Articles about Security Software

De Vaartkapoen. Pic: Bianca Bueno

Security software's a booming market. Why is Symantec stumbling?

Worldwide security software revenue totalled $21.4bn in 2014, a 5.3 per cent increase from 2013's revenue of $20.3bn, according to the serious bean counters at Gartner. A decline in consumer security software and endpoint protection — areas that together account for 39 per cent of the market — was more than offset the strong …
John Leyden, 27 May 2015
man_from_uncle_648

GCHQ: Security software? We'll soon see about THAT

The UK's spook agency GCHQ has been working with the National Security Agency to subvert anti-virus software, according to the latest piece of spoon-fed Snowden info reported on The Intercept. According to Glenn Greenwald's rag, spooks reverse-engineered software products in order to obtain intel – a tactic that will surely come …
Kat Hall, 23 Jun 2015

Cisco security software needs security patch

Cisco's ASA FirePOWER services and ASA CX Services are vulnerable to a denial of service (DoS) bug in the virtualisation layer. The just-updated ASA FirePOWER threat-detection platform and ASA CX (which adds application and user ID awareness to the system) could be forced to reload by an attacker hosing their management …

Symantec data centre security software has security holes

Security bod Stefan Viehböck has detailed holes in Symantec's data centre security platforms that the company plugged this week because they allowed hackers to gain privilege access to management servers. The patches fix holes in the management server for Symantec Critical System Protection (SCSP) 5.2.9 and its predecessor Data …
Darren Pauli, 23 Jan 2015
Lock security

Check Point snaps up mobile security outfit Lacoon

Check Point is buying Lacoon Mobile Security, in a deal that expands the security software firm beyond its core firewall and IDS market while pushing it further into mobile. Terms of the deal, announced Thursday, were undisclosed. Lacoon develops security apps for both iOS and Android, as well as marketing real-time mobile …
John Leyden, 02 Apr 2015
typewriter_wtf_648

Undetectable NSA-linked hybrid malware hits Intel Security radar

CTB Locker ransomware attacks rose 165 per cent in the first three months of 2015. More than a third (35 per cent) of victims were based in Europe, McAfee Labs reported. CTB Locker encrypts files and holds them hostage until the ransom is paid. As such, the crimeware is picking up the baton that dropped with the takedown of the …
John Leyden, 09 Jun 2015
Brute force

Home Wi-Fi security's just as good as '90s PC security! Wait, what?

UK home Wi-Fi security is as bad as PC security was in the 1990s, according to a new study. Security software firm Avast found that more than half of all routers are poorly protected by default or common, easily hacked password/ID combinations. Easily hacked password combinations such as admin/admin or admin/password, or even …
John Leyden, 08 Dec 2014
Homer Simpson reading on a tablet

Adobe: We REALLY are taking Flash security seriously – honest

Adobe insists it is working hard to boost the security defenses in its pilloried Flash Player. The Photoshop giant, based in San Jose, California, says it is making an "extensive" push to secure its plugin before another wave of vulnerabilities are revealed in the software. We're told that, as a result of "recent developments …
Chris Williams, 14 Jul 2015
virus_1_648

Want to download free AV software? Don't have a Muslim name

Exclusive Software export controls are being applied to blacklisted people as well as countries: and these controls apply to routine security packages such as freebie antivirus scanning software, as well as more sensitive technologies, El Reg has concluded. We've come to this way of thinking after investigating why Reg reader Hasan Ali …
John Leyden, 07 Aug 2015

EMC buys cloudy Canuck security company CloudLink

EMC has bought CloudLink – a 20-person Canadian firm specialising in cloud data security software – for an undisclosed price. The software is SecureVM, which provides end-to-end data encryption for hybrid clouds, covering both at-rest and in-flight data for virtualised servers. It’s been an EMC Select Partner since 2013 and …
Chris Mellor, 17 Apr 2015
Flipside RFID-shielded wallet

Your security is just dandy, Apple Pay, but here comes Android

Analysis Most security experts estimate that the security offered within (and by) Apple Pay is superior to that seen in existing contactless credit or debit card systems. However, the success of the technology in the UK may well depend more on commercial factors than anything else, with one payments expert warning that merchants fees …
John Leyden, 16 Jul 2015
apple mac malware vxer

Ex-NSA security bod fanboi: Apple Macs are wide open to malware

A former NSA staffer turned security researcher is warning that bypassing typical OS X security tools is trivial. Patrick Wardle, a former NSA staffer and NASA intern who now heads up research at crowd-sourced security intelligence firm Synack, found that Apple's defensive Gatekeeper technology can be bypassed allowing unsigned …
John Leyden, 07 May 2015

