Articles about Endpoint

Big Blue patches big blooper in Endpoint Manager for mobes

Big Blue has patched a serious hole in its Endpoint Manager for Mobile Devices that allows attackers to gain remote access and compromise connected mobes. Endpoint Manager appears to have been written with Ruby, and the (flaw) means "attackers can create valid session cookies containing marshalled objects of their choosing," …
Darren Pauli, 04 Dec 2014

Zero-day hits Symantec endpoint products

Get patching, sysadmins, there's a zero-day in Symantec Endpoint Protection (SEP). This US-CERT advisory is alerting anyone who ignored Symatec's note about the issue. CVE-2014-3434 is a local access vulnerability with a public exploit. A client buffer overflow can cause a blue-screen-of-death on the client, which could also …
money trap conceptual illustration

Veeam varies virty voyage with free endpoint backup tool

Veeam has set a new price for endpoint backup software: $0. That's £0, ¥0 and €0 for readers beyond the USA. That low, low, price applies to a new product called Veeam Endpoint Backup FREE that pretty much does what it says on the can: install the code on a Windows machine and you can instruct it to back up “files, volumes or …
Simon Sharwood, 10 Oct 2014
Borked computer keyboard

Review: McAfee Endpoint Protection for SMB

Anti-virus – sorry, endpoint security - programs suck. I loathe them and they have been the bane of my professional existence for the better part of 20 years. Despite the crushing, crushing sadness that they cause, the call came down to review Intel Security’s latest endpoint security product, McAfee Endpoint Protection Advanced …
Trevor Pott, 23 Mar 2015
Bitdefender security image

Flaws found in Bitdefender enterprise endpoint manager

Holes have been reported in Bitdefender's Gravity end-point protection platform that allow hackers to target corporate infrastructure. Researcher Stefan Viehbock of SEC Consult Vulnerability Lab said the flaw affecting the latest version provided an entry point for attackers to move laterally through the network. "Attackers are …
Darren Pauli, 17 Jul 2014
nuts

Promisec Endpoint Manager: So we gotta cope with BYOD... Help!

Review The explosion of internet-connected gadgets, sensors and other devices that underpins the "internet of things" concept makes my head hurt. When combined with the completely new security model presented by IPv6, BYOD and cloud computing, automation of endpoint management is rapidly becoming non-optional. I've started taking a …
Trevor Pott, 18 Jul 2013
Cloud security

Keeping your endpoint data safe: some simple precautions

Sysadmin blog People are out to get you. Your business, your users, your systems and your data all have value to someone. You could be targeted because you have something that someone specifically wants, or because attackers are hoping to find bank account details or email addresses to spam, or because they want your compute power for a …
Adam Fowler, 21 Oct 2013
Gorillas by Thomas Wildmann Flickr https://creativecommons.org/licenses/by-sa/2.0/

Comcast joins the OpenDaylight software-defined networking party

Heavyweight US carrier Comcast has seen the light and wants its input into how software-defined networking (SDN) works. The company has become the OpenDaylight Foundation's first end-user member, although it has been a code contributor. As SDX Central notes, Comcast was involved in the CableLabs contribution, the PacketCable …
Ghosts 'n Goblins fighting a castle on the Bandai Wonderswan

Docker crocker-blocker aims at stopping Docker shockers

When enthusiasm for a technology reaches fever pitch, as it appears to have done for Docker, it can sometimes be easy to forget that using it securely needs a lot more work than clicking on an installer and getting on with things. Enter VMware, Docker and pals, who have together penned a new security guide, which offers …
Darren Pauli, 08 May 2015
Cisco and Veeam's UCS backup scheme

Veeam lobs backup bombs, with Cisco lighting the fuse

Veeam's making waves again, with two new initiatives sure to get backup software rivals – and tin-makers – a little riled. Software rivals have to figure out how to contend with the new free endpoint backup tool the company flagged last October and released today. The tool's pitched at anyone who wants to back up a Windows PC, …
Simon Sharwood, 15 Apr 2015
Roughly 150kg of gold

Veeam-ing all the way to the bank: No IPO for these VM replicants

Comment At a UK temple to old tech, the London Science Museum, storage firm Veeam introduced its new tech, promising replication of VM images to the cloud – and El Reg quizzed two top Veeamers about the company. V9.0 of Veeam’s Availability Suite will add Cloud Connect Replication for Service Providers, using SSL, and be generally …
Chris Mellor, 15 Jun 2015

Automation eases the pain of software patching

The three biggest challenges for IT managers are security, reliability and performance. Ideally, an organisation’s software will excel at all three but in practice we know that isn’t true. Even the best-laid software development plans let bugs through which can cause problems in all these areas. So patching the organisation’s …
Robin Birtstone, 11 May 2015
padlock

Palo Alto Networks splashes $US200 million on Cyvera

Palo Alto Networks has announced that it's buying Tel Aviv-based Cyvera for $US200 million, including $US88 million in cash. The attraction is the Israeli company's TRAPS (Targeted Remote Attack Prevention System), an endpoint protection system for Windows machines, which PAN will add to its existing firewall and cloud security …
Facebook privacy image

Crusty API opened Facebook accounts to hijacking

A leftover API that Facebook forgot to kill has left accounts open to spammers and scammers, says security Stephen Sclafani. The flaw means an attacker could view other users' messages and post status updates. Sclafani found that a then mis-configured endpoint, since patched, allowed legacy REST API calls to be made on behalf of …
Darren Pauli, 10 Jul 2014
Derailed train wagon. Pic: New York MTA

UK rail signals could be hacked to cause crashes, claims prof

The rollout of a next generation train signalling system across the UK could leave the network at greater risk of hack attacks, a university professor has claimed. Prof David Stupples warns that plans to replace the existing (aging) signalling system with the new European Rail Traffic Management System (ERTMS) could open up the …
John Leyden, 24 Apr 2015

Trustwave's off to Singapore as Singtel slurps security company

Singapore's dominant telco and aspiring services player, Singtel, has acquired Trustwave for about US$810m. Trustwave offers managed security services and the SpiderLabs ethical hacking research outfit, plus a range of network, content and endpoint security products. The company operates in 26 nations and has 1,200 people on the …
Simon Sharwood, 08 Apr 2015
De Vaartkapoen. Pic: Bianca Bueno

Security software's a booming market. Why is Symantec stumbling?

Worldwide security software revenue totalled $21.4bn in 2014, a 5.3 per cent increase from 2013's revenue of $20.3bn, according to the serious bean counters at Gartner. A decline in consumer security software and endpoint protection — areas that together account for 39 per cent of the market — was more than offset the strong …
John Leyden, 27 May 2015

Mozilla peers into processes with student-built forensics probe

Student hackers from the University of Buenos Aires have developed with Mozilla an open-source forensics tool to analyse memory of running processes. Computer science quartet Marco Vanotti, Patricio Palladino, Nahuel Lascano, and Agustin Martinez Suñé are part of Masche Team, who are "highly motivated by coding, security and …
Darren Pauli, 16 Mar 2015

Cisco makes ACI control more programmable

Cisco has released a command-line toolkit for its Application Centric Infrastructure (ACI), freeing sys admins from the tyranny of the GUI. The company describes its ACI Toolkit as a combination of “an NX OS-like CLI and some custom Python scripts” that cover the most common daily configuration and admin tasks. The toolkit also …
The Register breaking news

What you can do to enforce endpoint security

Thirty years after the PC was launched, security and management problems for the endpoint seem to be getting worse rather than better. PCs have become more functional, creating a greater surface area for attack. And the number of endpoint devices has proliferated, as tablets, netbooks and smartphones have entered the fray. The …
Danny Bradbury, 27 Dec 2011
Facebook privacy image

