logo
logo
logo
logo
Carlo Prine 2016-06-08
img

15m telnet nodes, 4.5m printers TCP port 445...

Researchers attempted to ascertain to which extent various internet protocols are in use, where they are located, and how much of this is inherently insecure due to running over non-encrypted, cleartext channels.

Oddly 75 per cent of the servers offering SMB/CIFS services – a usually Microsoft service for file sharing and remote administration for Windows machines – originated in just six countries: the United States, China, Hong Kong, Belgium, Australia and Poland.

Beardsley explained that the research gave the team a fresh perspective on the services deployed on the public side of firewalls the world over.

Although, to the man on the street, the internet is imagined to run over the one or two protocols that the World Wide Web runs on – HTTP and HTTPS – there are loads of other services.

While projects like CAIDA and Shodan perform ongoing telemetry that covers important aspects of the internet, we here at Rapid7 are unaware of any ongoing effort to gauge the general deployment of services on public networks.

collect
0
James Finch 2016-08-08
img

Monitoring code put through the virtualisation atomiser

Network function virtualisation NFV is important to telcos and big data centres, who use it to toss dedicated appliances like firewalls in favour of virtual machines that can spin up and down on demand.

Monitoring, however, is a pain, because functions – and the traffic associated with them – can spin up and down in seconds, anywhere within reason there's demand and infrastructure.

A group of researchers from the University of Rome and Italy's CNIT have put together a distributed framework for the software-defined network StreaMon monitor.

Their D-StreaMon distributed StreaMon proposal, here at Arxiv, has a particular focus on watching out for security threats, getting StreaMon out of middleboxes and into virtual machines.

The authors say the monitor can be virtualised with a straightforward publish/subscribe model: as with other virtualisation solutions, they've separated the control plane which remains a single system from the probes which get pushed out into the infrastructure .

collect
0
Thomas Nye 2017-01-11
img

Juniper is warning users of its SRX firewalls that a borked upgrade leaves a root-level account open to the world.

Any users who issued the "request system software" command with the "partition" option are affected by the bug.

In its first advisory for 2017, the Gin Palace explains the failed upgrade can leave the system in a state where root CLI login is allowed without a password .

It applies to any system upgraded from Junos OS prior to 12.1X46-D65.

When the upgrade failed, the system reverted to a safe mode designed to make sure a sysadmin can get into the system to fix it – but in that mode, the only login available is root without a password.

Other previously-valid authentication credentials are wiped.

collect
0
Michael Hurlock 2017-04-18
img

It's not enough these days to just use antivirus software - that's why this GlassWire Pro: Lifetime License firewall is a perfect bolster to your PC security tactics, now 70% off the original price.

GlassWire is a holistic solution that incorporates network monitoring, host changes and a firewall - and it displays everything in an easy-to-read display, so you have total control over your IT environment the entire time.

Even when you're away from your computer, GlassWire runs in the background, so you can always check up on a report of what happened while you were away.

You can stay ahead of any threats to your network, and even keep your bandwidth usage under control.

GlassWire works on up to three PCs simultaneously, so you can rest easy knowing your information is secure.

Be informed as you need to be: get this GlassWire Pro: Lifetime License for $29, and save 70% off the original price of $99.

collect
0
Robert Rock 2016-07-19
img

C-level briefing: LightCyber EVP Jason Matlof pictured and other cyber security experts talk known threats and firewall shortcomings.

As Jason Matlof, Executive Vice President at LightCyber, says, the attacker being inside the network isn t game over, however.

Over the lifecycle of the attack, when an analyst looks, the dwell time has been measured to be around 6 months, he says.

This means that the cyber security industry has spent years simply focusing on the first few seconds or minutes of a much longer process.

This ultimate objective could be patient or financial records, credit card databases or any other valuable information.

The point is that the attacker, once inside the network, is still several steps away from achieving their goal.

collect
0
Guy Moorhouse 2018-09-05
img

You can reduce the risk of data theft and downtime by using a cloud-based firewall to protect your website and apps.

