integrate Commtouch's GlobalView(TM) URL Filtering into NetQin Mobile Security.

Commtouch's GlobalView URL Filtering is a cloud-based URL filtering solution that provides insight into security threats, identifying harmful sites before users are exposed to them. Its unique technology continuously monitors and analyzes Web traffic to categorize URLs in realtime. GlobalView URL Filtering will now be included as part of NetQin Mobile Security, which protects smartphones against mobile security and privacy threats, including malware, spyware, viruses, and hackers, while keeping devices running at optimal speed.

"Every day, people use their smartphones for email, banking, playing games, and browsing the Internet. In many ways, mobile phones are mini-computers and they expose people to the same types of undesirable content and security risks they're exposed to on their PCs," said Dr. Henry Yu Lin, NetQin's Chairman and Chief Executive Officer. "People need the same strong, reliable security and filtering options they have on their home computers on their mobile devices. By integrating Commtouch's URL filtering solution with NetQin's mobile security technology, we're giving customers the best security and privacy protection tools to protect their mobile devices."

NetQin Mobile Security users can more safely browse the Web on their phones, while the URL filtering solution is continuously working to detect and block malicious websites and suspicious URLs in their emails and text messages. The end result for users is effective protection against phishing attacks and other types of cybercrimes, which often result in financial losses and identity theft.

"With mobile devices overtaking computers for day-to-day activities like browsing the Web, the need for strong threat protection is substantial and growing," said Ofer Tal, vice president of international sales and business development at Commtouch. "We are pleased to take a leadership position in protecting mobile users in this collaboration with NetQin, one of the fastest growing and leading mobile smartphone security providers."

About NetQin

NetQin Mobile Inc. (NYSE: NQ) is a leading global provider of consumer-centric mobile Internet services focusing on security and productivity. NetQin was one of the first companies to recognize the growing security threats targeting smartphone users and is now a leading Software-as-a-Service (SaaS) provider with over 120 million registered user accounts worldwide. As a market leader in mobile security, NetQin's innovation and global significance have been widely recognized through distinctions such as the 2011 Technology Pioneer Award bestowed by the World Economic Forum. For more information on NetQin, visit www.netqin.com or get the latest news from the NetQin blog at http://blog.netqin.com/en

About Commtouch

Commtouch' (NASDAQ: CTCH) safeguards the world's leading security companies and service providers with cloud-based Internet security services. A cloud-security pioneer, Commtouch's real-time threat intelligence from its GlobalView(TM) Network powers Web security, messaging security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...