Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

12/13/2011
04:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NetQin And Commtouch Enter Agreement for Delivery Of Mobile Security And Advanced URL Filtering Solutions

Companies to integrate Commtouch's GlobalView URL Filtering into NetQin Mobile Security

SUNNYVALE, Calif., Dec. 6, 2011 /PRNewswire/ -- NetQin Mobile Inc. (NYSE: NQ), a leading global provider of consumer-centric mobile security and productivity applications, today announced an agreement with Commtouch' (NASDAQ: CTCH) to integrate Commtouch's GlobalView(TM) URL Filtering into NetQin Mobile Security.

Commtouch's GlobalView URL Filtering is a cloud-based URL filtering solution that provides insight into security threats, identifying harmful sites before users are exposed to them. Its unique technology continuously monitors and analyzes Web traffic to categorize URLs in realtime. GlobalView URL Filtering will now be included as part of NetQin Mobile Security, which protects smartphones against mobile security and privacy threats, including malware, spyware, viruses, and hackers, while keeping devices running at optimal speed.

"Every day, people use their smartphones for email, banking, playing games, and browsing the Internet. In many ways, mobile phones are mini-computers and they expose people to the same types of undesirable content and security risks they're exposed to on their PCs," said Dr. Henry Yu Lin, NetQin's Chairman and Chief Executive Officer. "People need the same strong, reliable security and filtering options they have on their home computers on their mobile devices. By integrating Commtouch's URL filtering solution with NetQin's mobile security technology, we're giving customers the best security and privacy protection tools to protect their mobile devices."

NetQin Mobile Security users can more safely browse the Web on their phones, while the URL filtering solution is continuously working to detect and block malicious websites and suspicious URLs in their emails and text messages. The end result for users is effective protection against phishing attacks and other types of cybercrimes, which often result in financial losses and identity theft.

"With mobile devices overtaking computers for day-to-day activities like browsing the Web, the need for strong threat protection is substantial and growing," said Ofer Tal, vice president of international sales and business development at Commtouch. "We are pleased to take a leadership position in protecting mobile users in this collaboration with NetQin, one of the fastest growing and leading mobile smartphone security providers."

About NetQin

NetQin Mobile Inc. (NYSE: NQ) is a leading global provider of consumer-centric mobile Internet services focusing on security and productivity. NetQin was one of the first companies to recognize the growing security threats targeting smartphone users and is now a leading Software-as-a-Service (SaaS) provider with over 120 million registered user accounts worldwide. As a market leader in mobile security, NetQin's innovation and global significance have been widely recognized through distinctions such as the 2011 Technology Pioneer Award bestowed by the World Economic Forum. For more information on NetQin, visit www.netqin.com or get the latest news from the NetQin blog at http://blog.netqin.com/en

About Commtouch

Commtouch' (NASDAQ: CTCH) safeguards the world's leading security companies and service providers with cloud-based Internet security services. A cloud-security pioneer, Commtouch's real-time threat intelligence from its GlobalView(TM) Network powers Web security, messaging security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
CVE-2021-3420
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.