Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Cisco: IoT Devices Pose Security Risk

E-mail Print PDF
Cisco: IoT Devices Pose Security Risk

The connected devices making the Internet of Things (IoT) might bring more convenience, but Cisco points out major concerns with the technology-- security is not a priority among the vendors of such devices.

According to the company smart devices might make a weakest link potential hackers can exploit in order to attack home or organisation networks. Making matters worse is patching such vulnerabilities can be a complicated task, especially for non-technically savvy average user or situations where many connected devices are in use.

Cisco points out a particular vulnerable device-- the Trane ComfortLink II thermostat. Back in April 2014 Cisco's Talos security unit alerted Trane to three vulnerabilities providing a backdoor for hackers to not only gain control of the thermostat but also access networks and launch local or at-large attacks.

Read more...

NTT Com: Most Organisations Fear Information Security Breaches

E-mail Print PDF
NTT Com: Most Organisations Fear Information Security Breaches

According to the NTT Com Security Risk:Value report 65% of business decision makers fear their organisation will suffer an information security breach some time in the future-- one with recovery costs starting from around $1 million.

The report surveys 1000 non-IT business decision makers in organisations in the UK, US, Germany, France Sweden, Norway and Sweden. It shows 54% of decision makers believe information security is "vital," while 18% say poor information poses the "single greatest risk." As for recovery, the respondents say the process requires 9 weeks and an average price of $907053 without counting reputational damage, brand erosion or lost business.

Read more...

Fujitsu AI Fights Targeted Email Attacks

E-mail Print PDF
Fujitsu AI Fights Targeted Email Attacks

Fujitsu announces what it claims is a first technology to identify users vulnerable to targeted online attacks, allowing for security measures tailored to individuals and organisations.

According to the company human error remains the weakest point in any security system, and as a result many cyber attacks and data breaches start when a user clicks a malicious link in a fake email. To fight against such a situation Fujitsu uses online questionnaires to identify the relationship between the psychological traits and behaviour of people likely to suffer virus infections, scams and data leakage.

Read more...

Trend Micro Hit By "Ridiculous" Flaw

E-mail Print PDF
Trend Micro Hit By

Security researchers at Google Project Zero warn of a dangerous flaw in the popular Trend Micro Antivirus security software opening a backdoor for PC hijacking, malware infection and password robbery.

According to the researchers, the flaw allows any website to run commands directly on PCs running Trend Micro software. Such commands including wiping the computer, downloading and installing malware and uninstalling Trend Micro antivirus. Posing the worst risk is the Password Manager component, since the application of a malicious script can steal all password stored on the browser, including encrypted ones.

"I don't even know what to say-- how could you enable this thing *by default* on all your customer machines without getting an audit from a competent security consultant?" researcher Tavis Ormandy writes in the Google Security Research blog. "You need to come up with a plan for fixing this right now. Frankly, it also looks like you're exposing all the stored passwords to the internet, but let's worry about that screw up after you get the remote code execution under control."

Read more...

Data Security: Top Tips For Senior Managers

E-mail Print PDF
Data Security:   Top Tips  For Senior Managers

by Ian Kilpatrick, Chairman, Wick Hill Group

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved in data security and offers his top tips

The networking environment has changed radically in recent times. In today?s world of increasing wireless use, widespread BYOD, more home working, more remote access, more consumer devices and the huge popularity of social media, the network is becoming ever more distributed. In this situation, security breaches are inevitable, as is evidenced by the regular Read more...

Page 10 of 47