Facebook found leaking private photos

Bug hunter Laxman Muthiyah has reported a Facebook vulnerability that exposes private photos to potentially malicious applications. The hacker received US$10,000 from Menlo Park for reporting the bug in Facebook Photo Sync and an API that allows third party apps to siphon private pics. Muthiyah says iOS and Android apps that …
Darren Pauli, 20 Mar 2015
Stock market. Pic: Alberto Carrasco Casado

Sophos: We'll have a market cap of £1bn when we IPO

Brit security slinger Sophos’s listing on the London Stock Exchange went live today, giving the firm a market cap of around £1bn – a valuation that has caused a stir among analysts. The intent to float was confirmed weeks ago, with the Oxford-based firm expecting to raise cash to fund the next phase of biz development and rub …
Paul Kunert, 26 Jun 2015
Fastpass logical diagram

Kill queues for fast data centres: MIT boffins

MIT researchers hope to speed up networking inside the data centre with concepts that will look familiar to old networking hacks: they propose a central arbiter for network traffic that picks out a predetermined path before a packet is transmitted. The boffins call the scheme Fastpass, and its other characteristic is that the …
Josh and some superheroes at Spiceworld 2013

CloudMask dons cape and sets foot on the mean streets of Blighty

Cloud-based security services firm CloudMask, whose technology offers to protect sensitive information in the cloud, even in the case of a network breach, launched in the UK on Tuesday. CloudMask's technology works on the premise that no one can be trusted with data - including cloud administrators, governments, employees, and …
John Leyden, 09 Sep 2014
Double Facepalm; when one facepalm is not enough.

Oh no, Moto! Cable modem has hardcoded 'technician' backdoor

Researchers at Rapid7 have turned up a set of typically dumb vulnerabilities in Motorola's DOCSIS/EuroDOCSIS 3.0-capable SURFboard SBG 6580 cable broadband modem. The device, which also ships under the Arris brand, has vulnerabilities included hardcoded login credentials that will allow an outside attacker to take control of the …
Funnel of cash. Credit: via SXC – http://www.sxc.hu/profile/Leonardini

Symantec: Look at our Q4 numbers ... no, not those ones

The road to separation continues to be anything but smooth for Symantec’s security operation, particularly on the consumer front, as it again suffered from sales shrinkage, unlike the breakaway storage biz. In the last set of full year numbers from the firm, sales fell three per cent to $6.5bn, including a four per cent slip in …
Paul Kunert, 15 May 2015
Clouds_and_sun

Biz data botherer CommVault slips out fresh do-it-all bundle

CommVault has added additional AWS and Azure support and reveals easier, more targeted ways to buy its all-singing, all-dancing backup/archive/data management product Simpana 10. The AWS and Azure facilities include cloud reporting, end-user self-service provisioning, recovery, software snapshots and virtual machine resource …
Chris Mellor, 22 Aug 2014

Cisco adds Ethernet VXLAN BGP support to Nexus switches

Cisco is giving another nod in the direction of support for open software-defined-network standards, announcing support for BGP EVPN on its Nexus 9000. BGP EVPN – Border Gateway Protocol, Ethernet Virtual Private Network – is an Internet draft authored by members from Cisco, Juniper, Verizon, AT&T, Alcatel-Lucent and Bloomberg …

PRE-SPLINTERED Symantec's Q2 revenue slips, net profit rises

Symantec has reported mixed second quarter results, with revenue down one per cent on the year, but net profit rising by the same amount. The company saw revenue of $1.62bn for its second fiscal 2015 quarter, compared with revenue of $1.64bn a year ago (a fall of one per cent), and $1.74bn in the previous quarter. Net profit of …
Chris Mellor, 06 Nov 2014
internet explorer 8

Norton Internet Security antivirus update 'borked Internet Explorer'

