NokNok.com
NokNok.com cloud security startup based in Palo Alto, California. According to it’s founder it will establish a revolutionary way to support authentication in corporate networks and the cloud. It is founded by Phil Dunkelbergerpb a serial entrepreneur who co-founded PGP Corp in 2002. PGP acquired an authentication technology for 2 million dollar in 2002. A public key-encryption method that was first purchased by McAfee in 1997. McAfee didn’t make a good use of the encryption method and didn’t develop it further, it also didnt see the potential global demand for two-way authentication using encryption. On the other hand PGP headed by Mr. Dunkelbergerpb made a great use of the technology knowing that future demand will increase for the technology to support the need for authentication by corporations world wide.
The company developed the technology and provided public-key encryption for corporate networks. PGP sold that technology to Symantec for 300 million dollar. Mr.Dunkelbergerpb saw the great need for two-way authentication by using encryption to secure corporate data and emails over the cloud. NoNok.com promises to revolutionize how people use authentication to secure their data, moreover it promises to simplify the authentication process and end the need for passwords. NokNok labs is still working on the software that will change how people think and use authentication in the future.
Jobs at NokNok Labs
BUSINESS DEVELOPMENT
Vice President of Business Development Palo Alto, CA, United States
ENGINEERING
Lead Engineer Architect (Java Expert) – Internet Security Startup
Palo Alto, CA, United States
QA Engineer (Windows/Automation) – Internet Security Startup Palo Alto,
CA, United States
Senior Software Engineer (Security and Java Expert) Palo Alto, CA,
United States
Software Engineer – Java (Entry Level) Palo Alto, CA, United States
Software Engineer – Windows, C++ (Entry Level) Palo Alto, CA, United
States
Software Engineer (Java) Palo Alto, CA, United States
Software Engineer (Java) Palo Alto, CA, United States
Software Engineer (Windows) Palo Alto, CA, United States
Software Engineer (Windows) – C++, .Net, JavaScript Palo Alto, CA,
United States
Software Engineer- Mobile, iOS or Android (Entry Level) Palo Alto, CA,
United States
Sr. Mobile Software Engineer (iOS Apple) Palo Alto, CA, United
States
Sr. Software Engineer (Windows) – C++, .Net, JavaScript Palo Alto, CA,
United States
Sr. Software Engineer- Advanced Technology Group (C++ or Java) Palo Alto,
CA, United States
Windows Software Engineer – Contractor Palo Alto, CA, United States
MARKETING
Sr. Manager, Corporate Marketing (Internet Security Product) Palo Alto,
CA, United States
Online Degrees in Cyber-Security: A Deterrent to Cyber Criminals
Thanks to the internet, the world has become more interconnected than ever before. The internet has become an intricate element of our modern lifestyles, to the extent that it is almost unimaginable to picture a world without it. Additionally, critical national infrastructure relies heavily on the internet; from tax collection systems, student loan application systems, coordination of traffic signals, to the national power grid.
Despite the numerous benefits the internet has facilitated, increased connectivity has resulted in a recent surge in internet fraud and crime. To capitalize on the availability of tons of personal data online, cybercriminals have become more adept at hacking websites and databases to mine this data. Identity theft, cyber terrorism, cyber espionage and cyber fraud are some of the emerging security threats. To counter these worrying trends, cyber security has become a vitally important aspect of the information technology world.
Cyber security entails adopting measures and practices to protect an organization’s data and information, both online and offline. These security measures are centered on computers and networks to prevent hackers and other unauthorized persons from accessing or manipulating information stored in databases or an organization’s website. Many higher education institutions have launched cyber security programs to address the need for cyber security professionals. The programs are either offered on-campus or online in order to offer flexibility to prospective students.
Some of the best online schools for degrees in cyber security include:
University of Phoenix: Offers a three years bachelor’s program in Informational Systems Security and a Bachelor’s in Organizational Security and Management.
Florida Tech University: Offers a graduate degree in Information Technology in Cyber Security.
