Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Gartner On the WannaCry Ransomware

E-mail Print PDF
Gartner On the WannaCry Ransomware

As the WannaCry ransomware continues to spread across the world--  according to European authorities it hit over 10000 organisations and 200000 individuals in 150 countries-- Gartner suggests 3 steps security professionals must take immediately.

Before everything else, one must apply the MS1170-101 patch. If it is not installed, and TCP port 445 is open, the system will be attacked by ransomware. Following that, here are Gartner's three steps to prevent further attacks of this nature:

Stop blaming-- While pointing fingers at others might be easy, one of the key stages of incident response is to focus on the root cause. In the case of WannaCry it is Windows XP. The OS can be embedded in key system as part of control packages, meaning vulnerable firmware may neither be accessible nor under one's control. As such, one must demand upgrades from the vendors of embedded systems (such as point-of-sale terminals, medical imaging equipment, telecom systems, and even industrial output systems such as smart card personalisation and document production equipment), even if such devices use other embedded OSs such as Linux or Unix variants. After all, it is safe to assume all complex software is vulnerable to malware.

Read more...

Jan van Vliet Joins Digital Guardian for EMEA Expansion

E-mail Print PDF
Jan van Vliet Joins Digital Guardian for EMEA Expansion

Data protection platform Digital Guardian hires ex-Intel Security exec Jan van Vliet as EMEA VP and general manager as part of an expansion effort into the region.

A security industry veteran, van Vliet spent the last 9 years at Intel Security (formerly McAfee), most recently as VP of EMEA emerging markets. Prior to that he was EMEA boss of data encryption vendor SafeBoot, and joined McAfee when his company was bought in 2007.

Read more...

Dok: The First MacOS Malware

E-mail Print PDF
Dok: The First MacOS Malware

Researchers at Check Point reveal what they believe is the first example of malware targeted at Macs-- Dok, a piece of software spreading across MacOS machines through an email phishing campaign.

The malware affects all versions of OSX and, distressingly enough, is signed with a valid developer certificate. Even worse it targets mainly European users, with phishing messages claiming supposed tax return inconsistencies found in Germany. A .zip archive dubbed Dokument.zip contains the malware, which bears the name Truesteer.AppStore.

Read more...

Cloudflare Sets to Protect the IoT

E-mail Print PDF
Cloudflare Sets to Protect the IoT

Cloudflare plans to extend security to the Internet of Things (IoT) with Orbit-- a service allowing IoT vendors to protect devices from attacks and deploy patches more quickly.

As the company puts it, more IoT devices are becoming victims in DDoS attacks. For instance, one can recall the Mirai botnet hijacking webcams earlier least year. This points out a need for a service similar to the Cloudflare delivery network, only for the various connected devices making the IoT.

Orbit sits one layer before the device and acts as a security shield, protecting against exploits even if the device runs on an outdated software. Manufacturers can force devices to connect solely through the Cloudflare network, and in turn Cloudflare blocks exploits or prompts device owners for further authentication of attacks are suspected. Read more...

Kaspersky: Stuxnet-Related Bug Allows for Attacks!

E-mail Print PDF
Kaspersky: Stuxnet-Related Bug Allows for Attacks!

According to Kaspersky exploits remain a serious security threat-- an old vulnerability related to the Stuxnet worm still poses as an open door for hackers targeting Windows computers.

Known as CVE-2010-2568, the flaw was initially patched out back in 2010, but Kaspersky says it is still one of the most widespread software exploits. Used by the Stuxnet worm to remotely execute code without user knowledge, between 2015 and 2016 it was used to target around 25% of Kaspersky users who encountered an exploit.

The vulnerability only affects Windows XP, Windows Server 2008 and Windows 7 systems, but hackers are on the hunt for susceptible systems through malware able to self-replicate over a network and remain in affected computers.

Other pieces of out-of-date software carry similar vulnerabilities, including Microsoft Office, Android and Java.

Read more...

Page 21 of 67