Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

How to Protect Your USB Ports

E-mail Print PDF
How to Protect Your USB Ports

Customers worried about BadUSB, the malware able to maliciously reprogram USB chips? Developer Robert Fisk has a hardware solution with the USG, a "firewall for your USB ports."

BadUSB is a sinister piece of malware able to bypass the OS, antivirus software and other security measures. It can attack by hopping into PCs through the USB port, for example via USB sticks supplied by customers or colleagues. This lead to Fisk working on a hardware solution for access to untrusted USB devices, without need for a USB condom or disabling USB ports.

The USG is plug and play, and is compatible with many devices with a USB port, be it modern Windows, Mac OS and Linux machines or legacy and embedded systems. It supports mass storage (flash drives), keyboards and mice, but cannot handle hubs and only uses 12Mbps USB hardware.

Read more...

How Bad Was Cloudbleed?

E-mail Print PDF
How Bad Was Cloudbleed?

Cloudflare reveals the extend of "Cloudbleed," the bug leading to the mass leaking of encrypted browsing sessions-- it was triggered over 1 million times in the past 6 months before it was patched.

According to the post-mortem by Cloudflare CEO Matthew Prince there is "no evidence" the bug was maliciously exploited, even if it had the "potential to be much worse." In total the bug was triggered 1.2 million times from 6500 websites, and the company is still going through Google, Microsoft Bing and Yahoo search engine caches to scrub leaked data off the memory of cached sites.

“We’ve successfully removed more than 80000 unique cached pages," Prince writes. "That underestimates the total number because we’ve requested search engines purge and recrawl entire sites in some instances."

Read more...

KasperskyOS Aims to Secure IoT, Network Devices

E-mail Print PDF
KasperskyOS Aims to Secure IoT, Network Devices

Russian security vendor Kaspersky announces KasperskyOS-- a secure operating system designed for network devices, industrial control systems and the Internet of Things (IoT).

As described in a blog post by Kaspersky CEO Eugene Kaspersky, despite preconceptions the OS is not a simple Linux distribution. In fact, Kaspersky insists, "there's not a single string of Linux code in it." Instead, KasperskyOS enables a global Default Deny at the process level wrapped into a microkernel, creating "a system that does what it's instructed to and is unable to do anything else."

Read more...

Fujitsu Uses Smartphones to Secure Cloud on IoT Devices

E-mail Print PDF
Fujitsu Uses Smartphones to Secure Cloud on IoT Devices

Fujitsu announces an easier means to enable cloud services through Internet of Things (IoT) devices using the biometric authentication functionality of smartphones.

Such security comes through FIDO (Fast Identity Online), the standard bringing together a full range of technologies, including biometrics (fingerprint scanners, voice and facial recognition), Trusted Platform Modules (TPM), USB security tokens, Near Field Communication (NFC) and One Time Passwords (OTP).

As the company puts it, the technology establishes a secure network between a cloud service, IoT device and a smartphone, before simultaneously verifying the identity of the user and that of the user in front of the IoT device. Thus, one can "safely and conveniently" access cloud services through a range of IoT devices without need for an ID or password, instead simply using their smartphone's biometric authentication.

Read more...

SonicWall Threat Protection Security Covers Email

E-mail Print PDF
SonicWall Threat Protection Security Covers Email

SonicWall extends the security capabilities of the Capture Advanced Threat Protection (ATP) service with Email Security 9.0-- a cloud-based multi-engine sandbox for the inspection of email traffic.

According to the company, Email Security 9.0 not only suspects email traffic for suspicious code, but also blocks ransomware, zero-day and other malicious files from entering the network until administrator review. It integrates with the Capture ATP service and uses cloud-based sandboxing technology to detect threats before analysis in a multi-engine sandbox.

It features anti-spam, anti-virus and anti-spoofing technologies, improved support for Office 365 and an encryption services that automatically encrypts emails identified as containing protected data. Admins can also filter messages and their contents through policy and compliance management.

Read more...

Page 1 of 45

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »