Articles about Endpoint

Big Blue patches big blooper in Endpoint Manager for mobes

Big Blue has patched a serious hole in its Endpoint Manager for Mobile Devices that allows attackers to gain remote access and compromise connected mobes. Endpoint Manager appears to have been written with Ruby, and the (flaw) means "attackers can create valid session cookies containing marshalled objects of their choosing," …
Darren Pauli, 04 Dec 2014

Zero-day hits Symantec endpoint products

Get patching, sysadmins, there's a zero-day in Symantec Endpoint Protection (SEP). This US-CERT advisory is alerting anyone who ignored Symatec's note about the issue. CVE-2014-3434 is a local access vulnerability with a public exploit. A client buffer overflow can cause a blue-screen-of-death on the client, which could also …
money trap conceptual illustration

Veeam varies virty voyage with free endpoint backup tool

Veeam has set a new price for endpoint backup software: $0. That's £0, ¥0 and €0 for readers beyond the USA. That low, low, price applies to a new product called Veeam Endpoint Backup FREE that pretty much does what it says on the can: install the code on a Windows machine and you can instruct it to back up “files, volumes or …
Simon Sharwood, 10 Oct 2014
Borked computer keyboard

Review: McAfee Endpoint Protection for SMB

Anti-virus – sorry, endpoint security - programs suck. I loathe them and they have been the bane of my professional existence for the better part of 20 years. Despite the crushing, crushing sadness that they cause, the call came down to review Intel Security’s latest endpoint security product, McAfee Endpoint Protection Advanced …
Trevor Pott, 23 Mar 2015
Bitdefender security image

Flaws found in Bitdefender enterprise endpoint manager

Holes have been reported in Bitdefender's Gravity end-point protection platform that allow hackers to target corporate infrastructure. Researcher Stefan Viehbock of SEC Consult Vulnerability Lab said the flaw affecting the latest version provided an entry point for attackers to move laterally through the network. "Attackers are …
Darren Pauli, 17 Jul 2014
nuts

Promisec Endpoint Manager: So we gotta cope with BYOD... Help!

Review The explosion of internet-connected gadgets, sensors and other devices that underpins the "internet of things" concept makes my head hurt. When combined with the completely new security model presented by IPv6, BYOD and cloud computing, automation of endpoint management is rapidly becoming non-optional. I've started taking a …
Trevor Pott, 18 Jul 2013
Cloud security

Keeping your endpoint data safe: some simple precautions

Sysadmin blog People are out to get you. Your business, your users, your systems and your data all have value to someone. You could be targeted because you have something that someone specifically wants, or because attackers are hoping to find bank account details or email addresses to spam, or because they want your compute power for a …
Adam Fowler, 21 Oct 2013
Cisco and Veeam's UCS backup scheme

Veeam lobs backup bombs, with Cisco lighting the fuse

Veeam's making waves again, with two new initiatives sure to get backup software rivals – and tin-makers – a little riled. Software rivals have to figure out how to contend with the new free endpoint backup tool the company flagged last October and released today. The tool's pitched at anyone who wants to back up a Windows PC, …
Simon Sharwood, 15 Apr 2015
Facebook privacy image

Crusty API opened Facebook accounts to hijacking

A leftover API that Facebook forgot to kill has left accounts open to spammers and scammers, says security Stephen Sclafani. The flaw means an attacker could view other users' messages and post status updates. Sclafani found that a then mis-configured endpoint, since patched, allowed legacy REST API calls to be made on behalf of …
Darren Pauli, 10 Jul 2014
padlock

Palo Alto Networks splashes $US200 million on Cyvera

Palo Alto Networks has announced that it's buying Tel Aviv-based Cyvera for $US200 million, including $US88 million in cash. The attraction is the Israeli company's TRAPS (Targeted Remote Attack Prevention System), an endpoint protection system for Windows machines, which PAN will add to its existing firewall and cloud security …

Trustwave's off to Singapore as Singtel slurps security company

Singapore's dominant telco and aspiring services player, Singtel, has acquired Trustwave for about US$810m. Trustwave offers managed security services and the SpiderLabs ethical hacking research outfit, plus a range of network, content and endpoint security products. The company operates in 26 nations and has 1,200 people on the …
Simon Sharwood, 08 Apr 2015

Mozilla peers into processes with student-built forensics probe

Student hackers from the University of Buenos Aires have developed with Mozilla an open-source forensics tool to analyse memory of running processes. Computer science quartet Marco Vanotti, Patricio Palladino, Nahuel Lascano, and Agustin Martinez Suñé are part of Masche Team, who are "highly motivated by coding, security and …
Darren Pauli, 16 Mar 2015