Symantec retires low-end security software

Symantec has quietly retired its PC Tools range of security products. Acquired in 2008, PC Tools offered consumer-and-micro-business-grade anti-virus and network security tools dubbed “Spyware Doctor”, “Internet Security” and “Spyware Doctor with Antivirus”. Buying the Australian company that created the products gave Symantec a …
Simon Sharwood, 28 May 2013
car hacking

Hacker hijack 'threat': Your car's security is Adobe Flash-grade BAD

Democratic Senator Ed Markey (D-MA) has published a report after questioning 20 automakers about the security of their cars' internal networks – and how much personal data they store. The results aren't great. In short, as we've long suspected, the computers in today's cars can be hijacked wirelessly by feeding specially crafted …
Iain Thomson, 09 Feb 2015

Trustwave gobbles up Application Security, gorges itself on tech

Data security biz Trustwave has acquired fellow data security provider Application Security, a startup that specialises in automated database security scanning technologies. Financial terms of the deal, announced on Monday, were undisclosed. Privately-held Application Security develops security software for relational databases …
John Leyden, 12 Nov 2013
apple mac malware vxer

Mac security packages range from peachy to rancid – antivirus tests

Updated Independent tests of Mac antivirus products have discovered that the effectiveness of these security packages runs from a risible 20 per cent to an unimpeachable 100 per cent. German security lab AV-TEST.org put 18 free and paid-for Mac OS X security products and services to the test, discovering widely differing performances in …
John Leyden, 04 Sep 2014
balaclava_thief_burglar

Kaspersky slips server security into PC software as attackers get crafty

Kaspersky Lab is shifting anti-malware code from its enterprise business down to its consumer security software in an effort to cut down on the effectiveness of zero-day attacks. "It's the first time we've done it this way," Denis Nazarov, head of anti-malware research at Kaspersky Lab USA told The Register. "Usually we develop …
Iain Thomson, 14 Jun 2013
Blood image

14 antivirus apps found to have security problems

Organisations should get their antivirus products security tested before deployment because the technology across the board dangerously elevates attack surfaces, COSEINC researcher Joxean Koret says. COSEINC is a Singapore security outfit that has run a critical eye about 17 major antivirus engines and products and found 14 …
Darren Pauli, 29 Jul 2014

Malwarebytes slurps startup, hopes to belch out Mac malware zapper

Security software firm Malwarebytes is moving into the Mac security software market with the acquisition of a start-up and the launch of its first anti-malware product for Apple computers. Malwarebytes Anti-Malware for Mac is designed to detect and remove malware, adware, and PUPs (potentially unwanted programs). The release …
John Leyden, 15 Jul 2015
Malware image

Regin: The super-spyware the security industry has been silent about

A public autopsy of sophisticated intelligence-gathering spyware Regin is causing waves today in the computer security world. But here's a question no one's answering: given this super-malware first popped up in 2008, why has everyone in the antivirus industry kept quiet about it until now? Has it really taken them years to …
Iain Thomson, 24 Nov 2014

Attackers fling Stuxnet-style RATs at critical control software in EUROPE

Security researchers have uncovered a series of Trojan-based attacks which have infiltrated several targets by infecting industrial control system software from the makers of SCADA and ICS systems. The majority of the victims are located in Europe, though at the time of writing at least one US firm's compromised gear appears to …
John Leyden, 26 Jun 2014

John McAfee cuffed by Tennessee cops, faces drug-driving, gun rap

Pic Paranoid wild man of infosec John McAfee was arrested in the US state of Tennessee over the weekend – and charged with driving under the influence, and possession of a handgun while intoxicated. The charismatic ex-boss of security software biz McAfee can be seen grinning in his police mugshot. "Yes, I was arrested while under …
Darren Pauli, 05 Aug 2015

Mobe encryption guru Charles Brookson picks up OBE from the Queen

Charles Brookson – the man behind the encryption algorithms in GSM mobile networks – has collected his OBE from the Queen. Brookson led the team that produced the A5/1, A5/3 and A5/2 algorithms used by countless mobes worldwide to encrypt calls from eavesdroppers. He recently stepped down from his role as chairman of the GSM …
Simon Rockman, 27 Jun 2015
bug on keyboard

Aargh! Bamboozled by security licensing - what works for my family?

Readers' corner And so to El Reg Forums and Edwin, a commentard since 2007, who is having a bit of trouble in choosing IT security software for his family. He writes: I'm rapidly losing my mind in the minefield that is security software, particularly when it comes to licensing many devices... The internet has become useless for this sort of …
Drew Cullen, 19 Feb 2014
Xen project hypervisor logo

Xen hardens up with zero-footprint guest introspection code

The Xen Project's had a nasty run with security of late, thanks to a run of five bad bugs, but has revealed plans to improve matters in the forthcoming version 4.6 of its open-source hypervisor. The Project's new weapon is called libbdvmi and addresses the fact that running security software on a guest virtual machine can be …
Simon Sharwood, 05 Aug 2015
Car-2-Car

The car in front has Kaspersky deep inside

Kaspersky Lab is taking anti-virus in a different direction by embedding it in SCADA-based industrial control systems, components of the Internet of Things, and yep, even cars. The Russian security software firm and SYSGO has teamed up to embed the new Kaspersky Security System platform within SYSGO's real-time operating system …
John Leyden, 02 Mar 2015
bug on keyboard

DARPA enlists hacker talent for $2m security bug-swatting challenge

The US Defense Advanced Research Projects Agency (DARPA) is recruiting members of the hacking community to join its latest Grand Challenge competition: a big-money contest to build software capable of finding and fixing security holes in new code. "We've looked to the expert community, the computer security community, and the …
Iain Thomson, 06 Dec 2013
The Register breaking news

McAfee all-in-one security suite covers PCs, tablets, and smartphones

McAfee has launched an all-in-one cross-platform security suite for consumers that incorporates online storage through biometric authentication as well as a host of other security technologies. Equally importantly, the Intel security division is trying to shake up the way security software is sold to consumers. The McAfee …
John Leyden, 15 May 2013

Quadsys Five charged with fraud over data-slurping allegations

The boys in blue have charged Paul Cox, MD at Oxfordshire-based security outfit Quadsys, with fraud after he and others at the firm allegedly hacked into a rival security reseller to take data, including pricing info. Cox was among five bods arrested in March by Thames Valley Police (TVP) in conjunction with the National Crime …
Paul Kunert, 14 Aug 2015

Spaniard claims WWII WAR HERO pigeon code crack. Explain please

A 22-year old Spaniard claims that he's cracked a previously unsolved WWII coded message. Others have claimed this before and there's nothing particularly solid to back up the latest effort, but let's have a look at it anyway. Dídac Sánchez claims that he had cracked the encryption scheme used in the last undeciphered message …
John Leyden, 28 Aug 2015

F*cking DLL! Avast false positive trashes Windows code libraries

A misfiring signature update from anti-virus developer Avast triggered all sorts of problems on Wednesday. Avast acted promptly by withdrawing the definition update but not before numerous users had fallen foul of the problem. The withdrawn update incorrectly labelled various libraries (dlls) on Windows PCs as potentially malign …
John Leyden, 07 May 2015
Australian attorney general George Brandis by https://www.flickr.com/photos/cebitaus/ cc 2.0 attribution https://creativecommons.org/licenses/by/2.0/

Australian government demands signoff on telco network designs

Australia's attorney-general has dropped some new telecommunications legislation designed to drag carrier networks into the orbit of the nation's top legal officer. The plans, announced last week, would give the government power to demand information about carriers' networks and order changes to networks, with a civil penalties …
Roman_Centurion_from_Wikipedia

Symantec’s dismal results show need for Veritas sale

Symantec’s latest results, published on the day of the Veritas sell-off announcement, show a 14 per cent revenue decline and 49 per cent profit fall on the annual compare. Revenues of $1.5bn produced profits of $117m, compared with $1.74bn and $236m respectively a year ago. On the sequential compare, the previous quarter’s …
Chris Mellor, 12 Aug 2015
Ask toolbar

Vintage Ask toolbar is malware – and we'll kill Jeeves, says Microsoft

Older versions of the Ask toolbar, the bane of many a computer user over the years, has been declared persona non grata by Microsoft, and Redmond says its security software will now kill it on sight. In a June 11 update to its Malware Protection Center site, Microsoft states that older versions of the toolbar, which set itself …
Iain Thomson, 12 Jun 2015
Stock ticker board

Sophos looks to raise £65m with IPO

Security software outfit Sophos is to imminently float on the London Stock Exchange, a move it estimates will raise $100m (£65m), the company announced today. The Oxford-based biz is thought to be targeting a valuation of £1bn, according to The Sunday Times (subscription required). Richard Holway, analyst at TechMarketView …
Kat Hall, 03 Jun 2015
broken_car_window_648

Now car hackers can bust in through your motor's DAB RADIO

Car brakes and other critical systems can be hacked via car infotainment systems, security researchers at NCC Group have revealed. The ingenious hack, demonstrated in an off-road environment, works by sending attack data via digital audio broadcasting (DAB) radio signals. This is similar to a hack that allowed security …
John Leyden, 24 Jul 2015
The Bundestag in Berlin. Pic: Hernán Piñera

Banking trojan besieges Bundestag … for the second time

Online banking trojan Swatbanker has been brought into play in a second round of attacks against the German Bundestag, reports security software firm G DATA. Investigation of the configuration files embedded in the malware have revealed that the Swatbanker botnet integrated new filter functions for the domain "Bundestag.btg" – …
John Leyden, 17 Jun 2015
The Register breaking news

HP slurps up security software firm

HP has bought Fortify Software, strengthening its application security software portfolio. The software security assurance firm essentially offers products which check the security of your software, help organise vulnerabilities so the most dangerous are fixed first and help manage the process of fixing them. Fortify offers …
John Oates, 17 Aug 2010
Great Wall of China

China's internet security giant Qihoo planning global domination

Controversial Chinese software vendor Qihoo 360 has its eyes on world domination after controversial founder Zhou Hongyi told the local press he wants to turn the firm into the planet’s biggest web security biz. Qihoo made its name flogging free AV to bargain-seeking Chinese punters and has since gone on to build a successful …
Phil Muncaster, 06 May 2013

Firms 'coughed $39 BEEELLION' for system software in 2012

The system infrastructure software racket is a steady business and a profit center for the IT industry, and according to projections from IDC, this space is on track to grow steadily over the next few years. IDC just finished taking a snapshot of this hairball segment of the IT racket, examining the sales of 220 vendors across …

Dell System Detect update vulnerability exposed

Dell System Detect doesn't auto-update automatically, leaving millions of systems vulnerable as a result, according to security software firm F-Secure. Even though Dell disputes the problem with its application which interacts with the Dell Support website, F-Secure's claim is based on real figures regarding queries about older …
John Leyden, 08 Apr 2015
The Register breaking news

Big Brother security tech gets $20m

Skyhigh Networks has trousered $20m from VC firms keen on the security company's tech for snooping on corporate networks and locking down banned apps. The $20 megabuck Series E investment round was led by Sequoia Capital along with pre-existing investors Greylock Partners, the company announced on Tuesday. By scanning …
Jack Clark, 22 May 2013
Microsoft Security Essentials

Microsoft Security Essentials loses AV-TEST certification

Microsoft Security Essentials, Redmond’s free antivirus tool for home users and business with up to ten PCs, can detect just 64 per cent of zero-day threats when running under Windows 7. That low detection rate has cost it the AV-TEST Institute’s seal of approval, a certification it hands out to products that meet 11 of 18 …
Simon Sharwood, 30 Nov 2012
man_from_uncle_648

Viral virus bunfight: Dr Web tested rivals like Kaspersky Lab

Russian anti-malware firm Dr.Web tested rivals to see if they blindly accepted malware reports shared through cross-industry intelligence systems like Kaspersky Lab, according to investigative reporter Brian Krebs. However, Dr.Web stopped short of using services such as VirusTotal to trip up rivals, the focus of fiercely …
John Leyden, 02 Sep 2015

HP promises software-defined networking 'ecosystem' and app store

HP has nailed its colours to the mast of the good ship software-defined networking (SDN), today outlining plans to create a multi-vendor ecosystem and an app store. Morten Illum, HP's AsiaPac and Japan veep and general manager for networking, explained HP's plans to The Reg by offering up an example of a user firing up a video …
Simon Sharwood, 01 Oct 2013
Houses of Parliament at night-time

UK.gov chucks another £260m at MOOC-based cyber security training

The UK government has published a progress report praising its own achievements in the two years since it launched an ambitious plan to make Britain the best place to do e-commerce. The National Cyber Security Strategy (NCSS), launched in November 2011, also has the goals of making the UK more resilient to cyber attack, building …
John Leyden, 13 Dec 2013

Kaspersky Lab denies tricking AV rivals into nuking harmless files

Kaspersky Lab deliberately fed bogus malware to its rivals to sabotage their antivirus products, two anonymous former employees allege. Kaspersky says the accusations are false. Reuters reported today that two ex-Kaspersky engineers claim they were tasked with tricking competing antivirus into classifying benign executables …
John Leyden, 14 Aug 2015
backdoor_648

Unhinged Linux backdoor still poses a nuisance, if not a threat

Internet Igors have stitched together a new Linux backdoor. Fortunately for internet hygiene the botnet agent – which packs a variety of powerful features – is faulty and only partially functional. The backdoor, dubbed Dklkt-1 was designed to be a cross-platform nasty capable of infecting both Windows and Linux machines. …
John Leyden, 27 Jul 2015

There's TOO MANY data-leaking healthcare firms, growls Symantec

Security software company Symantec is being drenched in calls from breached health organisations that have lost devices or suffered an information security snafu. Some 80 per cent of the calls its incident response team has received since December are from healthcare firms, topping the charts for the number of breach incidents …
Darren Pauli, 15 Apr 2015
Katherine Archuleta

US OPM boss quits after hackers stole chapter and verse on 21.5m Americans' lives

The director of the US Office of Personnel Management has handed in her resignation in the wake of further revelations about the scale of the hacking attack on the agency. "This morning, I offered, and the President accepted, my resignation as the Director of the Office of Personnel Management," she said in a statement. "I …
Iain Thomson, 10 Jul 2015