Kaplan University: Offers a bachelor’s program in Information Security and Forensics.
American Intercontinental University: Offers a Bachelor of Science degree in Information Technology- Information Assurance and Security.
Bryant & Stratton College online: Has two degree programs in AAS Security Technology and AAS Networking Technology.
Capella University: Offers several degrees ranging from a B.Sc. in Information Assurance and Security, a B.Sc. in Network Technology, to a B.Sc. Network Security.
Colorado Technical University-Online: Offers a B.Sc. in Information Technology-Security and M.Sc. in Computer Science- Digital Systems Security.
Upon completion, graduates are able to take up technical and managerial positions that involve implementing various security measures such as securing servers, designing more secure networks, auditing organizations cyber security levels and proposing corrective measures, and offering solutions to emerging cyber security situations. Job titles for graduates range from network architect, network security specialist, project manager, network engineer to systems administrator. Furthermore, there are various avenues to advance the degree opening opportunities in consultancy and training. Typically, online cyber security degrees are available at the associate’s, bachelor’s, master’s and doctorial levels.
These degree programs equip the graduates with the necessary skills to counter cybercriminals and provide protective measures that will deter them from causing havoc. Nevertheless, there are calls from some quarters that cyber security programs should not be offered as an undergraduate program, but from the graduate level onwards. Those in favor of this school of thought base their argument on the idea that undergraduate program are supposed to be general, not trade courses. On the other hand, training cyber security professionals right from the undergraduate level molds specialists who are masters in their trade. All in all, obtaining a degree in cyber security is not only in line with national needs to counter cybercrimes, but an avenue full of opportunity to invent internet security products.
Author Bio: Dennis M. is a freelance writer and a technical writer with a specialty in Information Technology trends. In his free time, he writes for Degreejungle.com an online resource for aspiring college students.
SmartSignin – The Smart, Secure and Simple Identity in The Cloud
Do you feel annoyed by the numerous passwords that you have to memorize to gain access to your personal and business accounts on the web? Maintaining access control using passwords is important and it is the best line of defence against hackers, but maintaining many passwords can slow productivity and cause unwanted headache for individuals and enterprises. SmartSignin.com is a startup that promise to provide the smart, simple and secure way for consumers and enterprise users to take charge of their web ID’s, passwords and privacy.
It aggregates all the users websites and enables a 100% Single Sign on from any platform or device, behind or in front of a firewall, without collaboration from any 3rd party and implementation takes just minutes. For enterprises, additional features are available that allow enterprises utilizing the cloud to authorize users access to apps based on roles, provisioning, automatic password resets, audits, and add new employees or delete ex-employee from active directory with just 1 click.
SmartSignin promise to provide secure Identity as a service product on the market. Its cookie-less architecture, PKI free multifactor authentication and its patented “Smart Key” algorithm, developed in joint venture with Ganita labs, at the University of Toronto, all to try to avoid any single point of failure in the system.
Android Smartphones Security Alerts

Android users should be aware of dangerous malwares and spywares that are spreading these days and they can infect their smartphones and cause serious security damage. The Two most dangerous of those are listed below:
Loozfon
This malware is designed to steal information from smartphones once it installed. How victims get that malware in the first place? victims maybe sent an email to try a work-at-home program that promise great income, victimes can be directed to other website where the malware can install itself on the device. The malware then will steal all the information and all contacts in the address book and send it to the criminals.
FinFisher
This is a spyware that can take control of the victim smartphone. The victim smartphone can then be monitored by the attackers to send and receive personal and important data. The controlled device then will act as a zombie and send the spyware to other devices without the knowledge of the smartphone owner. How do victims get FinFisher spyware? Victims can get the unwanted spyware by opening unknown links which will cause the spyware to install itself on the victim’s device.
Users need to review and understand the permissions they are giving when they download applications.
Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
Be aware of applications that enable Geo-location and do not allow your device to connect to unknown wireless networks.
Wipe all your data and reset your smartphone to factory default if you decide to sell your device or trade it in.
Socially!