Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Dahua Adds Video-Wall Controller

E-mail Print PDF
Dahua Adds Video-Wall Controller

Dahua introduces a new model of video-wall controller DH-M30 combining video-wall control function and decoding

DH-M30 allows various video sources to be distributed and displayed on the video wall in a flexible way. Video sources include local input signals, such as CVBS, VGA, DVI, HDMI, HD-SDI and etc. along with mainstream network signals, including IPC, DVR, NVR and etc

The key difference from other image controllers on the market is its decoding function, which makes the whole system even more connected and integrated. The device is up to max 13-ch@1080p decoding. Read more...

Synology Surveillance Station 6.1

E-mail Print PDF
Synology Surveillance Station 6.1

Surveillance Station is Synology's fully-integrated network video recording (NVR) solution. And the newest version, 6.1, introduces numerous additions and enhancements that make Surveillance Station a more robust NVR, and combines storage solutions.

Edge recording and center management are powerful tools to help mitigate bandwidth concerns, and maximize the storage of remote cameras. With edge recording, primary data storage is kept where cameras are located. Center management keeps camera control at a single location, and helps to minimize unnecessary footage transmission.

Surveillance Station 6.1 introduces the Synology Web Object, allowing Windows browsers (Chrome, Firefox, and Internet Explorer) to function without Java. It Integrates with Windows Active Directory and LDAP for improved control over permissions. Read more...

The Top Threats of 2013 According to ENISA

E-mail Print PDF
The Top Threats of 2013 According to ENISA

EU cyber security agency ENISA releases its Threat Landscape 2013 report, an annual analysis of over 200 reports and articles with the aim to find the top security threats, adversaries and trends of the year.

"This threat analysis presents indispensable information for the cyber security community regarding the top threats in cyber-space, the trends, and how adversaries are setting up their attacks by using these threats," ENISA executive director Prof. Udo Helmbrecht says.

According to the report threat agents have become even more sophisticated in attacks and tools, while attack patterns and tools targeting PCs have now migrated to the mobile ecosystem as Big Data and the Internet of Things emerge as the digital battlefields of the (near) future.

ENISA believes cyber activities are not a matter for a handful of nation states anymore-- multiple states now have the capacity to infiltrate governmental and private targets.

Read more...

The Ultrasonic-Based Malware

E-mail Print PDF
The Ultrasonic-Based Malware

Researchers at the Fraunhofer FKIE develop a malware prototype able communicate using inaudible audio signals-- allowing it to exchange data even between infected machines lacking a network connection. 

Based on technology originally designed for underwater communications, the use of ultrasonic frequencies (or "covert acoustical communication") allows the penetration of "air gaps" sealing computers from the outside world. 

The malware uses built-in microphones and standard speakers to transmit small amounts of data from distances of nearly 20m at up to 20 bits per second-- a distance it can enlarge by creating an "acoustic mesh network" out of infected devices repeating the audio signals. 

Applications the researchers suggest for such technology include an acoustical multi-hop keylogger and connecting to and tunneling over the internet. As for countermeasures, switching off audio input and output devices would do the trick, as well as the implementation of audio filtering solutions able to block the high-frequencies ranges covert data transmissions use. Read more...

Akamai: DDoS Attacks on the Rise

E-mail Print PDF
Akamai: DDoS Attacks on the Rise

Distributed Denial-of-Service (DDoS) attacks are on the rise cloud hosting vendor Akamai reports-- Q2 2013 attacks on the company's customers grow by 54% Q-o-Q to 318, up from the 208 reported on Q1 2013. 

Enterprise is the leading target of such attacks with 134 reports, followed by Commerce (91), Media & Entertainment (53), High Tech (23) and Public Sector (17). 

According Akamai DDoS traffic is also becoming increasingly difficult to track, forcing the company to rely on customer reports to differentiate between legitimate and malicious traffic. 

"Adversaries conducting DDoS attacks spend increasing effort to make their attacks look more and more like legitimate "flash mobs" in an effort to elude automated defenses; this creates an ever-escalating arms race to automate the manual analysis that often goes into assessing whether an event was an attack or legitimate traffic due to an unplanned event," the Akamai Q2 2013 State of the Internet Report states.  Read more...

Page 45 of 67