We've also highlighted the best cloud antivirus

An attack against one is an attack against all with CloudFlare’s advanced firewall rules

CloudFlare is a company that provides content delivery services, DDoS mitigation, Internet security and distributed domain name server providers.

It was founded in 2009.

The solution monitors the internet on a regular basis for any new updates such as attacks and vulnerabilities.

collect
0
Scott Siebenaler 2018-05-03
img

Money spent on a firewall can be easily paid back in dividends of less downtime, and a more secure PC that is hardened from an online attack.

Here are some great firewall software choices to consider.

In addition to the excellent firewall, Bitdefender includes plenty of advanced features including webcam privacy protection, multi-layer ransomware protection, and management from a mobile device.

It also includes an anti-phishing feature, a file shredder to securely delete files, a rescue mode, and a password manager to lock down all the multiple points of vulnerability that are commonly found in modern PC systems.

On the Bitdefender website, the firm points out the many awards that this software has won, including the “Best protection” and “Best performance” awards from AV Test, an independent lab that rates security software.

While the product did win these awards from 2013 up to December 2017’s testing, in the most recent February 2018 test, Bitdefender Internet Security was not chosen as a ‘Top Product’ as a few competitors ranked higher, although the firm still did well.

collect
0
Frank Wilkerson 2018-06-21
img

In this article, we're going to evaluate six of the most popular free firewall distros.

We have tried to emphasise both power and ease of use when considering these offerings and their relative merits.

Follow the steps in our guide here to do this.

A well thought-out distro that's refreshingly easy-to-use

Expands to suit your needs

ClearOS is by far the sleekest looking firewall distro in this roundup.

collect
0
Garland Marsella 2018-08-17
img

IT professionals face a different set of challenges when the back end of a businesses’ IoT infrastructure is in the public cloud.

IT professionals are facing increased complexity in the workplace as more organisations adopt hybrid IT.

Yet this is just one of the ways that hybrid IT is affecting IT departments.

The report also found that, weighted by rank, the primary challenge posed by hybrid IT is the lack of control and visibility into the performance of cloud-based applications and infrastructure, something that is exacerbated by Internet of Things (IoT) devices.

Distributed workloads and IoT devices can create control and visibility issues.

Doing so will help IT professionals better identify solutions to managing IoT and hybrid IT convergence.

collect
0
James Rankins 2017-04-10
img

There's no debating the importance of using security measures to protect your data and computer.

GlassWire's excellent firewall is one such tool for protecting your digital self.

Rated 4.5 out of 5 by PCWorld, GlassWire is an all-encompassing safety solution that allows you to monitor, track, and reinforce your computer with unrivaled control.

With GlassWire, you can keep tabs on current and past network activity, sorting by traffic type, apps, and geographic location.

GlassWire also includes a robust firewall that updates you on your computer's background activity and notifies you when a new app or service accesses the web for the first time.

There is a basic version of GlassWire which you download for free.

collect
0
Jackie Brown 2016-08-09
img

Cybersecurity spending has grown eight percent since last year, says Gartner.

The threat posed by hackers and cybercriminals is proving to be a great financial opportunity for IT security companies: according to analysts Gartner, worldwide spending on information security is set to hit $81.6bn £62.8bn this year.

Gartner says spending on security products and services will grow eight percent year-on-year in 2016, as businesses attempt to spend their way to being secure in the face of the dual threat of both ever more sophisticated cyberattacks and a shortage of cybersecurity professionals.

While preventive measures like firewalls remain the top purchase for security professionals, spending on products that detect and respond to threats that have already infiltrated the network is on the up.

"Organisations are increasingly focusing on detection and response, because taking a preventive approach has not been successful in blocking malicious attacks," said Elizabeth Kim, senior research analyst at Gartner.

