Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

SPOILER: A Vulnerability in ALL Intel Core CPUs!

E-mail Print PDF
SPOILER: A Vulnerability in ALL Intel Core CPUs!

Researchers at the Worceseter Polytechnic Institute, Masschusetts, USA and the University of Lübeck, Germany warn of a new speculative execution security flaw present in modern Intel Core processors.

Dubbed "SPOILER" (or "Speculative Load Hazards Boost Rowhammer and Cache Attacks"), the flaw potentially allows attackers to extract passwords, keys and other data from memory using malicious JavaScript in a web browser. As such it is reminiscent of the Spectre vulnerabilities discovered earlier last year, although the researchers say the SPOILER flaw comes from a different hardware unit, the Memory Order Buffer.

Read more...

Symantec Adds Partners to Integrated Cyber Defense Platform

E-mail Print PDF
Symantec Adds Partners to Integrated Cyber Defense Platform

Symantec announces the addition of over 120 companies to the Integrated Cyber Defense (ICD) platform, including big names such as AWS, Box, IBM Security, Microsoft, Oracle, Service Now and Splunk.

As Symantec puts it, such an industry collaboration reflects a "platform shift" in the security industry, as more enterprise customers are looking to consolidate vendors and adopt more integrated platforms backed by an open ecosystem. The company adds "important innovations" will make the shift even easier, including a universal data exchange, shared management capabilities and upgraded data loss prevention software helping customers stop untrusted apps before they compromise confidential data.

Read more...

K2 Cyber Security Determines Threat Detection

E-mail Print PDF
K2 Cyber Security Determines Threat Detection

K2 Cyber Security emerges from stealth mode to present what it describes as the first deterministic approach for protecting hybrid clouds against sophisticated attacks-- a technology dubbed Optimised Control Flow Integrity (CFI).

As K2 puts it, CFI ensures an application executes only as designed, enabling real-time attack detection with no false positives, regardless of application patch status. The company adds dynamic, workload identity-based micro-segmentation prevents the lateral movement of threats. The technology finds use in two modules making the K2 security platform, Prevent and Segment.

Read more...

Container Vulnerability Allows Access to Host OS!

E-mail Print PDF
Container Vulnerability Allows Access to Host OS!

Researchers warn of a serious vulnerability in container technology-- one possibly allowing attackers to enable malicious containers to escape the confines of the isolated process segment, gaining access to the host operating system in the process.

"The vulnerability allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host," SUSE senior engineer Aleksa Sarai writes in an advisory.

Dubbed CVE-2019-5736, the vulnerability involves runc, the open source command line utility designed to spawn and run containers. It is used as the default runtime for containers with Docker, containerd, Podman and CRI-O. The running container application is supposed to be isolated from the underlying operating system, but the vulnerability allows access to the underlying operating system, putting all containers running on the host (and the host itself) at risk.

Read more...

Dell Boosts Endpoint Security With Secureworks, CrowdStrikes

E-mail Print PDF
Dell Boosts Endpoint Security With Secureworks, CrowdStrikes

Dell brings together the management security, incident response expertise and threat behavioural analytics of Secureworks with the CrowdStrike unified endpoint protection platform in a next-gen endpoint security solution portfolio, SafeGuard and Response.

As the company puts it, the approach is designed to prevent, detect and respond to the shofting threat landscape, making it easy for organisation to protect data with the most secure commercial PCs. CrowdStrike endpoint security solutions promise to prevent over 99% of malware and non-malware-based threats, detect 100% of vulnerabilities and respond to threats rapidly, while Secureworks RedCloak behavioural analytics are built into the prevention, detection and response capabilities.

Read more...

Page 10 of 67