Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Intel Processors Hit With Load Value Injection

E-mail Print PDF
Intel Processors Hit With Load Value Injection

The same team of researchers behind the discovery of microarchitectural attacks such as Meltdown, Spectre and Zombieload uncover yet another exploit lurking inside Intel CPUs-- Load Value Injection (LVI), a flaw allowing "reverse Meltdown" attacks.

Discovered on 4 April 2019 and reported to Intel before public disclosure on 10 March 2020, LVI turns previous data extraction attacks and defeats all existing mitigations at both software and hardware levels. According to the researchers, this makes LVI "much harder to mitigate" compared to previous attacks, and can affect just about any access to memory. Intel was involved with the disclosure, and says it affects Atom, Core and Xeon processors, as well as the newest Ice Lake (10th Gen) chips and even the upcoming Tremont Atom core.

Read more...

IDC: Firewall Demand Drives Security Appliances

E-mail Print PDF
IDC: Firewall Demand Drives Security Appliances

According to IDC, the global security appliance market sees shipment and revenue growth in Q4 2019, as revenues are up by 9.4% Y-o-Y to $4.8 billion while shipments total 1.3 million units, a 21.1% Y-o-Y increase.

The traditional firewall segment accounts for the "most significant" revenue growth, as it accounts for over $192m more in revenue in Q4 2019 than Q4 2018. Despite being the overall largest segment, unified threat management (UTM) is up 5.8% Y-o-Y and represents 57.1% of the Q4 2019 security appliance market.

Read more...

RMM Platforms Face Ransomware Threat!

E-mail Print PDF
RMM Platforms Face Ransomware Threat!

Remote monitoring and management (RMM) platforms face a growing malware threat, Asigra warns, since an "incessant" stream of malware variants is putting both MSP and end-customer applications and data at "significant" risk.

RMM software helps MSPs remotely and proactively monitor client endpoints, networks and computers. Formerly known as remote IT management, RMM requires an agent installed on client servers, hypervisors, workstations, networking devices, laptops and other mobile endpoints. In case of problems, the RMM issues tickets or alerts the MSP classified according to severity, problem type and criticality.

Such solutions are very popular among MSPs globally, and for good reason. However the use of an RMM platform with tightly integrated backup solutions creates a single access point to dozens, hundreds or even thousands of organisations. According to Asigra, since RMM platforms push out agents, ransomware can potentially push out malicious code to each MSP client while neutering the backups.

Read more...

Nok Nok Authentication for IoT Devices

E-mail Print PDF
Nok Nok Authentication for IoT Devices

Authentication specialist Nok Nok Labs announces the Nok Nok IoT SDK bringing multi-factor authentication to both standard IoT devices and IoT devices connected to a cloud service via Nok Nok S3 Authentication Suite.

According to the company, the IoT SK enables flexible, easy-to-use and secure user-to-device authentication leveraging the Nok Nok history of passwordless customer authentication across mobile apps, mobile web, desktop web and smartwatches. It runs easily on existing microcontroller units, and meets security industry standards and global regulatory requirements for "no (shared) default passwords." It supports both standalone and cloud-connected devices, with two-factor authentication and support for all biometric modalities.

Read more...

RocketCyber Monitors Office 365

E-mail Print PDF
RocketCyber Monitors Office 365

RocketCyber announces a trio of security apps to help MSPs monitor threats targeting Office 365 and Azure Active Directory (AD), marking a first foray beyond endpoint protection for the company.

As the company puts it, moving infrastructure and applications to the cloud brings cost savings, convenience and performance to SMBs. However, such adoption often comes without oversight and security controls, introducing risk for intrusions, breaches and regulatory violations. The RocketCyber security apps provide MSPs and SOCs with a multi-tenant single pane of glass to manage all customers, with complete threat visibility targeting Office 365 and Azure AD.

Read more...

Page 3 of 67