Given the shortage of cybersecurity staff, Gartner predicts that spending on secure web gateways and detection-and-response approaches will grow by another 10 percent by 2020 as firms look to plug the security gap and effectively detect threats.

collect
0
Harry Smith 2018-05-29
img

Are you looking to setup a home network with your PC for downloading heavy data files? Have you been looking for the best program to keep your network and PC safe from any unauthorized access? Personal firewalls provide your network and PC with security and privacy against any hackers and cyber-criminals. The team of tech experts working with us has come up with a list of the best personal firewall programs for your PC and network security. Connect with our skilled task force at Norton Antivirus Support for the best assistance in this matter. Simply dial the toll-free number and our professionals will resolve any network or PC issue faced by you. Visit Us At, http://www.support-tech-247.com/norton-antivirus-support/

collect
0
Ryan Pak 2018-02-06
img

Video A security researcher who last year demonstrated that X.509 certificate exchanges could carry malicious traffic has now published his proof-of-concept code.

Fidelis Cybersecurity's Jason Reaves has disclosed a covert channel that uses fields in X.509 extensions to carry data.

The X.509 standard defines the characteristics of public key certificates and anchors much of the world's public key infrastructure; for example, it defines the certificates exchanged at the start of a TLS session.

The reason this matters, Reaves explained in a presentation at the Bsides conference in July 2017, is that if a company suffered a breach the attacker could exfiltrate data over the X.509 path without being noticed.

TLS uses X.509 for certificate exchange, during the handshake process that sets up an encrypted communication.

In brief, TLS X.509 certificates have many fields where strings can be stored … The fields include version, serial number, Issuer Name, validity period and so on.

collect
0
Earl Rizvi 2018-04-16
img

Read on for our detailed analysis of each app

In the 1990s, Microsoft had a problem: Windows seemed to suffer from endless security problems that hackers and other online villains were quick to exploit.

So Microsoft began building its own firewall into Windows, but there has been ongoing controversy as to its robustness as a ‘best solution’, or whether it's merely just good enough.

These are the firewall apps we think you should consider using no matter which version of Windows you're running.

Some antivirus providers bundle a firewall with their free antivirus software, while others only include one with their premium security suites.

Offers real-time protection and extra tools for Wi-Fi security

collect
0
Michael Lofton 2017-03-14
img

French tech executive Nicolas Thibaut has been working for a few years now on a concept that’s morphed a bit in response to changing digital security challenges and in service of a pretty straightforward agenda: To bring “business-level security,” as he puts it, “to as many people as possible.”

Contained in his story are a few thematic cross-currents, everything from having to adapt as security threats and breaches come with bigger stakes and scarier implications to the imperative to move beyond a small market (in his case, a home base of Eastern Europe) to be able to do more and be more.

He talked with BGR about his journey from tinkering in his free time to founding Uppersafe, which his team describes as an easy to use cloud-based protection solution the team has especially been focused on adapting for new smart objects like TVs, fridges and coffee machines that don’t have much or anything in the way of protections of their own.

It was a side project at the time, says Thibaut, one of a small group that manages the service which counts more than 80,000 users worldwide.

Also on the team are commercial and marketing manager Didier Thibaut and IT security consultant Lucas Philippe.

“At the time, I was a freelance pentester, so it was just about discovering a bit how VPN technology works,” Thibaut said.

collect
0
Jerrell Lawson 2016-12-22
img

Two weeks ago in part 2 of the indispensables series I made mention of a network scanning app called iNet Network Scanner.

I ve used this app on my Mac for years and love it, but it also comes in two iOS versions, which I ve only begun using recently.

After that mention I thought it worthwhile to take a deeper look at how iNet Network Scanner works and why it s worth your while to to grab one or all versions of this app.

iNet Network Scanner helps you gat a handle on your network by quickly scanning the range of IP address defined by your Mac s IP address and subnet mask.

By default the app sorts devices based upon their IP address, but you can also sort by device name or vendor.

