Does ReVuln research show security worries for Smart TVs?

A video posted by Malta-based security firm ReVuln has shown potential security weaknesses in an unspecified Samsung Smart TV.

Rather chillingly titled ‘The TV is Watching You’, the video shows the researchers tampering with TV settings and channel lists, firmware and USB drives among other things which gives them “root” access to the smart TV – in other words, total control of it.

Worryingly, the researchers also found they could hack through the remote control if it’s...

By James Bourne, 17 December 2012, 0 comments. Categories: IPTV, Research, Security, Smart TV.

Are foreign regulators discriminating against Huawei?

In the week that Huawei and ZTE denies being a threat to US national security, is it fair to say that Huawei is being discriminated against by overseas regulatory bodies?

According to Huawei’s Australia chairman John Lord, there were elements of disappointment and obfuscation when the Australian government banned the Chinese vendor from their $40bn+ NBN (National Broadband Network) in March this year.

Lord informed an Australian parliamentary intelligence committee of his worry that this would set a...

By James Bourne, 14 September 2012, 0 comments. Categories: China, Operators, Security.

Cyber activity is keeping the CISO awake at night

By Andrew Kellett, Principal Analyst, Security

Summary

The most worrying issue for C-level security professionals, and the thing that often keeps them awake at night, is the fear of the unknown.

The chief information security officer (CISO) is the person in direct line of fire when security breaches occur, and given the deteriorating state of information security, taking overall responsibility for security-related issues is a perilous role.

During the last 12 months several leading organisations have admitted...

By Ovum Research, 12 July 2012, 0 comments. Categories: Big Data, Security.

Google Apps for Business clears ISO security audit

Google Apps for Business has cleared a key security hurdle by achieving ISO 27001 certification, which it hopes will persuade large businesses that it’s safe to move crucial data and processes to its cloud.

The award was announced on Google’s blog this week by Eran Feigenbaum, Google’s enterprise director of security.

Instead of being a barrier, security is now becoming a reason that businesses switch to the cloud, he wrote. “The reason for this shift is that businesses are beginning...

By Matt Henkes, 30 May 2012, 0 comments. Categories: Apps, Google, Security.

How mobility is challenging IT departments

As mobile devices and applications extend the boundaries of the workplace, IT departments must create new policies and procedures to keep the mobile enterprise accessible, available and secure, according to new research from CompTIA. 

While PCs continue to be a major part of the corporate IT landscape, CompTIA’s new study, “Trends in Enterprise Mobility,” reveals that laptops, ultrabooks, smartphones and tablets increasingly are essential to day-to-day business.

The CompTIA study...

By TotalTelecom, 07 March 2012, 0 comments. Categories: Industry, Mobile, Security.

If Government IT requirements are not driving the tech train, what can be done?

Not too long ago, the government drove the information technology (IT) narrative for computing and telecommunicaitons.  There are many examples:

  • Lease and use of the Hollerith punchcard system for the Cenus of the United States of America. This legitimized the use of technology to improve business activities.
  • The “first” all-electronic computer (albeit without stored programs) the ENIAC. Funded by the government to speed ballistics calculations.  This mainstreamed the idea of digital computation
  • The purchase of the first Univac computer for the US Census Bureau (one...

By Wesley Kaplow, 12 December 2011, 0 comments. Categories: Government, Security.

Lack of collaboration leaves IT open to hackers

Pressure to improve business productivity and a lack of collaboration with different business divisions is leaving also enterprise IT departments open to increased security risks, according to a new report.

The annual ‘State of Endpoint’ study, carried out by the Poneman Institute for endpoint management and security specialist Lumension, found that the number of companies that felt their IT networks were not more secure than a year ago has increased over the past two years to just under two...

By Matt Henkes, 17 November 2011, 0 comments. Categories: Cloud, Industry, Research, Security, Smartphones.

The Creepy - And Insecure - Side of iOS and Android Apps

Want to see the dark side of mobile apps? Just read this great bit of research from Troy Hunt: Secret iOS business; what you don’t know about your apps

As people have noted in the comments, "iOS" (Apple's operating system for iPhones and iPads) is purely the platform Troy Hunt did his research on... but he's really talking about issues with mobile applications.

I'm my unfortunately sure that these type of issues will also be there on apps on Android and probably on other mobile operating systems from Microsoft,...

By Dan York, 25 October 2011, 0 comments. Categories: Apps, Industry, Mobile, Security, Smartphones.

5 tips for data center connectivity

This article was originally posted here in DataCentre Solutions (DSC) Magazine.  Ian Harris is a System Integrators Leader for Ciena in EMEA.

1) The right tool for the job There are many system architectures for data centre connectivity, therefore it is important to select the solution that meets your specific requirements. Which applications is your data centre going to support? How important are speed and latency to...

By Ciena, 22 August 2011, 0 comments. Categories: Big Data, Cabling, Infrastructure, Networks, Security.