Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Dell PCs Hit By Security Blunder

E-mail Print PDF
Dell PCs Hit By Security Blunder

Dell resellers should urge customers to check if their devices are affected by eDellRoot, a security vulnerability found in an August 2015 Dell software update.

First noticed by programmer Joe Nord, eDellRoot is a trusted root certificate pre-installed in Dell machines. Following a bit of sleuthing Nord discovered eDellRoot is has locally stored private key-- opening a vulnerability for unscruplous hackers, since the key is stored on the computer itself, rather than kept by the issuing authority.

“The same private key was found on multiple machines, meaning that anybody that has access to it can now use it to impersonate the certificate holder [i.e. the PC owner],” Malwarebytes security researcher Jérôme Segura tells Wired. “It made matters worse that the password for that key was easily crackable.”

Read more...

Kaspersky: Mobile Malware Remains a Threat

E-mail Print PDF
Kaspersky: Mobile Malware Remains a Threat

The Kaspersky Labs IT Threat Evolution Q3 2015 Report warns of increasing mobile malware, marking out an opportunity within the security industry.

The report compiles information gathered by "millions" of Kaspersky product users in 213 countries.

According to the report Kaspersky mobile security products detected 323374 new malicious mobile programs-- a 10.8% increase over Q2 2015 and a 3.1-fold increase since Q1 2015. Malicious packages installed on mobiles during the quarter total 1.5 million, 1.5 times more than Q2 2015.

Read more...

Cisco Adds to Security Everywhere

E-mail Print PDF
Cisco Adds to Security Everywhere

Cisco announces additions to the "Security Everywhere" strategy with Cloud Access Security (CAS)-- a means to provide visibility and data security to cloud-baed applications.

Also receiving enhancement are the Identity Services Engine (ISE) and Threat Awareness Service.

According to the company CAS allows organisation to address the security of unauthorised cloud applications used by applications. It increases the visibility of such "hidden" applications, detects malicious behaviour and provides security policies according to application usage and user behaviours. It also prevents the uploading of sensitive information to cloud-based services such as Dropbox and Salesforce.com, thus limiting potential data exposure breaches.

Read more...

ENISA Sets to Focus on IoT

E-mail Print PDF
ENISA Sets to Focus on IoT

EU security agency ENISA announces plans to focus on Internet of Things (IoT) security in 2016, since an estimated €640 billion is at risk from increased hacking and cyberattacks.

According to the agency the European cyber security market is worth €20.1bn. ENISA aims to maximise this contribution by acting as "the hub for exchange of information on cybersecurity" between EU public and private sectors, as well as member states.

It will also continue research into the security of machine-to-machine communications employed within homes, workplaces and public infrastructure across the continent, and suggest standard policies and requirements pertaining to the IoT throughout the EU. IoT devices pose life-threatening risks in case of security breach, due to use in cars, drug-infusion pumps and plane navigation systems.

Read more...

Trend Micro Buys HP's TippingPoint

E-mail Print PDF
Trend Micro Buys HP's TippingPoint

Security software vendor Trend Micro acquires HP security division TippingPoint and related technology, intellectual property, employees and customer base for approximately $300 million.

The acquisition will go in the creation of a "game-changing" network defense solution combining intrusion prevention and breach detection.

“As an ideal complement to our market-leading protection for data centers and endpoints, this new next-generation network defense solution combines our best-in-class network breach detection system with proven intrusion prevention and response capabilities from TippingPoint," Trend Micro says. "Given our tenure with both HP and TippingPoint technology, we are excited about the agility of this acquisition and the value it will create for customers.”

Read more...

Page 10 of 45