The app s initial scan gathers information from each device on your network, gets its IP and MAC addresses, checks to see if it responds to a ping, and checks to see what kinds of services are being offered by the device.

collect
0
Carlo Prine 2016-06-08
img

15m telnet nodes, 4.5m printers TCP port 445...

Researchers attempted to ascertain to which extent various internet protocols are in use, where they are located, and how much of this is inherently insecure due to running over non-encrypted, cleartext channels.

Oddly 75 per cent of the servers offering SMB/CIFS services – a usually Microsoft service for file sharing and remote administration for Windows machines – originated in just six countries: the United States, China, Hong Kong, Belgium, Australia and Poland.

Beardsley explained that the research gave the team a fresh perspective on the services deployed on the public side of firewalls the world over.

Although, to the man on the street, the internet is imagined to run over the one or two protocols that the World Wide Web runs on – HTTP and HTTPS – there are loads of other services.

While projects like CAIDA and Shodan perform ongoing telemetry that covers important aspects of the internet, we here at Rapid7 are unaware of any ongoing effort to gauge the general deployment of services on public networks.

Thomas Nye 2017-01-11
img

Juniper is warning users of its SRX firewalls that a borked upgrade leaves a root-level account open to the world.

Any users who issued the "request system software" command with the "partition" option are affected by the bug.

In its first advisory for 2017, the Gin Palace explains the failed upgrade can leave the system in a state where root CLI login is allowed without a password .

It applies to any system upgraded from Junos OS prior to 12.1X46-D65.

When the upgrade failed, the system reverted to a safe mode designed to make sure a sysadmin can get into the system to fix it – but in that mode, the only login available is root without a password.

Other previously-valid authentication credentials are wiped.

Robert Rock 2016-07-19
img

C-level briefing: LightCyber EVP Jason Matlof pictured and other cyber security experts talk known threats and firewall shortcomings.

As Jason Matlof, Executive Vice President at LightCyber, says, the attacker being inside the network isn t game over, however.

Over the lifecycle of the attack, when an analyst looks, the dwell time has been measured to be around 6 months, he says.

This means that the cyber security industry has spent years simply focusing on the first few seconds or minutes of a much longer process.

This ultimate objective could be patient or financial records, credit card databases or any other valuable information.

The point is that the attacker, once inside the network, is still several steps away from achieving their goal.

Scott Siebenaler 2018-05-03
img

Money spent on a firewall can be easily paid back in dividends of less downtime, and a more secure PC that is hardened from an online attack.

Here are some great firewall software choices to consider.

In addition to the excellent firewall, Bitdefender includes plenty of advanced features including webcam privacy protection, multi-layer ransomware protection, and management from a mobile device.

It also includes an anti-phishing feature, a file shredder to securely delete files, a rescue mode, and a password manager to lock down all the multiple points of vulnerability that are commonly found in modern PC systems.

On the Bitdefender website, the firm points out the many awards that this software has won, including the “Best protection” and “Best performance” awards from AV Test, an independent lab that rates security software.

While the product did win these awards from 2013 up to December 2017’s testing, in the most recent February 2018 test, Bitdefender Internet Security was not chosen as a ‘Top Product’ as a few competitors ranked higher, although the firm still did well.

Garland Marsella 2018-08-17
img

IT professionals face a different set of challenges when the back end of a businesses’ IoT infrastructure is in the public cloud.

IT professionals are facing increased complexity in the workplace as more organisations adopt hybrid IT.

Yet this is just one of the ways that hybrid IT is affecting IT departments.

The report also found that, weighted by rank, the primary challenge posed by hybrid IT is the lack of control and visibility into the performance of cloud-based applications and infrastructure, something that is exacerbated by Internet of Things (IoT) devices.

Distributed workloads and IoT devices can create control and visibility issues.

Doing so will help IT professionals better identify solutions to managing IoT and hybrid IT convergence.

Jackie Brown 2016-08-09
img

Cybersecurity spending has grown eight percent since last year, says Gartner.

The threat posed by hackers and cybercriminals is proving to be a great financial opportunity for IT security companies: according to analysts Gartner, worldwide spending on information security is set to hit $81.6bn £62.8bn this year.

Gartner says spending on security products and services will grow eight percent year-on-year in 2016, as businesses attempt to spend their way to being secure in the face of the dual threat of both ever more sophisticated cyberattacks and a shortage of cybersecurity professionals.

While preventive measures like firewalls remain the top purchase for security professionals, spending on products that detect and respond to threats that have already infiltrated the network is on the up.

"Organisations are increasingly focusing on detection and response, because taking a preventive approach has not been successful in blocking malicious attacks," said Elizabeth Kim, senior research analyst at Gartner.

Given the shortage of cybersecurity staff, Gartner predicts that spending on secure web gateways and detection-and-response approaches will grow by another 10 percent by 2020 as firms look to plug the security gap and effectively detect threats.

Ryan Pak 2018-02-06
img

Video A security researcher who last year demonstrated that X.509 certificate exchanges could carry malicious traffic has now published his proof-of-concept code.

Fidelis Cybersecurity's Jason Reaves has disclosed a covert channel that uses fields in X.509 extensions to carry data.

The X.509 standard defines the characteristics of public key certificates and anchors much of the world's public key infrastructure; for example, it defines the certificates exchanged at the start of a TLS session.

The reason this matters, Reaves explained in a presentation at the Bsides conference in July 2017, is that if a company suffered a breach the attacker could exfiltrate data over the X.509 path without being noticed.

TLS uses X.509 for certificate exchange, during the handshake process that sets up an encrypted communication.

In brief, TLS X.509 certificates have many fields where strings can be stored … The fields include version, serial number, Issuer Name, validity period and so on.

Michael Lofton 2017-03-14
img

French tech executive Nicolas Thibaut has been working for a few years now on a concept that’s morphed a bit in response to changing digital security challenges and in service of a pretty straightforward agenda: To bring “business-level security,” as he puts it, “to as many people as possible.”

Contained in his story are a few thematic cross-currents, everything from having to adapt as security threats and breaches come with bigger stakes and scarier implications to the imperative to move beyond a small market (in his case, a home base of Eastern Europe) to be able to do more and be more.

He talked with BGR about his journey from tinkering in his free time to founding Uppersafe, which his team describes as an easy to use cloud-based protection solution the team has especially been focused on adapting for new smart objects like TVs, fridges and coffee machines that don’t have much or anything in the way of protections of their own.

It was a side project at the time, says Thibaut, one of a small group that manages the service which counts more than 80,000 users worldwide.

Also on the team are commercial and marketing manager Didier Thibaut and IT security consultant Lucas Philippe.

“At the time, I was a freelance pentester, so it was just about discovering a bit how VPN technology works,” Thibaut said.

James Finch 2016-08-08
img

Monitoring code put through the virtualisation atomiser

Network function virtualisation NFV is important to telcos and big data centres, who use it to toss dedicated appliances like firewalls in favour of virtual machines that can spin up and down on demand.

Monitoring, however, is a pain, because functions – and the traffic associated with them – can spin up and down in seconds, anywhere within reason there's demand and infrastructure.

A group of researchers from the University of Rome and Italy's CNIT have put together a distributed framework for the software-defined network StreaMon monitor.

Their D-StreaMon distributed StreaMon proposal, here at Arxiv, has a particular focus on watching out for security threats, getting StreaMon out of middleboxes and into virtual machines.

The authors say the monitor can be virtualised with a straightforward publish/subscribe model: as with other virtualisation solutions, they've separated the control plane which remains a single system from the probes which get pushed out into the infrastructure .

Michael Hurlock 2017-04-18
img

It's not enough these days to just use antivirus software - that's why this GlassWire Pro: Lifetime License firewall is a perfect bolster to your PC security tactics, now 70% off the original price.