Cisco makes ACI control more programmable

Cisco has released a command-line toolkit for its Application Centric Infrastructure (ACI), freeing sys admins from the tyranny of the GUI. The company describes its ACI Toolkit as a combination of “an NX OS-like CLI and some custom Python scripts” that cover the most common daily configuration and admin tasks. The toolkit also …
Facebook privacy image

Facebook found leaking private photos

Bug hunter Laxman Muthiyah has reported a Facebook vulnerability that exposes private photos to potentially malicious applications. The hacker received US$10,000 from Menlo Park for reporting the bug in Facebook Photo Sync and an API that allows third party apps to siphon private pics. Muthiyah says iOS and Android apps that …
Darren Pauli, 20 Mar 2015
Fastpass logical diagram

Kill queues for fast data centres: MIT boffins

MIT researchers hope to speed up networking inside the data centre with concepts that will look familiar to old networking hacks: they propose a central arbiter for network traffic that picks out a predetermined path before a packet is transmitted. The boffins call the scheme Fastpass, and its other characteristic is that the …
The Register breaking news

What you can do to enforce endpoint security

Thirty years after the PC was launched, security and management problems for the endpoint seem to be getting worse rather than better. PCs have become more functional, creating a greater surface area for attack. And the number of endpoint devices has proliferated, as tablets, netbooks and smartphones have entered the fray. The …
Danny Bradbury, 27 Dec 2011
Double Facepalm; when one facepalm is not enough.

Oh no, Moto! Cable modem has hardcoded 'technician' backdoor

Researchers at Rapid7 have turned up a set of typically dumb vulnerabilities in Motorola's DOCSIS/EuroDOCSIS 3.0-capable SURFboard SBG 6580 cable broadband modem. The device, which also ships under the Arris brand, has vulnerabilities included hardcoded login credentials that will allow an outside attacker to take control of the …
Josh and some superheroes at Spiceworld 2013

CloudMask dons cape and sets foot on the mean streets of Blighty

Cloud-based security services firm CloudMask, whose technology offers to protect sensitive information in the cloud, even in the case of a network breach, launched in the UK on Tuesday. CloudMask's technology works on the premise that no one can be trusted with data - including cloud administrators, governments, employees, and …
John Leyden, 09 Sep 2014
Clouds_and_sun

Biz data botherer CommVault slips out fresh do-it-all bundle

CommVault has added additional AWS and Azure support and reveals easier, more targeted ways to buy its all-singing, all-dancing backup/archive/data management product Simpana 10. The AWS and Azure facilities include cloud reporting, end-user self-service provisioning, recovery, software snapshots and virtual machine resource …
Chris Mellor, 22 Aug 2014

Cisco adds Ethernet VXLAN BGP support to Nexus switches

Cisco is giving another nod in the direction of support for open software-defined-network standards, announcing support for BGP EVPN on its Nexus 9000. BGP EVPN – Border Gateway Protocol, Ethernet Virtual Private Network – is an Internet draft authored by members from Cisco, Juniper, Verizon, AT&T, Alcatel-Lucent and Bloomberg …

PRE-SPLINTERED Symantec's Q2 revenue slips, net profit rises

Symantec has reported mixed second quarter results, with revenue down one per cent on the year, but net profit rising by the same amount. The company saw revenue of $1.62bn for its second fiscal 2015 quarter, compared with revenue of $1.64bn a year ago (a fall of one per cent), and $1.74bn in the previous quarter. Net profit of …
Chris Mellor, 06 Nov 2014
internet explorer 8

Norton Internet Security antivirus update 'borked Internet Explorer'

Users of the world's second best* browser were forced to use alternatives after an overnight update to Norton AntiVirus prevented Internet Explorer from working at all. Aggrieved users who'd thought far enough ahead to install Google Chrome, Mozilla Firefox or any of the other alternatives took to Norton's official forum to vent …
Gareth Corfield, 21 Feb 2015
A large hand flicks an icon of a little red man. Image via shutterstock (Lasse Kristensen)

Micro Focus guillotine will fall more frequently on Novell necks

Novell seems to be bearing the brunt of the mammoth restructuring that parent company Micro Focus is currently executing, say our sources close to the situation. This week, Micro Focus issued a profit warning based on the strengthening dollar and went public on a review of the group – trading brands include The Attachmate Group …
Paul Kunert, 10 Apr 2015
Columns of coins in the cloud

Hybrid IT? Not a long-term thing, says AWS CTO

AWS Summit Hybrid IT — systems that are part on-premises and part public cloud — is simply a path to the cloud, not a destination, Amazon CTO Werner Vogels and told the 3,000 attendees at the AWS (Amazon Web Services) Summit in London yesterday. "We have built a whole set of services that allow you to run seamlessly together [services] on- …
Tim Anderson, 16 Apr 2015
Puppet Labs Logo