Users of the world's second best* browser were forced to use alternatives after an overnight update to Norton AntiVirus prevented Internet Explorer from working at all. Aggrieved users who'd thought far enough ahead to install Google Chrome, Mozilla Firefox or any of the other alternatives took to Norton's official forum to vent …
Gareth Corfield, 21 Feb 2015
A large hand flicks an icon of a little red man. Image via shutterstock (Lasse Kristensen)

Micro Focus guillotine will fall more frequently on Novell necks

Novell seems to be bearing the brunt of the mammoth restructuring that parent company Micro Focus is currently executing, say our sources close to the situation. This week, Micro Focus issued a profit warning based on the strengthening dollar and went public on a review of the group – trading brands include The Attachmate Group …
Paul Kunert, 10 Apr 2015
Columns of coins in the cloud

Hybrid IT? Not a long-term thing, says AWS CTO

AWS Summit Hybrid IT — systems that are part on-premises and part public cloud — is simply a path to the cloud, not a destination, Amazon CTO Werner Vogels and told the 3,000 attendees at the AWS (Amazon Web Services) Summit in London yesterday. "We have built a whole set of services that allow you to run seamlessly together [services] on- …
Tim Anderson, 16 Apr 2015
Cloud

Switches complete Avaya SDN suite

Avaya* has pushed a bunch of switches out the door, and is taking aim at Cisco's ECI in its Fx – Fabric Anywhere – strategy. The switches themselves are fairly straightforward: the ESR 5900 line is a stackable series in 24 port (up to Gbps Ethernet) and 48 port (ditto) configurations. Avaya Australia's director, network …
Puppet Labs Logo

Puppet Labs pulls strings on Docker, AWS and bare metal

Puppet Labs is adding code management and updates to its Node Manager in a big refresh in Puppet Enterprise 3.8. The company is particularly touting Docker container provisioning, as well as provisioning for bare metal and AWS infrastructure. Tim Zonca, director of product marketing at Puppet Labs, told Vulture South the …

FireEye buys outfit that lifted the lid on Chinese cyber-espionage

Threat prevention firm FireEye has acquired privately held net security firm Mandiant. The cash and shares deal, announced Monday, is valued at around $1bn. Mandiant is best known for its landmark study into the Chinese APT1 hacking crew last year, which exposed the organisation's tactics and evidence of its links to the Chinese …
John Leyden, 03 Jan 2014

Google: OK world, make our 'End-to-End' crypto tool SPOOK PROOF

Google has released the source code for an encryption plugin for Chrome that makes the secure sending of email easier. The web giant said its End-to-End Chrome plugin, currently in alpha development status, will provide a secure method for transmitting data between users, with data encrypted locally in a user's browser and …
Shaun Nichols, 03 Jun 2014
Docker Logo

Docker's just a bit dodgy, but ready for rollout says Gartner

Analyst outfit Gartner has assessed Docker's security – and found the containerisation tool is sound but immature. Gartner's report, Security Properties of Containers Managed by Docker, published last week, finds “Linux containers are mature enough to be used as private and public PaaS” but “disappoint when it comes to secure …
Simon Sharwood, 12 Jan 2015
Rosetta Flash diagram

Weaponised Flash flaw can pinch just about anything from anywhere

Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials. According to the Switzerland-based Google engineer that turned up the vulnerability, Michele Spagnuolo, sites that are/were vulnerable to the attack …

China's web giants unite to defuse Windows XP bombshell

A gaggle of Chinese web firms have come together with a plan to protect Windows XP users in the Middle Kingdom for at least the next two or three years, according to local reports. The unusual step will see messaging giant Tencent, search engine Sogou, software company Kingsoft and several others offer technical support for XP …
Phil Muncaster, 25 Feb 2014
Key in a wooden door. PIC by Tawheed Mazoor - licensed under CC 2.0

