Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels


eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size


Dark Web Hosts New Mac Malware

E-mail Print PDF
Dark Web Hosts New Mac Malware

Security news site Bleeping Computer discovers a pair of Mac malware strains on the Dark Web-- a piece of spyware dubbed MacSpy and MacRansom, an example of Mac ransomware.

The two pieces of malware are the work of the same developer (or cybercriminal group), and are found on almost identical Dark Web portals. Both websites run on a "closed" manner, meaning interested parties have to contact the malware creator for demo packages and the price negotiations.

Following the initial Bleeping Computer report, security researchers at Fortinet and AlienVault managed to get samples of the Mac malware. The two companies believe MacSpy and MacRansom are the work of an inexperienced coder, since MacRansom is not a digitally signed file (meaning it triggers security alerts if executed as a standard macOS installation) and MacSpy is built from code copy-pasted from Stack Overflow.


Armis Aims at IoT Security

E-mail Print PDF
Armis Aims at IoT Security

Startup Armis emerges from stealth mode with a product aimed at the Internet of Things (IoT)-- an agentless IoT security platform allowing enterprises to see and control all devices and networks accessing their systems.

Founded in 2015 by CEO Yevgeny Dibrov and CTO Nadir Izrael, Armis technology runs on-premises and the cloud as either a physical or virtual appliance. In turn, the appliance connects to the Armis cloud platform to analyse the traffic passing through the network. A layered approach supports an extensive array of infrastructure, and it does not need to be installed everywhere on a network.


Splunk: Security Teams "Overwhelmed" by Attacks

E-mail Print PDF
Splunk: Security Teams

An IDC survey sponsored by operational intelligence platform provider Splunk reveals organisations are "constantly under attack," so much so they often fail to "effectively protect themselves."

The survey involves 600 senior security professionals across Germany, France, Sweden, the Netherlands, the UK and the US. It shows 47% of security teams gather enough information about incidents to enable appropriate or decisive action, but only 27% think they are coping comfortably with the workload, which consists of an average of 40 actionable incidents per week (with the number rising to 77 for finance and 124 for telco).

Around one third (33%) describe themselves as "struggling" or "constantly firefighting," while 53% of respondents claim the biggest limitation to improving security is resourced tied up on routine operations and incident investigation. As for the frequency of attacks, 62% of firms are attacked "at least" weekly, 30% suffer daily attacks and 10% hourly or "continuously." In addition, 45% face a rise in security threats.


Cisco and IBM Join Security Forces

E-mail Print PDF
Cisco and IBM Join Security Forces

The "growing threat of cybercrime" leads to Cisco and IBM Security joining forces, with a collaboration across products, services and threat intelligence.

The team up has Cisco integrate IBM QRader in its securutiy solutions, protecting organisations across networks, endpoints and the cloud. Customers will also benefit from the scale of IBM Global Services support of Cisco products in their Managed Security Service Provider (MSSP) offerings.

Meanwhile the IBM X-Force and Cisco Talos security research teams will collaborate on threat intelligence research and coordinate on cybersecurity incidents. Thus, the IBM Resilient Incident Response Platform (IRP) will integrate with the Cisco Threat Grid to provide insights needed for faster threat response.


Gartner On the WannaCry Ransomware

E-mail Print PDF
Gartner On the WannaCry Ransomware

As the WannaCry ransomware continues to spread across the world--  according to European authorities it hit over 10000 organisations and 200000 individuals in 150 countries-- Gartner suggests 3 steps security professionals must take immediately.

Before everything else, one must apply the MS1170-101 patch. If it is not installed, and TCP port 445 is open, the system will be attacked by ransomware. Following that, here are Gartner's three steps to prevent further attacks of this nature:

Stop blaming-- While pointing fingers at others might be easy, one of the key stages of incident response is to focus on the root cause. In the case of WannaCry it is Windows XP. The OS can be embedded in key system as part of control packages, meaning vulnerable firmware may neither be accessible nor under one's control. As such, one must demand upgrades from the vendors of embedded systems (such as point-of-sale terminals, medical imaging equipment, telecom systems, and even industrial output systems such as smart card personalisation and document production equipment), even if such devices use other embedded OSs such as Linux or Unix variants. After all, it is safe to assume all complex software is vulnerable to malware.


Page 1 of 48

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »