Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Cisco Buys Observable Networks

E-mail Print PDF
Cisco Buys Observable Networks

Cisco buys more security capabilities with Observable Networks, a startup offering network-security-as-a-service technology with a focus on cloud deployments.

Observable Networks technology is based on dynamic behavioural modeling of all devices on the network. It provides real-time situational awareness of all users, devices and traffic on the network, whether in the datacentre or the cloud, with cloud-native machine learning techniques promising faster and more accurate identification of insider and external threats.

Read more...

Symantec Gets Browser Isolation With Fireglass

E-mail Print PDF
Symantec Gets Browser Isolation With Fireglass

Symantec acquires Fireglass, Israeli vendor of browser isolation technology able to protect against ransomware, malware and phishing threats. Financial details of the deal are not available.

The core Fireglass offering is a browser isolation platform allowing users to browse the web in a highly secure way. Organisations can isolate uncategorised websites, unknown links and email attachments, reducing attack surface significantly. The solution is delivered either on-premises, as a cloud services or in a hybrid model, and promises a "transparent and worry-free end user experience."

Read more...

Petya Ransomware Spreads Across Europe

E-mail Print PDF
Petya Ransomware Spreads Across Europe

A malware spectre is haunting Europe-- a strain of the malicious code dubbed Petya, first seen encrypting computers in Ukraine before spreading to Spain, Germany, the UK, the Netherlands, Israel and the US.

Also known as NotPetya, Petwrap or ExPetr, the malware has affected governments and industries, including shipping firms, airports, banks, a petroleum giant and even the radiation monitoring system at the Chernobyl nuclear reactor. According to Kaspersky, 50% of the malware's targets are industrial in nature, making it extremely dangerous since it can paralyse automation/control systems.

“[T]his malware campaign was not designed as a ransomware attack for financial gain,” a Kaspersky Labs blog analysis reads. “Instead, it appears it was designed as a wiper pretending to be ransomware.”

Lending support to this theory is the fact the malware generated just 3.99 BTC-- around $10300.

Read more...

Dark Web Hosts New Mac Malware

E-mail Print PDF
Dark Web Hosts New Mac Malware

Security news site Bleeping Computer discovers a pair of Mac malware strains on the Dark Web-- a piece of spyware dubbed MacSpy and MacRansom, an example of Mac ransomware.

The two pieces of malware are the work of the same developer (or cybercriminal group), and are found on almost identical Dark Web portals. Both websites run on a "closed" manner, meaning interested parties have to contact the malware creator for demo packages and the price negotiations.

Following the initial Bleeping Computer report, security researchers at Fortinet and AlienVault managed to get samples of the Mac malware. The two companies believe MacSpy and MacRansom are the work of an inexperienced coder, since MacRansom is not a digitally signed file (meaning it triggers security alerts if executed as a standard macOS installation) and MacSpy is built from code copy-pasted from Stack Overflow.

Read more...

Armis Aims at IoT Security

E-mail Print PDF
Armis Aims at IoT Security

Startup Armis emerges from stealth mode with a product aimed at the Internet of Things (IoT)-- an agentless IoT security platform allowing enterprises to see and control all devices and networks accessing their systems.

Founded in 2015 by CEO Yevgeny Dibrov and CTO Nadir Izrael, Armis technology runs on-premises and the cloud as either a physical or virtual appliance. In turn, the appliance connects to the Armis cloud platform to analyse the traffic passing through the network. A layered approach supports an extensive array of infrastructure, and it does not need to be installed everywhere on a network.

Read more...

Page 1 of 48

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »