Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Cisco Warns Against "Cryptoworms"

E-mail Print PDF
Cisco Warns Against

Hackers are taking inspiration from the past in the creation of the ransomware of the future, Cisco Talos warns. And the result is "cryptoworms," ransomware with self-propagation features inspired by worms from the 90s and early 2000s.

"Ransomware as we know it today has a sort of ‘spray and pray’ mentality-- they hit as many individual targets as they can as quickly as possible. Typically, payloads are delivered via exploit kits or mass phishing campaigns," the security division says. "Recently a number of scattered ransomware campaigns deliberately targeting enterprise networks, have come to light. We believe that this is a harbinger of what’s to come-- a portent for the future of ransomware."

Read more...

EU Parliament Approves Data Protection Update

E-mail Print PDF
EU Parliament Approves Data Protection Update

The EU Parliament Committee on Civil Liberties, Justice and Home Affairs gives the final seal of approval to the General Data Protection Regulation (GDPR), making it official EU law applying to all EU countries from 2018.

As a result, enterprises have little more than 2 years-- the deadline is 4 May 2018-- in order to be GDPR compliant. Companies based outside the EU also need to be compliant to the regulations if they want to do business within the Union.

An update of EU data protection laws was a long time coming. The result of 4 years of work, the GDPR replaces the pan-European regulation put in place back in 1995. It is influenced by both technological advances and the revelations brought about by Edward Snowden, and introduces new accountability obligations, stronger rights and restrictions on international data flows. Failure to adhere to regulations can bring about penalties worth either €20 million or 4% of overall annual turnover, whichever is the greater.

Read more...

ABI: Vulnerability Management Demand to Increase

E-mail Print PDF
ABI: Vulnerability Management Demand to Increase

According to ABI Research the global threat and vulnerability management (VM) market is set to increase from 2015 revenues of $5.8 billion to $8.6bn in 2020 due to "nefarious" attacks driving growth.

Key threat and VM market drivers are the cloud and big data. The analyst points out vulnerability assessment (VA) as a key component of a VM program, and as such the VA market is forecast to reach revenues of $1.4bn in 2016 before growing to $2.1bn by 2020.

“There is increasing market demand for vulnerability management solutions, like the IBM QRadar Security Intelligence Platform, Barracuda Vulnerability Manager, AlienVault Unified Security Management solution and Rapid7 Nexpose 6.0,” ABI says. “The ideal VM solution is one that integrates well with 3rd-party technologies and includes capabilities for asset management, configuration management, patch management, VA, remediation, reporting and monitoring.”

Read more...

IDC: Security Appliances Bring "Huge Revenues"

E-mail Print PDF
IDC: Security Appliances Bring

The global security appliance market had a bumper 2015, IDC reports-- annual revenues total $10.6 billion, a 9.9% increase, while shipments reach a record high of 2.33 million units with 8.1% growth.

EMEA accounts for 26% of WW 2015 revenues with an annual increase of 2.9% compared to 2014.

The last quarter of the year was also positive-- global revenues are worth $2.95bn (a 9.3% Y-o-Y increase) and shipments are up by 6.2% Y-o-Y to 635281 units. \

Read more...

Macs Hit By First Ransomware

E-mail Print PDF
Macs Hit By First Ransomware

The typically secure Mac platform has been hit by a ransomware-- version 2.90 of the Transmission BitTorrent client is actually infected with malware, and poses nasty consequences to users.

According to Palo Alto Networks security researchers this is the first functioning example of such malware (specifically "KeRanger") to attack OS X. Thankfully the Transmission developers quickly realised the situation, and users are urged to use the Activity Monitor to delete KeRanger and related processes.

In addition, Apple has already revoked a "a digital certificate from a legitimate Apple developer that enabled the rogue software to install on Macs."

Read more...

Page 8 of 46