GlassWire is a holistic solution that incorporates network monitoring, host changes and a firewall - and it displays everything in an easy-to-read display, so you have total control over your IT environment the entire time.

Even when you're away from your computer, GlassWire runs in the background, so you can always check up on a report of what happened while you were away.

You can stay ahead of any threats to your network, and even keep your bandwidth usage under control.

GlassWire works on up to three PCs simultaneously, so you can rest easy knowing your information is secure.

Be informed as you need to be: get this GlassWire Pro: Lifetime License for $29, and save 70% off the original price of $99.

Guy Moorhouse 2018-09-05
img

You can reduce the risk of data theft and downtime by using a cloud-based firewall to protect your website and apps.

We've also highlighted the best cloud antivirus

An attack against one is an attack against all with CloudFlare’s advanced firewall rules

CloudFlare is a company that provides content delivery services, DDoS mitigation, Internet security and distributed domain name server providers.

It was founded in 2009.

The solution monitors the internet on a regular basis for any new updates such as attacks and vulnerabilities.

Frank Wilkerson 2018-06-21
img

In this article, we're going to evaluate six of the most popular free firewall distros.

We have tried to emphasise both power and ease of use when considering these offerings and their relative merits.

Follow the steps in our guide here to do this.

A well thought-out distro that's refreshingly easy-to-use

Expands to suit your needs

ClearOS is by far the sleekest looking firewall distro in this roundup.

James Rankins 2017-04-10
img

There's no debating the importance of using security measures to protect your data and computer.

GlassWire's excellent firewall is one such tool for protecting your digital self.

Rated 4.5 out of 5 by PCWorld, GlassWire is an all-encompassing safety solution that allows you to monitor, track, and reinforce your computer with unrivaled control.

With GlassWire, you can keep tabs on current and past network activity, sorting by traffic type, apps, and geographic location.

GlassWire also includes a robust firewall that updates you on your computer's background activity and notifies you when a new app or service accesses the web for the first time.

There is a basic version of GlassWire which you download for free.

Harry Smith 2018-05-29
img

Are you looking to setup a home network with your PC for downloading heavy data files? Have you been looking for the best program to keep your network and PC safe from any unauthorized access? Personal firewalls provide your network and PC with security and privacy against any hackers and cyber-criminals. The team of tech experts working with us has come up with a list of the best personal firewall programs for your PC and network security. Connect with our skilled task force at Norton Antivirus Support for the best assistance in this matter. Simply dial the toll-free number and our professionals will resolve any network or PC issue faced by you. Visit Us At, http://www.support-tech-247.com/norton-antivirus-support/

Earl Rizvi 2018-04-16
img

Read on for our detailed analysis of each app

In the 1990s, Microsoft had a problem: Windows seemed to suffer from endless security problems that hackers and other online villains were quick to exploit.

So Microsoft began building its own firewall into Windows, but there has been ongoing controversy as to its robustness as a ‘best solution’, or whether it's merely just good enough.

These are the firewall apps we think you should consider using no matter which version of Windows you're running.

Some antivirus providers bundle a firewall with their free antivirus software, while others only include one with their premium security suites.

Offers real-time protection and extra tools for Wi-Fi security

Jerrell Lawson 2016-12-22
img

Two weeks ago in part 2 of the indispensables series I made mention of a network scanning app called iNet Network Scanner.

I ve used this app on my Mac for years and love it, but it also comes in two iOS versions, which I ve only begun using recently.

After that mention I thought it worthwhile to take a deeper look at how iNet Network Scanner works and why it s worth your while to to grab one or all versions of this app.

iNet Network Scanner helps you gat a handle on your network by quickly scanning the range of IP address defined by your Mac s IP address and subnet mask.

By default the app sorts devices based upon their IP address, but you can also sort by device name or vendor.

The app s initial scan gathers information from each device on your network, gets its IP and MAC addresses, checks to see if it responds to a ping, and checks to see what kinds of services are being offered by the device.