Puppet Labs pulls strings on Docker, AWS and bare metal

Puppet Labs is adding code management and updates to its Node Manager in a big refresh in Puppet Enterprise 3.8. The company is particularly touting Docker container provisioning, as well as provisioning for bare metal and AWS infrastructure. Tim Zonca, director of product marketing at Puppet Labs, told Vulture South the …
Docker Logo

Docker's just a bit dodgy, but ready for rollout says Gartner

Analyst outfit Gartner has assessed Docker's security – and found the containerisation tool is sound but immature. Gartner's report, Security Properties of Containers Managed by Docker, published last week, finds “Linux containers are mature enough to be used as private and public PaaS” but “disappoint when it comes to secure …
Simon Sharwood, 12 Jan 2015
Key in a wooden door. PIC by Tawheed Mazoor - licensed under CC 2.0

Meat puppet security sucks... let machines find your flaws

Commercial organisations have cash to burn on stopping hackers getting into the network, but relatively little to spend on dealing with a breach. This poses a challenge for Darktrace, a two-year-old organisation founded by former members of the intelligence community and backed by former Autonomy CEO Mike Lynch’s investment fund …
Paul Kunert, 27 Jan 2015

Google: OK world, make our 'End-to-End' crypto tool SPOOK PROOF

Google has released the source code for an encryption plugin for Chrome that makes the secure sending of email easier. The web giant said its End-to-End Chrome plugin, currently in alpha development status, will provide a secure method for transmitting data between users, with data encrypted locally in a user's browser and …
Shaun Nichols, 03 Jun 2014
Rosetta Flash diagram

Weaponised Flash flaw can pinch just about anything from anywhere

Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials. According to the Switzerland-based Google engineer that turned up the vulnerability, Michele Spagnuolo, sites that are/were vulnerable to the attack …

FireEye buys outfit that lifted the lid on Chinese cyber-espionage

Threat prevention firm FireEye has acquired privately held net security firm Mandiant. The cash and shares deal, announced Monday, is valued at around $1bn. Mandiant is best known for its landmark study into the Chinese APT1 hacking crew last year, which exposed the organisation's tactics and evidence of its links to the Chinese …
John Leyden, 03 Jan 2014

China's web giants unite to defuse Windows XP bombshell

A gaggle of Chinese web firms have come together with a plan to protect Windows XP users in the Middle Kingdom for at least the next two or three years, according to local reports. The unusual step will see messaging giant Tencent, search engine Sogou, software company Kingsoft and several others offer technical support for XP …
Phil Muncaster, 25 Feb 2014

Microsoft offers 'free' backup for Azure users with the cloud fear

EVault has promised a year’s worth of cloud backup and disaster recovery services to biz customers who take out an Azure Enterprise agreement with Microsoft. The two firms inked the agreement for EVault to provide the service last week. It's actually a fairly natural fit for users who might be a little unnerved by recent …
Chris Mellor, 05 Nov 2013
balaclava_thief_burglar

Cisco: Hey, IT depts. You're all malware hosts

Everybody – at least every multinational that Cisco checked out for its 2014 Annual Security Report – is hosting malware of some kind, and there aren't enough security professionals to go around. Along with its Managed Threat Defense service launched this week, Cisco also launched the latest publication (here with registration) …

VMware updates vSphere, recommends new security fixes

VMware has released a second update to vSphere 5.5. The headline news in the new release is that hosts can now run up to six terabytes of RAM. And yes, we do mean terabytes. vCenter Server can now support Oracle 12c, Microsoft SQL Server 2012 Service Pack 1 and Microsoft SQL Server 2014. Those considering hybrid cloud get to …
Simon Sharwood, 10 Sep 2014

OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs

Microsoft has fixed a snafu with Windows Defender that took down thousands of business PCs and servers running Windows XP and Server 2003. The software giant responded to sysadmins complaining on TechNet that large numbers of their machines were borked after they’d installed Microsoft’s latest set of antivirus definitions. Once …
Gavin Clarke, 17 Apr 2014

Where will you place your vendor bets in 2015?

