Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

News

February 28, 2019
Symantec has announced Email Fraud Protection, an automated solution that helps organizations block fraudulent emails from reaching enterprises and protecting brand reputation and sender trust. The idea is to substantially reduce workloads for IT departments and eliminate the need to manually manage email security configurations while fighting so-called Business Email Compromise (BEC) attacks.
 
0 comments | 161 views
January 26, 2019
Internal security tests at networking colossus Cisco have revealed a vulnerability in the vContainer component of the company's SD-WAN Solution package. Dubbed CVE-2019-1651 on MITRE's Common Vulnerabilities and Exposures (CVE) list, it "could allow an authenticated, remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user."
 
0 comments | 195 views
December 20, 2018
Tap-proof internet communication is an urgent need worldwide. One possible way to enable it is to further develop quantum cryptography. A team of scientists from the University of Vienna has now overcome a decisive hurdle.
 
0 comments | 265 views
November 30, 2018
When Tolkien's "Fellowship of the Ring" disbanded, its members set off towards the Grey Havens to board a ship that would take them way out west, to the so-called Blessed Realm where they would live on forever unforgotten. After fighting declining public and exhibitor interest with a string of ever-changing concepts for most of the past decade, Europe's big ICT expo – once a more-than-solid contender for Las Vegas's CES and Taipei's Computex – may not be remembered quite as fondly. Still, now that its operator Deutsche Messe AG has called off future shows at the Hanover fairground, many on the Old Continent may sense a faint glimmer of nostalgia.
 
0 comments | 647 views
November 21, 2018
Its ongoing proliferation notwithstanding, Windows 10 has often been criticized for its combination of software-as-a-service delivery model, relatively casual built-in privacy protections, and lack of preparedness to provide users with meaningful controls. The warnings prompted several authorities – among them Germany's Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik or BSI) – to take a closer look at the alleged issues. Yesterday, the researchers published part 1 of their findings.
 
0 comments | 362 views
October 11, 2018
Redmond's engineers seem to have localized the root cause for the flaw reported over the weekend: The problem has affected users who had enabled a feature known as "Known Folder Redirection" (KFR) in such a way that some files were retained in the original "old" folder location.
 
0 comments | 436 views
October 09, 2018
The most recent release of its desktop OS, dubbed version 1809, is causing the company substantial headache: After its rollout to users on October 2 – which allegedly took place even though the build had not undergone review from registered Windows Insiders – numerous users complained that they lost a bunch of files during the update process.
 
0 comments | 484 views
October 06, 2018
The San Jose-based networking giant kicked off the new month with a slew of repair suggestions covering all types of products, from ASA Software right through to various installments of Webex Center. According to the company's advisories, three fixes are rated as absolutely critical, while another ten are believed to be highly important; the remaining 26 get a medium rating. All fixes were published between Wednesday and Friday last week (October 3 through October 5).
 
0 comments | 353 views
September 25, 2018
Along with ransomware, DDoS attacks are the equivalent of a medieval plague for today's data-and-network-dependent companies. And needless to say, they're all looking for protection against strikes that will not only reliably crash their sites and cause immediate financial loss, but – if occurring repeatedly – can also bludgeon their reputation and drive away customers over the medium term. But which service providers are powerful and trustworthy enough to shield their customers' networks and still stick with European data protection and privacy rules? Two new papers from Germany's Federal Office for Information Security (BSI) aim to help CIOs and their teams find the right partners.
 
0 comments | 277 views
September 23, 2018
Researchers working for Trend Micro's Zero Day Initiative (ZDI) have detected a security hole in Microsoft's Joint Engine Technology (JET) Database Engine that could enable attackers to execute arbitrary code on vulnerable Windows installations. Because there is no patch available yet, the researchers caution JET Engine users not to open files from unknown or untrusted sources.
 
0 comments | 468 views
September 21, 2018
Wouldn't it be just fantastic if users could log into any web portal, mail account and myriad other services without ever having to remember one of those pesky passwords again? Yup it would be, the W3C Consortium decided at some point in 2015, and started working on the Web Authentication (WebAuthn) standard, in collaboration with the FIDO Alliance and various browser makers. Following unusually fast progress, the first Candidate Recommendation was published in March this year. Not much later, both Google and Mozilla incorporated the fresh standard and API into the then-current versions of their Chrome and Firefox browsers – yet another quick decision, but one that may now backfire.
 
0 comments | 262 views
August 31, 2018
Online trackers not only invade one's privacy, they also have a negative impact on the overall 'web experience': A study by browser extension maker Ghostery, published last May, revealed that trackers can massively cut into page load speeds – on a truly overburdened page, the rendering process may eat up more than one minute. Whether at home, at the office or on the go, this can seriously compromise the performance of knowledge workers. Plus, in the age of (mobile) broadband, it seems outright ridiculous.
 
0 comments | 551 views
August 27, 2018
Whether it's industry robots, power grids, drones or autonomous vehicles – so-called 'critical' systems and infrastructures play an increasingly important role in economies and societies around the globe. Against this backdrop, it's only logical that numerous hard- and software vendors have stepped up their efforts to develop tamper-resistant building blocks in order to increase the safety of these systems and infrastructures. Among the latest endeavors in this area is the Intel® Safety Critical Project for Linux* OS, which was introduced last Sunday and will be presented to a wider audience at the Open Source Summit in Vancouver later this week.
 
0 comments | 322 views
August 09, 2018
While IT experts frequently wrestle over numerous issues, there's also a lot of topics they easily agree on. One of these is that once disaster strikes, organizations of all types and sizes can't afford to stay offline for even an hour or two, or worse, lose business- and mission-critical data during a sudden outage. Small businesses in particular are vulnerable to the resulting repercussions: According to Gartner, 70% of small firms that experience major data losses have to close up shop within the next 12 months.
 
0 comments | 519 views
July 30, 2018
California-based security and data protection specialist Malwarebytes has released the beta version of a prospective browser add-on that's supposed to shield non-IE/non-Edge users from malicious and other unwanted web content.
 
0 comments | 556 views
July 18, 2018
Once per quarter, there's an event that administrators tasked with managing Oracle software do not look forward to, and that's the day when the company's so-called Critical Patch Update is released. The reason for such nervousness is easy to detect: Because of their specific release cycle, these updates typically address hundreds of vulnerabilities at once – a situation that's usually exacerbated by the fact that these flaws are dispersed across dozens of software products. However, even by Oracle's standards this month's package of 334 security fixes is likely a record breaker.
 
0 comments | 364 views
June 29, 2018
Wireless networks have long been a popular target for criminal hackers of all skill and sophistication levels, especially if they still use the outdated WEP and WPA security protocols. Last fall, researchers found that even the more mature WPA2 was susceptible to offline key reinstallation (KRACK) attacks. Consequently, the Wi-Fi Alliance – the industry association that defines and maintains standards for wireless networking – is now pushing for the implementation of new protective features for enterprise and personal installations.
 
0 comments | 467 views
June 26, 2018
The Internet Engineering Task Force (IETF) has announced plans to retire old editions of the Transport Layer Security Protocol (TLS) as soon as possible.
 
0 comments | 379 views
June 19, 2018
Cisco's security division Talos has published additional information regarding the modular router malware VPNFilter that first made headlines at the end of May.
 
0 comments | 384 views
May 25, 2018
The networking hardware giant's security division has identified a particularly nasty bit of modular malware that infiltrates routers and NAS systems, especially those deployed in SOHO environments.
 
0 comments | 765 views
 
Page 1/3    1   2   3