Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Symantec: Threats to Apple Products on the Rise

E-mail Print PDF
Symantec: Threats to Apple Products on the Rise

Customers can no longer rely on Apple's "walled garden" approach to software and security, Symantec warns-- while iOS and Mac OS X threats remain relatively low, such issues are actually on the rise.

According to the company malware aimed at iOS doubled, growing from 3 in 2014 to 7 in 2015. Meanwhile the number of OS X threats is growing on a Y-o-Y basis, rising by 15% in 2014 following a 44% increase in 2013 and a 29% increase in 2012.

Symantec also points out the number of unique malware-infected OS X computers in the first 9 months of 2015 was 7 times higher than all of 2014. A "significant" number of such attack comes through grayware, such as adware, potentially unwanted or misleading applications, but malware is likewise on the rise.

Read more...

War on Encryption (Or When Pundits Miss the Point)

E-mail Print PDF
War on Encryption (Or When Pundits Miss the Point)

"Fiendishly-complex online encryption" actually helps terrorists, the speechwriter of UK prime minister David Cameron writes in The Telegraph. But is it actually the case? You surely know the answer, dear readers.

It is no, obviously.

Written in the wake of the horrific attacks in Paris, the editorial by Clare Foges insists the standard encryption implemented by the likes of Google, Apple and Facebook-- not to mention the refusal to add backdoors-- makes the job of security services "infinitely harder." Another supposed tool for dastardly terrorists comes in the shape of Telegram, an end-to-end encrypted messaging app offering a secret chat service with self-destructing messages.

Read more...

Dell PCs Hit By Security Blunder

E-mail Print PDF
Dell PCs Hit By Security Blunder

Dell resellers should urge customers to check if their devices are affected by eDellRoot, a security vulnerability found in an August 2015 Dell software update.

First noticed by programmer Joe Nord, eDellRoot is a trusted root certificate pre-installed in Dell machines. Following a bit of sleuthing Nord discovered eDellRoot is has locally stored private key-- opening a vulnerability for unscruplous hackers, since the key is stored on the computer itself, rather than kept by the issuing authority.

“The same private key was found on multiple machines, meaning that anybody that has access to it can now use it to impersonate the certificate holder [i.e. the PC owner],” Malwarebytes security researcher Jérôme Segura tells Wired. “It made matters worse that the password for that key was easily crackable.”

Read more...

Kaspersky: Mobile Malware Remains a Threat

E-mail Print PDF
Kaspersky: Mobile Malware Remains a Threat

The Kaspersky Labs IT Threat Evolution Q3 2015 Report warns of increasing mobile malware, marking out an opportunity within the security industry.

The report compiles information gathered by "millions" of Kaspersky product users in 213 countries.

According to the report Kaspersky mobile security products detected 323374 new malicious mobile programs-- a 10.8% increase over Q2 2015 and a 3.1-fold increase since Q1 2015. Malicious packages installed on mobiles during the quarter total 1.5 million, 1.5 times more than Q2 2015.

Read more...

Cisco Adds to Security Everywhere

E-mail Print PDF
Cisco Adds to Security Everywhere

Cisco announces additions to the "Security Everywhere" strategy with Cloud Access Security (CAS)-- a means to provide visibility and data security to cloud-baed applications.

Also receiving enhancement are the Identity Services Engine (ISE) and Threat Awareness Service.

According to the company CAS allows organisation to address the security of unauthorised cloud applications used by applications. It increases the visibility of such "hidden" applications, detects malicious behaviour and provides security policies according to application usage and user behaviours. It also prevents the uploading of sensitive information to cloud-based services such as Dropbox and Salesforce.com, thus limiting potential data exposure breaches.

Read more...

Page 31 of 67