Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

TeslaCrypt Creators Give Up Malware Master Key

E-mail Print PDF
TeslaCrypt Creators Give Up Malware Master Key

Security firm ESET has good news for victims of TeslaCrypt-- the creators of the ransomware have given up the master key required to decrypt files infected by the malware.

TeslaCrypt first appeared in early 2015, and gained infamy by targeting game-related content such as save files and custom maps as well as the more traditional documents and pictures. In total it affects 185 different file extensions, and it reportedly earned its creators $76522 in less than two months.

However, the operators behind TeslaCrypt claim to have closed the ransomware project, and in what seems to be an act of repentance the group provided an ESET researcher with a universal decryption key.

Read more...

The Untangle Firewall Appliance for the Small Office

E-mail Print PDF
The Untangle Firewall Appliance for the Small Office

Security vendor Untangle presents the u25 and u25w-- a pair of firewall appliances designed for home or small offices the company describes as "the smallest footprint of any network security appliance in the market."

The u25 is the wired model, while the u25w is the wireless option. Both promise quiet desktop operation, and feature an HDMI port, x3 gigabit ethernet ports and x2 USB ports to provide all required network security features.

Protection comes through unified threat management (UTM) complete with the latest Untangle NG Firewall release (v 1.2), and customers can manage internet traffic by application, website, port and protocol on a per-use or per-group basis. VPN capability provides seamless connectivity to corporate networks, while a captive portal is included with the wifi model.

Read more...

Gartner: IoT Brings Need for Security

E-mail Print PDF
Gartner: IoT Brings Need for Security

According to Gartner, 2016 global spending on Internet of Things (IoT) security is to reach $348 million-- a 23.7% increase over 2015 of $251.5m and a figure set to reach $547m by 2018.

Overall IoT security spending is set to be initially "moderate," but it should increase at a faster rate come 2020 thanks to a combination of improved skills, organisational change and more scalable service options improve execution.

"The market for IoT security products is currently small but it is growing as both consumers and businesses start using connected devices in ever greater numbers," the analyst remarks. "Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30% from 2015, and will reach 11.4bn by 2018. However, considerable variation exists among different industry sectors as a result of different levels of prioritisation and security awareness."

Read more...

Apple Ends Support for QuickTime for Windows

E-mail Print PDF
Apple Ends Support for QuickTime for Windows

Both Apple and Trend Micro warn customers to uninstall QuickTime from Windows PCs--  Apple has stopped updating the video player, one Trend Micro says carries not one but two critical vulnerabilities.

Since there will be no more QuickTime for Windows updates the two vulnerabilities will never be patched out. Trend Micro says no attacks exploit the vulnerabilities as yet, but it is preferable to be safe and take preemptive action.

According to the security company, taking advantage of the vulnerabilities "requires a user to visit a malicious web page or open a malicious file to exploit them.” As such, one must also be aware of potential phishing attempts.

Read more...

Cisco Warns Against "Cryptoworms"

E-mail Print PDF
Cisco Warns Against

Hackers are taking inspiration from the past in the creation of the ransomware of the future, Cisco Talos warns. And the result is "cryptoworms," ransomware with self-propagation features inspired by worms from the 90s and early 2000s.

"Ransomware as we know it today has a sort of ‘spray and pray’ mentality-- they hit as many individual targets as they can as quickly as possible. Typically, payloads are delivered via exploit kits or mass phishing campaigns," the security division says. "Recently a number of scattered ransomware campaigns deliberately targeting enterprise networks, have come to light. We believe that this is a harbinger of what’s to come-- a portent for the future of ransomware."

Read more...

Page 8 of 47