Cisco Blogs


Cisco Blog > Security

Drive By Web Exploits

One of the key tools in the cybercrime toolbox is the drive by web exploit. Simply put, a drive by exploit is when a website is somehow violated such that it later causes the download of software, often from a different server and typically malicious in nature, without the knowledge of the end user. This software may be later used for a variety of things. It may be a key logger, recording keystrokes to capture things like passwords and credit card data, it could be a botnet client, turning the victim PC into a zombie used for spam, DDoS or even Bitcoin Mining. Regardless, the fundamentals remain the same. Do something bad to a website and then that website causes a silent install of malware on visitor machines.

Read More »

Tags: ,

On The Edge: Increasing Online Sales with the Future of Shopping

“If there’s one reason we have done better than of our peers in the Internet space over the last six years, it is because we have focused like a laser on customer experience, and that really does matter, I think, in any business. It certainly matters online, where word of mouth is so very, very powerful.” Jeff Bezos

In today’s business climate, any sector that has doubled revenues in the past five years is considered a wonderful outlier to the economic norm – particularly in an industry as big as fashion retailing. How are they doing it? By changing the business model and selling more on-line. In fact, according to the Telegraph, over one third of all consumers have purchased clothing over the Internet in the past year, a 26% increase over the previous one.

So how can savvy retailers build on this momentum and do it again? By taking the on-line experience to the next level. Here’s one likely future of shopping experience solution. And you can see it only at Cisco Live! July 10-14 in Las Vegas:

Imagine being able to shop virtually from anywhere much more quickly and efficiently. No more crowded, clunky dressing rooms, or trawling racks of jumbled clothes in a sprawling megastore. No more changing ten times to find the perfect color combination. Simply scroll through the menu to see an unlimited amount of inventory in one place, and see how it looks on you virtually using the latest augmented reality and network technology.

Read More »

Tags: , , , , , , , , , , , , , ,

SecureX – Cisco Redefines Security at RSA 2011

Annalisa Giardina of the Cisco Marketing Team working the booth at RSA 2011

Annalisa Giardina of the Cisco Marketing Team working the booth at RSA 2011

RSA 2011 was a big show for Cisco. We had a 30x30 booth with an in-booth theater, eight demo pods, speakers on several panels, and a keynote. Including speakers, the install and dismantle crew, and all of the booth staffers, we had a crew of around 100 people at the show. Demos included firewalls, virtualization, mobility, web, and security services. With the passing of Cisco Security Monitoring, Analysis, and Response System (MARS), a partner’s SIEM ecosystem display was of note, as were demonstrations of Cisco TrustSec, intrusion prevention, and Cisco Virtualization Experience Infrastructure (VXI). We also demonstrated Cisco AnyConnect running on an iPad, illustrating how Cisco can meet the needs of organizations grappling with the demands of the consumerization of IT and the security concerns that employee liable devices bring.

Read More »

Tags: , , , , , , ,