Varanoid.com

Thumbnail 0

Is Data Encryption Compromising Network Performance? Not with WatchGuard.

New WatchGuard Firebox M400 and M500 NGFW and UTM appliances outperform the competition by 61 percent, delivering uncompromised security to meet the rise of encrypted traffic head-on. Rising Network Traffic Leads to Compromised Security Encrypted network traffic growth is exploding! Enterprises and service providers are adopting data encryption as a security precaution – especially as the fallout from the “Snowden effect” continues. Encrypted data use in the U.S

Less is, umm, less?, (Tue, Nov 25th) 0

Less is, umm, less?, (Tue, Nov 25th)

Following vulnerabilities discovered in tools many Linux and Information Security enthusiasts use such as the strings command and the bash shell, a new series of issues have been discovered in the less command. Less is used to paginate output, and can be used to view the text contents of a file one page at a time.

TA14-329A: Regin Malware 0

TA14-329A: Regin Malware

Original release date: November 25, 2014 Systems Affected Microsoft Windows NT, 2000, XP, Vista, and 7 Overview On November 24, 2014, Symantec released a report on Regin, a sophisticated backdoor Trojan used to conduct intelligence-gathering campaigns. At this time, the Regin campaign has not been identified targeting any organizations within the United States.

Guest diary: Detecting Suspicious Devices On-The-Fly, (Tue, Nov 25th) 0

Guest diary: Detecting Suspicious Devices On-The-Fly, (Tue, Nov 25th)

If you apply classic hardening rules (keep the patch level, use an AV, enable the firewall and use them with due diligence), modern operating systems are more and more difficult to compromise today. Extra tools like EMET could also raise the bar. On the other side, networks are more and more populated with unknown/personal devices or devices which provide multiple facilities like storage (NAS), printers (MFP), VoIP, IP camera, …

Regin: Another Military-Grade Malware 0

Regin: Another Military-Grade Malware

Regin is another military – grade surveillance malware (tech details from Symantec and Kaspersky ). It seems to have been in operation between 2008 and 2011. The Intercept has linked it to NSA/GCHQ operations, although I am still skeptical of the NSA/GCHQ hacking Belgian cryptographer Jean-Jacques Quisquater