Meat puppet security sucks... let machines find your flaws

Commercial organisations have cash to burn on stopping hackers getting into the network, but relatively little to spend on dealing with a breach. This poses a challenge for Darktrace, a two-year-old organisation founded by former members of the intelligence community and backed by former Autonomy CEO Mike Lynch’s investment fund …
Paul Kunert, 27 Jan 2015

Microsoft offers 'free' backup for Azure users with the cloud fear

EVault has promised a year’s worth of cloud backup and disaster recovery services to biz customers who take out an Azure Enterprise agreement with Microsoft. The two firms inked the agreement for EVault to provide the service last week. It's actually a fairly natural fit for users who might be a little unnerved by recent …
Chris Mellor, 05 Nov 2013
balaclava_thief_burglar

Cisco: Hey, IT depts. You're all malware hosts

Everybody – at least every multinational that Cisco checked out for its 2014 Annual Security Report – is hosting malware of some kind, and there aren't enough security professionals to go around. Along with its Managed Threat Defense service launched this week, Cisco also launched the latest publication (here with registration) …

OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs

Microsoft has fixed a snafu with Windows Defender that took down thousands of business PCs and servers running Windows XP and Server 2003. The software giant responded to sysadmins complaining on TechNet that large numbers of their machines were borked after they’d installed Microsoft’s latest set of antivirus definitions. Once …
Gavin Clarke, 17 Apr 2014

VMware updates vSphere, recommends new security fixes

VMware has released a second update to vSphere 5.5. The headline news in the new release is that hosts can now run up to six terabytes of RAM. And yes, we do mean terabytes. vCenter Server can now support Oracle 12c, Microsoft SQL Server 2012 Service Pack 1 and Microsoft SQL Server 2014. Those considering hybrid cloud get to …
Simon Sharwood, 10 Sep 2014

Cybercrooks breed SELF-CLONING MUTANT that STEALS your BANK DETAILS

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method. Infected PCs in the botnet download a secondary strain of …
John Leyden, 02 Jul 2014
craft_brewery

Everyone's at it: Backup folk spaff out tsunami of cloudy, flashy gear

The artisanal world of back-up product creation continues to blast out refinements, with product announcements from Arkivum, CommVault, Unitrends and Veeam, as well as cloud filer product news from Sphere 3D (previously Overland Storage). Arkivum has a pair of tape-based archiving products; Arkivum/1+1 and Arkivum/OnSite and …
Chris Mellor, 02 Jun 2015

Adjustments will be needed to manage the Macs piling up in your business

As discussed in the first part of this series, Macs are everywhere. Despite their presence in businesses large and small, managing Macs in the enterprise still is not easy. A few years ago I gave Apple in the enterprise a look, and sadly, things haven't changed too much since then. Managing Macs in an organisation is really not …
Trevor Pott, 15 May 2015

Where will you place your vendor bets in 2015?

There was plenty to keep Europe’s IT channel busy over the past few months, and the rest of this year could be just as turbulent. By the end of 2014, the shakeout of major strategic changes from HP, Dell and Symantec were yet to be felt. But as 2015 progresses, this is likely to change, so keeping a close eye on developments is …
Windows XP

Fine! We'll keep updating WinXP's malware sniffer after April, says Microsoft

Microsoft has capitulated to the legions of users who are still running Windows XP once again, by extending support for its antimalware software for the aging OS into 2015. In the past, Redmond has warned that it would discontinue support for Microsoft Security Essentials, Forefront Client Security, Forefront Endpoint Protection …
Neil McAllister, 16 Jan 2014
HTC One M9 Android smartphone

So, EE. Who IS this app on your HTC M9s sneakily texting, hmm?

EE has assured a customer that a pre-installed app found on new HTC M9 from the mobile operator is simply anti-fraud software. However, both customer Barney Scott and an independent security expert remain unconvinced by this explanation, arguing that even if the app isn't malicious, it's at best badly designed and unwanted. …
John Leyden, 01 Jun 2015