Not logged in » Login

News

July 30, 2018
California-based security and data protection specialist Malwarebytes has released the beta version of a prospective browser add-on that's supposed to shield non-IE/non-Edge users from malicious and other unwanted web content.
 
0 comments | 1170 views
July 18, 2018
Once per quarter, there's an event that administrators tasked with managing Oracle software do not look forward to, and that's the day when the company's so-called Critical Patch Update is released. The reason for such nervousness is easy to detect: Because of their specific release cycle, these updates typically address hundreds of vulnerabilities at once – a situation that's usually exacerbated by the fact that these flaws are dispersed across dozens of software products. However, even by Oracle's standards this month's package of 334 security fixes is likely a record breaker.
 
0 comments | 762 views
June 29, 2018
Wireless networks have long been a popular target for criminal hackers of all skill and sophistication levels, especially if they still use the outdated WEP and WPA security protocols. Last fall, researchers found that even the more mature WPA2 was susceptible to offline key reinstallation (KRACK) attacks. Consequently, the Wi-Fi Alliance – the industry association that defines and maintains standards for wireless networking – is now pushing for the implementation of new protective features for enterprise and personal installations.
 
0 comments | 991 views
June 26, 2018
The Internet Engineering Task Force (IETF) has announced plans to retire old editions of the Transport Layer Security Protocol (TLS) as soon as possible.
 
0 comments | 799 views
June 19, 2018
Cisco's security division Talos has published additional information regarding the modular router malware VPNFilter that first made headlines at the end of May.
 
0 comments | 744 views
May 25, 2018
The networking hardware giant's security division has identified a particularly nasty bit of modular malware that infiltrates routers and NAS systems, especially those deployed in SOHO environments.
 
0 comments | 1373 views
May 16, 2018
Every spring, organizers and event planners from Berlin, Cologne and Hanover start running ads and sending out invitations for the annual Internet Security Days – by its own description the leading conference on cybersecurity and related topics in Germany. Since its inception in 2003, the event – which is hosted by Germany's eco Association of the Internet Industry and the publishing house Heinz Heise, which is renowned for its roster of IT publications and news services – has served as some sort of one-stop shop for C-level executives from all industries who wish to learn about the latest trends, cast a glance at protective software and service offerings, or discuss practical implications of legal frameworks for privacy protection.
 
0 comments | 875 views
March 29, 2018
In the runup to the release of its Spring Creators Update, Microsoft has published a list that outlines the timeframes for when currently active and future versions of its client OS will be phased out.
 
0 comments | 1514 views
February 13, 2018
Users who still rely on Big Blue's legendary groupware may have a busy week ahead: According to a recently elevated security alert, the program's auto-update service (aka iNotes SUService) and the related client application can be tricked into "running malicious code from a DLL masquerading as a Windows DLL in the temp directory." Since most users consider auto-updaters to be inherently trustworthy, a flaw in these tools provides an elegant and extremely dangerous attack vector for miscreants to hijack the software and steal confident information or take control of affected machines.
 
0 comments | 1554 views
February 09, 2018
IT departments working with two specific router models and ASA software could fall victim to remote code execution and denial of service attacks, the networking giant has warned. Since the flaws are considered critical, the related advisories recommend available patches to be applied immediately.
 
0 comments | 1083 views
December 15, 2017
Just in time for the holiday season, Ajit Pai – the Chairman of the U.S. Federal Communications Commission or FCC – published a draft document entitled "Restoring Internet Freedom." Its intent is to roll back the so-called Open Internet Order, a regulation that aimed to establish three basic principles concerning broadband networks in the U.S. and was adopted by the same FCC just two and a half years ago. While at first sight it may seem like a pure technicality that only affects the national market, Pai's proposal could also have some profound side effects.
 
0 comments | 1468 views
October 11, 2017
Over the past 12 months, 93% of large corporations and 87% of SMEs reported they fell victim to security breaches and cyber attacks. Worse yet, in 60% of all cases the adversaries gained up to nine months of free access to confidential, sensitive information before someone spotted their activities. Among the most favorite targets of criminal hackers and state-sponsored spies are passwords and other user credentials.
 
0 comments | 1025 views
September 22, 2017
Over the past couple of days, representatives of the European Union and the United States have looked into the current state of the inner workings of the EU-U.S. Privacy Shield, the data exchange/data protection rules the two parties carved out after the European Court of Justice had scrapped its predecessor, the so-called Safe Harbor agreement, as a result of the NSA's and other agencies' mass surveillance.
 
0 comments | 1295 views
August 29, 2017
A fairytale is about to turn into data center reality: VMware has successfully turned its former Project Goldilocks into a production-ready SaaS (Software-, or in this case rather Security-as-a-Service) offering and presented it during the U.S. leg of its annual VMworld inhouse trade show.
 
0 comments | 1116 views
July 26, 2017
In April 2010, the late Steve Jobs wrote an open letter to tell Adobe and the rest of the world about his "Thoughts on Flash." In it, he explained why the multimedia software was no longer allowed to run on iPhones, iPods and iPads. Aside from performance issues on mobile devices, he cited security concerns as one key reason for the decision. Moreover, Jobs was also confident that more capable and secure web technologies could easily take over Flash's role. Some seven years later, Adobe is finally preparing to give in to the Apple founder's verdict.
 
0 comments | 1470 views
July 21, 2017
Back in 2011, Germany's eco - the largest Internet industry association in Europe with over 1,000 member organizations – hosted its first Internet Security Days (ISD), a conference-exhibition mix designed to help companies protect their webpages and customer-facing IT processes. Meanwhile, the ISD are a well-established event that attracts participants from all over the continent.
 
0 comments | 1378 views
May 29, 2017
Retro is the new modern: a Russian programmer recently spotted a bug in NTFS 3.1, the file system that's been employed to 'keep together' all Microsoft operating systems since the days of Windows XP. As it happens, this bug can be used to tamper with computers running Windows 7 and Windows 8.1 as well as the occasional age-defying Vista machine.
 
0 comments | 1581 views
May 28, 2017
Along with its huge positive impact, the 'digital revolution' has also produced a number of less desirable side effects. One of these is an increasing lack of privacy that's often induced by all too talkative data transfer protocols. The Internet Engineering Task Force (IETF) has now issued a recommendation (RFC 8165, published under the ISSN 2070-1721) that's supposed to remediate these shortcomings.
 
0 comments | 1430 views
May 27, 2017
Romanian security outfit Bitdefender has introduced a fresh piece of software that promises to protect virtualized environments against so-called root level attacks, i.e. attacks that aim to bypass conventional security mechanisms, which typically shield VMs and guest OS's, but not the hypervisor they run on.
 
0 comments | 1909 views
April 18, 2017
Last August, Shad Larsen – Microsoft's Director of Windows Business Planning – felt an urge to clarify the set of rules that would define Redmond's future approach to upgrading installations of Windows 7 and Windows 8.1 on 6th-generation Intel® Core™ and later processors. In a very clear-cut contribution to the official Windows blog, he explained that, while sticking with the obligations laid out in its Windows lifecycle fact sheet for Skylake-based devices, the company would reserve the right to no longer support the 'old' OS versions on then still upcoming 7th-generation chips from Intel or AMD.
 
0 comments | 1649 views
 
Page 2/3    1   2   3  
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now