Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
EAST PALO ALTO, CA -- (Marketwired) -- 07/15/15 -- Finjan Holdings, Inc. (NASDAQ: FNJN), a cybersecurity company, today announced the winner of its Mobile Defense Challenge 2015, a student cybersecurity mobile application competition to promote innovation, cybersecurity education, and the entrepreneurial spirit in a combined effort to identify next generation consumer privacy and data protection technologies for mobile platforms.
The winning team is comprised of members Mr. Hamidreza Nazaripouya, a PhD candidate for Mechanical Engineering at University of California, Los Angeles; Ms. Shadi Emam, a PhD candidate at Northeastern University, College of Engineering; and Mr. Omidreza Nazaripouya, a Graduate Student at William Marsh "Rice" University, Department of Computer Science ("Team SeQrity"). Team SeQrity submitted the winning proposal entitled, Influential Manner of Smart-Phone Applications on User's Privacy through Machine Learning and Pattern Recognition Methods. To make it through to the final round, each team produced a white paper explaining their thesis, working wire frame models of the applications, and an introductory video to educate the judges on the consumer needs that would be met by the project.
"The judges were both impressed and inspired by the several proposals submitted in response to our inaugural Mobile Defense Challenge. The decision was difficult as we received proposals with the promise of covering many aspects of protecting consumer data and privacy on mobile platforms. Team SeQrity's proposal was chosen for its comprehensiveness as well as potential for broad applicability," stated Julie Mar-Spinola, Chief IP Officer and VP, Legal. "We look forward to working with them and fostering their continued innovation."
"We would like to express our sincere gratitude to Finjan for making this opportunity possible," stated Team SeQrity leader, Hamidreza Nazaripouya. "We were thrilled to learn of our selection for this honor and we deeply appreciate Finjan's support. It truly is a pleasure to have Finjan as our mentor for this project. We are delighted to move forward and start the next step and implement this application as soon as possible."
The runner-up team -- also receiving iPads -- submitted a proposal entitled, Second Chance Instant Messaging, whose members include Mr. Mark Santiago, an undergraduate candidate in Computer Science & Engineering at University of California, Merced; Ms. Vineesha Kasireddy, a Masters degree candidate in Software Engineering at San Jose State University; and Mr. Richard Jang, an undergraduate candidate in Computer Engineering from San Jose State University.
Nearly 20 years ago, Finjan's founder, Shlomo Touboul, entered a similar contest sponsored by Sun Microsystems to build the best Java-based application, and hired a couple of student hackers to help him. Quickly realizing that the breakthroughs that came with the advent of JavaScript also gave rise to significant security vulnerabilities that then available antivirus solutions could not fend off, Shlomo turned his focus on developing behavior-based malware detection technologies that are now the subject of more than 20 U.S. Patents and embodied in security solutions sold by its licensees throughout the world today. With MDC 2015, Finjan is celebrating its 20th Anniversary by circling back to its roots and again looking to our best and brightest to develop the next generation of cybersecurity solutions for mobile and wearable devices.
ABOUT FINJAN
Founded in 1997, Finjan is recognized globally as a cybersecurity pioneer and leader. Finjan's investment in innovation is captured in its patent portfolio, centered around software and hardware technologies capable of proactively detecting previously unknown and emerging threats on a real-time, behavior-based basis. Finjan's software detects malicious code and protects end users from identity and data theft, spyware, malware, phishing, trojans, and other online threats. To date, Finjan has successfully licensed its intellectual property to major technology companies for more than $150 million. For more information about Finjan, please visit www.finjan.com.
Follow Finjan Holdings, Inc.:
Twitter: @FinjanHoldings
LinkedIn: linkedin.com/company/finjan
Facebook: facebook.com/FinjanHoldings
Finjan Mobile Defense Challenge 2015: contest.finjan.com
Cautionary Note Regarding Forward-Looking Statements
Except for historical information, the matters set forth herein that are forward-looking statements involve certain risks and uncertainties that could cause actual results to differ. Potential risks and uncertainties include, but are not limited to, the outcome of pending or future enforcement actions, our ability to expand our technology portfolio, the enforceability of our patents, the continued use of our technologies in the market, our stock price, changes in the trading market for our securities, regulatory developments, general economic and market conditions, the market acceptance and successful business, technical and economic implementation of Finjan Holdings' intended plan; and the other risk factors set forth from time to time in our filings with the SEC, including our Annual Report on Form 10-K for the year ended December 31, 2014, and the Company's periodic filings with the SEC, copies of which are available free of charge at the SEC's website at www.sec.gov or upon request from Finjan Holdings, Inc. All forward-looking statements herein reflect our opinions only as of the date of this release, and Finjan Holdings undertakes no obligation, and expressly disclaims any obligation, to update forward-looking statements herein in light of new information or future events.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs