Feeds

Articles about Endpoint

Bitdefender security image

Flaws found in Bitdefender enterprise endpoint manager

Holes have been reported in Bitdefender's Gravity end-point protection platform that allow hackers to target corporate infrastructure. Researcher Stefan Viehbock of SEC Consult Vulnerability Lab said the flaw affecting the latest version provided an entry point for attackers to move laterally through the network. "Attackers are …
Darren Pauli, 17 Jul 2014
nuts

Promisec Endpoint Manager: So we gotta cope with BYOD... Help!

The explosion of internet-connected gadgets, sensors and other devices that underpins the "internet of things" concept makes my head hurt. When combined with the completely new security model presented by IPv6, BYOD and cloud computing, automation of endpoint management is rapidly becoming non-optional. I've started taking a …
Trevor Pott, 18 Jul 2013
Cloud security

Keeping your endpoint data safe: some simple precautions

People are out to get you. Your business, your users, your systems and your data all have value to someone. You could be targeted because you have something that someone specifically wants, or because attackers are hoping to find bank account details or email addresses to spam, or because they want your compute power for a …
Adam Fowler, 21 Oct 2013
Facebook privacy image

Crusty API opened Facebook accounts to hijacking

A leftover API that Facebook forgot to kill has left accounts open to spammers and scammers, says security Stephen Sclafani. The flaw means an attacker could view other users' messages and post status updates. Sclafani found that a then mis-configured endpoint, since patched, allowed legacy REST API calls to be made on behalf of …
Darren Pauli, 10 Jul 2014
padlock

Palo Alto Networks splashes $US200 million on Cyvera

Palo Alto Networks has announced that it's buying Tel Aviv-based Cyvera for $US200 million, including $US88 million in cash. The attraction is the Israeli company's TRAPS (Targeted Remote Attack Prevention System), an endpoint protection system for Windows machines, which PAN will add to its existing firewall and cloud security …
Fastpass logical diagram

Kill queues for fast data centres: MIT boffins

MIT researchers hope to speed up networking inside the data centre with concepts that will look familiar to old networking hacks: they propose a central arbiter for network traffic that picks out a predetermined path before a packet is transmitted. The boffins call the scheme Fastpass, and its other characteristic is that the …
The Register breaking news

What you can do to enforce endpoint security

Thirty years after the PC was launched, security and management problems for the endpoint seem to be getting worse rather than better. PCs have become more functional, creating a greater surface area for attack. And the number of endpoint devices has proliferated, as tablets, netbooks and smartphones have entered the fray. The …
Danny Bradbury, 27 Dec 2011
Rosetta Flash diagram

Weaponised Flash flaw can pinch just about anything from anywhere

Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials. According to the Switzerland-based Google engineer that turned up the vulnerability, Michele Spagnuolo, sites that are/were vulnerable to the attack …

Google: OK world, make our 'End-to-End' crypto tool SPOOK PROOF

Google has released the source code for an encryption plugin for Chrome that makes the secure sending of email easier. The web giant said its End-to-End Chrome plugin, currently in alpha development status, will provide a secure method for transmitting data between users, with data encrypted locally in a user's browser and …
Shaun Nichols, 03 Jun 2014

China's web giants unite to defuse Windows XP bombshell

A gaggle of Chinese web firms have come together with a plan to protect Windows XP users in the Middle Kingdom for at least the next two or three years, according to local reports. The unusual step will see messaging giant Tencent, search engine Sogou, software company Kingsoft and several others offer technical support for XP …
Phil Muncaster, 25 Feb 2014

FireEye buys outfit that lifted the lid on Chinese cyber-espionage

Threat prevention firm FireEye has acquired privately held net security firm Mandiant. The cash and shares deal, announced Monday, is valued at around $1bn. Mandiant is best known for its landmark study into the Chinese APT1 hacking crew last year, which exposed the organisation's tactics and evidence of its links to the Chinese …
John Leyden, 03 Jan 2014
balaclava_thief_burglar

Cisco: Hey, IT depts. You're all malware hosts

Everybody – at least every multinational that Cisco checked out for its 2014 Annual Security Report – is hosting malware of some kind, and there aren't enough security professionals to go around. Along with its Managed Threat Defense service launched this week, Cisco also launched the latest publication (here with registration) …

Cybercrooks breed SELF-CLONING MUTANT that STEALS your BANK DETAILS

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method. Infected PCs in the botnet download a secondary strain of …
John Leyden, 02 Jul 2014

OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs

Microsoft has fixed a snafu with Windows Defender that took down thousands of business PCs and servers running Windows XP and Server 2003. The software giant responded to sysadmins complaining on TechNet that large numbers of their machines were borked after they’d installed Microsoft’s latest set of antivirus definitions. Once …
Gavin Clarke, 17 Apr 2014

Microsoft offers 'free' backup for Azure users with the cloud fear

EVault has promised a year’s worth of cloud backup and disaster recovery services to biz customers who take out an Azure Enterprise agreement with Microsoft. The two firms inked the agreement for EVault to provide the service last week. It's actually a fairly natural fit for users who might be a little unnerved by recent …
Chris Mellor, 05 Nov 2013
CTERA_ViPR_video

CTERA gets bitten by EMC's snake, develops ViPR compatibility

Deep breath: cloud storage gateway and cloud services platform product startup CTERA has gone and got itself snake-bitten – it’s now ViPR compatible. ViPR is EMC’s software layer to provide separate control plane orchestration functions and data plane services – such as file, block and object access – across its own and third- …
Chris Mellor, 06 May 2014
Windows XP

Fine! We'll keep updating WinXP's malware sniffer after April, says Microsoft

Microsoft has capitulated to the legions of users who are still running Windows XP once again, by extending support for its antimalware software for the aging OS into 2015. In the past, Redmond has warned that it would discontinue support for Microsoft Security Essentials, Forefront Client Security, Forefront Endpoint Protection …
Neil McAllister, 16 Jan 2014
Covert Redirect modified logo

'Covert Redirect' OAuth flaw more chest-beat than Heartbleed

A recently reported new "vulnerability" in OAuth appears to be anything but. That unkind assessment has come from security specialists after a flaw called "Covert Redirect" made headlines that conflated the flaw with the Heartbleed vulnerability, a major security risk that legitimately sent administrators scrambling to fix their …
Darren Pauli, 05 May 2014

Firewall-floggers in FLAMING MESS: Where'd our mystery margin go?

If you work in the fields of technology distribution, services and resale, you'll surely hear about cloud, mobile, social and virtual more than anything else. However, it is the changing patterns in security spending that are perhaps most dramatically re-shaping our businesses. Gone are the good old days of pushing traditional …

Securo-borg FireEye coughs $70m to buy 'flight-recorder-for-networks' tech

Security vendor FireEye has bought network forensics firm nPulse Technologies in a $70m deal. FireEye is stumping up $60m in cash and $10m in stock to get its hands on nPulse, a privately held startup that boasts it offers the industry's fastest full packet capture and indexing technology. nPulse’s forensics will be integrated …
John Leyden, 07 May 2014

Don't lose control of those fast-breeding endpoints

So you want to know about security? Well you have come to the right place. I have been here for a while and I can tell you that outside these gates it’s full of cowboys, sharks and pirates, none of whom will hesitate to take what is yours and call it their own. The above is is a quote from a brochure I wrote in an attempt to …
Aaron Milne, 22 Oct 2013

Amazon seeds cloud with apps that flow to streams

Amazon Web Services (AWS') big day it ats re:Invent cloud shindig in fabulous Las Vegas may have been headlined by its disruptive entry into the desktop virtualisation market, but the company also announced a new tributary to its cloudy river in the form of the new AppStream service. Here's how it works. You build and app and …
Simon Sharwood, 14 Nov 2013
Kaspersky Lab logo

Kaspersky's Security for Virtualization pushed to XenServer and HyperV

Kaspersky is extending its Security for Virtualuzation Light Agent security tool to the Citrix XenServer and Microsoft HyperV platforms. The company said that the Light Agent tool will launch on April 22 with XenServer and HyperV support as well as new options for VMware's vSphere hypervisor. The company will continue to …
Shaun Nichols, 15 Apr 2014

Symantec: Antivirus is 'DEAD' – no longer 'a moneymaker'

Symantec, a company that has made huge amounts of cash as the largest antivirus software vendor for the last quarter of a century, looks to be getting out of that business and into fixing hacking problems rather than stopping them. "We don't think of antivirus as a moneymaker in any way," Brian Dye, Symantec's senior vice …
Iain Thomson, 06 May 2014
Steve Bennett

Symantec BACKS OUT of Backup Exec.cloud

Symantec's resellers have reportedly been given notice to stop providing annual subscriptions to Backup Exec.cloud by 6 January. Backup Exec.cloud lets small and medium businesses store backups in a Symantec remote vault (the cloud) or on-site and in the cloud. Customers have been told they can use the service until one year …
Chris Mellor, 28 Nov 2013
Sphere 3D

Overland Storage, 'miracle' flirty virty Sphere 3D jump in bed

Perennial loss-making Overland Storage will merge with Canadian company Sphere 3D. The combined companies will take the name of Sphere 3D, whose Glassware software apparently does the seemingly impossible: “Enable mobile device users the full functionality of any software program or application on any device, anywhere.” …
Chris Mellor, 16 May 2014
Amuse bouche

Reg man picks out tastiest tidbits from heaping mounds of storage announcements

Suppliers are furiously ladling out news like demented cafeteria workers attempting to feed the multitudes, so we thought we'd slice off a few of the tastier morsels and present them to you on a sideplate – all the better to prevent any storage indigestion. A3CUBE introduces RONNIEE 2S, a Network Interface Card that can transmit …
Chris Mellor, 19 May 2014
The Register breaking news

MIT boffins give computers control to clock faster TCP

A group of MIT researchers has unveiled a machine learning approach to TCP congestion which could form the foundation of the next round of improvements to the venerable protocol's performance. Dubbed “Remy”, their TCP control software is based on the idea that even sophisticated modern congestion control algorithms (like …
John McAfee

McAfee chap is back in crypto-wrap chat app back flap

Antivirus pioneer and one-time fugitive John McAfee has backed Chadder, a new instant-messaging app for smartphones that promises "the highest degree of security and privacy." The app is being marketed by Future Tense Central, a J.McAfee-owned company that claims to be headquartered in Silicon Valley, although McAfee himself was …
Neil McAllister, 05 May 2014

Top ten biz software vendors reveal Heartbleed exposure

The advent of the Heartbleed Open SSL vulnerability has enterprise software development teams scrambling to figure out if they have a problem, and the news is not always good. Vulture South has ploughed through the recently updated list of the world's top 10 software vendors. Here's how each fares. Microsoft is chilling out …
Simon Sharwood, 11 Apr 2014

Symantec to offload Altiris: report

Almost six years to the day since announcing it would acquire infrastructure management outfit Altiris for a cool $US830m, Symantec is said to be offloading the company. The Wall Street Journal reports “people familiar with the process” Symantec is willing to offload the products it acquired for less than the purchase price. …
Simon Sharwood, 16 Jan 2013

Microsoft's security apps still trip up on Windows 8

German independent security firm AV-Test has released evaluations of security software for Windows 8 for the first time, and – not entirely surprisingly – it once again found Microsoft's own products were among the weaker performers. The firm tested its usual batch of 25 antivirus products for consumers, plus eight aimed at …
Neil McAllister, 09 Apr 2013

FireEye enters crowded IPS market

Late last week, FireEye took something of a plunge, throwing its hat into the ring of the crowded intrusion prevention system (IPS) market, with a beta of software that adds IPS capability to its virtualised MVX environment. With the IPS to be made available as a license add-on for the company's NX network threat prevention …
Druva

Druva: We can do a mixture of anything you can do

Mobile, desktop and notebook backup startup Druva has dropped file sharing into its product mix and reckons it's distanced itself from pure-play endpoint backup vendors and file sync 'n' share players. Druva was founded in 2008 and says its software is used to protect more than a million endpoints - desktop and notebook PCs, and …
Chris Mellor, 27 Nov 2012

They've taken my storage hostage ... now what?

There's an encrypting ransomware Trojan making the rounds called Cryptolocker. I will save the details on my battle with this beastie for later*, but suffice it to say that if this encrypts your stuff you are done. There is no getting your data back unless you have backups or pay the ransom. Let's set aside the ultra-well …
Trevor Pott, 24 Oct 2013
The Register breaking news

Your nicked iPad now likelier than ever to show up in Mongolia

The number of laptops and tablets stolen in one country and recovered in another is on the rise. Absolute Software's second annual Endpoint Security Report records that stolen kit that had not been nicked locally had been recovered in an additional eight countries as far afield as Mongolia, Gambia, Vietnam and Zimbabwe. In the …
John Leyden, 05 Sep 2013
Borked computer keyboard

How to stop intruders without knocking out the workers

For a sysadmin, fighting malware feels like an uphill battle that you are never going to win. Security software vendors are in a constant catch-up game, trying to create definitions to protect their customers from the latest round of malware. Sysadmins have the tough job of using their various security software and devices, …

Microsoft Intune hears the call for device management

As Microsoft continues its corporate redefinition as a subscription-driven cloud slinger we should bear in mind that this path includes more than simply Office 365 or Azure. Microsoft's Enterprise Mobility Suite (EMS) is slated to become an important new buzzword as it wraps up Windows Intune, Azure Active Directory Premium ( …
Trevor Pott, 26 Jun 2014

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus. Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready …
Austin Modine, 13 Jun 2007

Amazon spits out offline DynamoDB tester

Amazon has released a tool to let developers test apps that use the DynamoDB API, and to do so offline. The DynamoDB Local test tool was announced by Amazon on Thursday, and gives devs access to a client-side database that supports the complete DynamoDB API, but doesn't manipulate any tables or data in DynamoDB itself." The …
Jack Clark, 13 Sep 2013
CloudONTAP

Snooping on a NetApp event: New cloudy OS on its way

Social media can deliver multiple micro-glimpses of previously closed events, like a NetApp analysts event in San Francisco yesterday which revealed a new OS - Cloud ONTAP - and a coming Connect product for mobile access. Here’s what we discovered by mining a blizzard of tweets from attendees with the hashtag; #NetAppIAS14. It’s …
Chris Mellor, 06 Jun 2014

Symantec: We've lopped off half our heads, but look how well we're doing now

Storage and security software behemoth Symantec reported increased revenues but profits down in its first fiscal 2014 quarter, as CEO Steve Bennett's companywide reorg made some progress. Symantec's new strategy of focusing the sales firehose on service providers looks like it's beginning to pay off. First quarter fiscal 2014 …
Chris Mellor, 31 Jul 2013
The Register breaking news

Antivirus update broke our interwebs, howl Win XP users

Thousands of Windows XP users were blocked from accessing the internet this week after they applied a misfiring antivirus update from Kaspersky Lab. The issue affected both consumer and business versions of Windows XP. Vista or Windows 7 users were untouched by the snafu. Even so, Kaspersky's support forums quickly filled up …
John Leyden, 06 Feb 2013
The Register breaking news

A backdoor into Skype for the Feds? You're joking...

Heavyweights of the cryptographic world have lined up behind a campaign against proposed US wiretapping laws that could require IT vendors to place new backdoors in digital communications services. Technical details are vague at present, but the planned law could mandate putting wiretap capabilities in endpoints to cover …
John Leyden, 21 May 2013
Cat 5 cable

Citrix soothes frustrated Mac fanbois with Windows VDI tech

Citrix has started the new year with a product to help admins manage Windows desktops on errant Macs, tightening competition between the virtualization company and Parallels and VMware. The "DesktopPlayer" product was announced by Citrix on Thursday and sees the company allow admins to deliver policy-laden Windows images to …
Jack Clark, 09 Jan 2014

NASA's nuclear Mars tank REBELS against human control

NASA's famous nuclear-powered, raygun-armed Mars rover Curiosity has broken free of human control and made up its own mind where to drive across the rusty plains of our neighbour world, according to boffins at the space agency who were formerly in charge of it. Mars rover Curiosity route. Credit: NASA/JPL-Caltech No, I WILL NOT …
Lewis Page, 29 Aug 2013
Beached whale

Beached whale Symantec watches revenues recede 7%

Symantec’s latest results show that you can wring more profit out of declining revenues by slashing costs but its not enough to bring you back to growth. Revenues in its fourth fiscal quarter of 2014 ended 28 March were $1.63bn, seven per cent down year-on-year, but net profit jumped 14 per cent to $217m. The full year numbers …
Chris Mellor, 09 May 2014

I've just seen 10% of the PC biz disappear into the cloud

The days of the desktop computer look to be numbered. According to IDC, worldwide shipments of desktop systems fell 10 per cent in 2013, the biggest decline in the platform's history. IDC also predicts that for the first time tablets will outsell laptops and in fact the entire PC market by 2015. To borrow IDC’s terminology, …
Philippe Fossé, 24 Jan 2014

MS brandishes 'Katana' HTTP/2.0 server

Microsoft has gone public with a prototype HTTP/2.0 server. The server is designed to implement the version 4 HTTP/2.0 implementable draft published by the IETF earlier in July. The idea, according to IETF HTTPBIS chair Mark Nottingham, is that progressive implementations of HTTP/2.0 will feed back into the standard. “We're …
The Register breaking news

Today's antivirus apps ARE 'worse at slaying hidden threats'

The effectiveness of antivirus products has declined, according to tests by German testing outfit AV-Test.org. AV-Test put 25 antivirus products for home users and eight corporate endpoint protection software applications through their paces in November and December 2012. Only an average of 92 per cent of the zero-day attacks …
John Leyden, 15 Jan 2013