There was plenty to keep Europe’s IT channel busy over the past few months, and the rest of this year could be just as turbulent. By the end of 2014, the shakeout of major strategic changes from HP, Dell and Symantec were yet to be felt. But as 2015 progresses, this is likely to change, so keeping a close eye on developments is …

Cybercrooks breed SELF-CLONING MUTANT that STEALS your BANK DETAILS

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method. Infected PCs in the botnet download a secondary strain of …
John Leyden, 02 Jul 2014
Windows XP

Fine! We'll keep updating WinXP's malware sniffer after April, says Microsoft

Microsoft has capitulated to the legions of users who are still running Windows XP once again, by extending support for its antimalware software for the aging OS into 2015. In the past, Redmond has warned that it would discontinue support for Microsoft Security Essentials, Forefront Client Security, Forefront Endpoint Protection …
Neil McAllister, 16 Jan 2014
CTERA_ViPR_video

CTERA gets bitten by EMC's snake, develops ViPR compatibility

Deep breath: cloud storage gateway and cloud services platform product startup CTERA has gone and got itself snake-bitten – it’s now ViPR compatible. ViPR is EMC’s software layer to provide separate control plane orchestration functions and data plane services – such as file, block and object access – across its own and third- …
Chris Mellor, 06 May 2014

Firewall-floggers in FLAMING MESS: Where'd our mystery margin go?

Opinion If you work in the fields of technology distribution, services and resale, you'll surely hear about cloud, mobile, social and virtual more than anything else. However, it is the changing patterns in security spending that are perhaps most dramatically re-shaping our businesses. Gone are the good old days of pushing traditional …

SPLITTERS! Symantec cleft in twain

The reports have been confirmed: Symantec CEO Michael Brown will split the unwieldy business into separate security and information management concerns, thus undoing the 2004 Veritas acquisition. Brown has moved quickly after his confirmation in the role to lift the cleaver. The San Andreas-style fault running through the heart …
Chris Mellor, 10 Oct 2014
Covert Redirect modified logo

'Covert Redirect' OAuth flaw more chest-beat than Heartbleed

A recently reported new "vulnerability" in OAuth appears to be anything but. That unkind assessment has come from security specialists after a flaw called "Covert Redirect" made headlines that conflated the flaw with the Heartbleed vulnerability, a major security risk that legitimately sent administrators scrambling to fix their …
Darren Pauli, 05 May 2014

Don't lose control of those fast-breeding endpoints

Sysadmin blog So you want to know about security? Well you have come to the right place. I have been here for a while and I can tell you that outside these gates it’s full of cowboys, sharks and pirates, none of whom will hesitate to take what is yours and call it their own. The above is is a quote from a brochure I wrote in an attempt to …
Aaron Milne, 22 Oct 2013

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Vision 2007 Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus. Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready …
Austin Modine, 13 Jun 2007

Amazon seeds cloud with apps that flow to streams

re:Invent 2013 Amazon Web Services (AWS') big day it ats re:Invent cloud shindig in fabulous Las Vegas may have been headlined by its disruptive entry into the desktop virtualisation market, but the company also announced a new tributary to its cloudy river in the form of the new AppStream service. Here's how it works. You build and app and …
Simon Sharwood, 14 Nov 2013

Will EMC swallow cloudy upstart? These analysts seem to think so

Any move by EMC to acquire Maginatics — and the latter’s software-only cloud storage gateway — would be a “very smart buy”, according to analyst Ben Woo at technical consultancy Neuralytics, following speculation the storage giant is closing in on the startup. “Software defined storage is not just about on-premise [developments …
Chris Mellor, 21 Oct 2014
Various devices including phone, laptop and tablet

How mobile device management is taking on the BYOD challenge

Every IT manager worth his or her salt would really like to get hold of users’ physical devices to lock down security and manage privileges, protocols and permissions in the perpetual quest for control. This is not always possible. The situation has given rise to industry terminology such as mobile device management (MDM) and …

Securo-borg FireEye coughs $70m to buy 'flight-recorder-for-networks' tech

Security vendor FireEye has bought network forensics firm nPulse Technologies in a $70m deal. FireEye is stumping up $60m in cash and $10m in stock to get its hands on nPulse, a privately held startup that boasts it offers the industry's fastest full packet capture and indexing technology. nPulse’s forensics will be integrated …
John Leyden, 07 May 2014
named data networking

DEATH TO TCP/IP cry Cisco, Intel, US gov and boffins galore

The US National Science Foundation, Cisco, Verisign, Panasonic and boffins from around the world have thrown their weight behind a new “Named Data Networking Consortium” that aims to develop “a practically deployable set of protocols replacing TCP/IP that increases network trustworthiness and security, addresses the growing …
Simon Sharwood, 05 Sep 2014
Fraud image

Windows Server 2003 custom support could cost MILLIONS

Business leaders who dismissed calls from the IT department to migrate off Windows Server 2003 as nothing more than a maintenance exercise could be left rueing a potentially costly seven-figure financial howler. Extended support for the OS expires on 14 July, meaning no more security patches or updates from Microsoft after that …
Paul Kunert, 19 Dec 2014