Tag

security

Browsing

TPx, a managed services company that offers cybersecurity, managed networks and cloud communications, has added Penetration Scanning to its Security Advisory Services offering.   TPx Penetration Scanning makes use of an automated scanning platform, which allows for quick turnaround times and cost-effective services. This advanced product expands on TPx’s Vulnerability Scanning, which examines network-connected devices in order to discover possible security leaks.   The combination of penetration and vulnerability scanning when used jointly offers a more thorough method of risk identification and security reinforcement. TPx Vulnerability and Penetration Scan simulates hacker behavior to assist clients evaluate the probability that a criminal will be able to successfully attack a company’s weaknesses in order to obtain access to systems or secret information on the network. Scanners track a company’s risk profile in almost real-time, with the  analysis being conducted as a one-time activity or on a regular basis.   Rick Mace, CEO…

The telecom industry is responsible for keeping the globe linked through communications services. There are many aspects of these services that we take for granted, from private calls to business interactions. However, it is only because of the telecom sector that we are able to swiftly connect to individuals all over the world, whether by phone, internet, airwaves or cables.   For years, cybercriminals have targeted telecom operators because they maintain and manage vital communications infrastructure that is used to transport and store vast quantities of private and sensitive data. Cyber-attacks on the telecom industry in particular, have risen dramatically in recent years as technology has advanced and our world has evolved to become more connected.   In this article, we hope to shed light on the threats that the telecommunications sector is facing and explain how providers can defend their digital environments and key infrastructure from possible cyber-attacks. For…

There has recently been a significant surge in Distributed Denial-of-Service (DDoS) assaults all around the world. A DDoS attack is a malicious attempt to interrupt regular traffic to a targeted server, service, or network by flooding the target or its surrounding infrastructure with excessive Internet traffic.   Cloudflare has reported that it has neutralized a Distributed Denial-of-Service attack that leveraged about 15,000 compromised devices and topped at just under 2 Tbps of bandwidth. The assault was believed to have employed a combination of Mirai-infected Internet of Things devices, which are frequently used to conduct enormous DDoS attacks, and unpatched versions of the GitLab developer tool.   The DDoS assault comes only a few weeks after Rapid7 announced a GitLab vulnerability on November 1, 2021, rated a full 10.0 on the CVSS severity scale, that could be leveraged to enable an attacker to remotely run code, and warned that exploitation would…

One of the most frequently asked questions about a VoIP phone system is fundamental and critical, and is as follows: is VoIP secure? To answer the question, no phone system is bulletproof. VoIP has a myriad of benefits, but possible security risks should not be overlooked.   Given the growing number of cybercrimes around the world, the importance of security has never been more significant. In every practical sense, VoIP has a good reputation as a secure technology. Nevertheless, every time you use electronic devices or the Internet, it is wise to understand the security risks that such usage may pose to your business and take appropriate precautions. You might be wondering, how important VoIP security really is? Even if you yourself have never been a victim, the reality is that the threat of security breaches through the phone system is quite serious.   Truthfully, security is a must for…

Robocalls calls have become a plague. It is estimated that Americans alone received more than 58.5 billion robocalls in 2019. While some robotic calls may be from legitimate sources, they can also be scams seeking to deceive or bully people to provide personal information. Early on, robocalls were easy to detect and ignore because the calls came from an area code you did not recognize. However, the scam has become much more sophisticated with the increase in Voice over Internet Protocol (VoIP) dialing, which makes it relatively easy to “spoof” a phone number so that the caller ID shows a different number than the one actually calling. It is now becoming increasingly difficult to determine what is a robocall, and what is not. A robocall is a phone call where an automatic computer dialer uses a pre-recorded message as if it were from a robot. And until recently, that…

Microsoft surprises with new foldable Surface Duo phone running Android Microsoft has unveiled a new dual-screen Android smartphone, the Surface Duo. The folding phone features two 5.6-inch displays that can rotate 360 degrees, which allows it to be fully unfolded as a miniature 8.3-inch tablet. The Surface Duo can run two different apps at the same time, and one of the displays can be used as a game controller or keyboard. Microsoft has incorporated elements of Windows 10X, a new operating system meant for hybrid devices. The company said that the Surface Duo will launch in late 2020, in time for the holiday season. Read more at: https://tinyurl.com/y66mjttm Telefonica Deutschland deploys Infinera DRX for 5G network modernisation Telefonica Deutschland has chosen the Infinera DRX Series to upgrade its national mobile transport network. The Infinera DRX Series is a portfolio of disaggregated routers that combines a carrier-class white box portfolio with Infinera…

Trinity Cyber, a Bowie, Maryland-based cybersecurity services and solutions startup, has announced the completion of a $23 million funding round led by Intel Capital and other top institutional investors. The company claims that it is taking an entirely new approach to cybersecurity and, with the help of its new technology known as Proactive Threat Interference, is able to “proactively intercept and control cyberattacks” before they even reach the target’s network, thus “reducing risk and increasing cost to adversaries.” Steve Ryan, CEO of Trinity Cyber, said, “This investment by Intel Capital and other strategic backers is significant. I co-founded Trinity Cyber to transform the way the world addresses the cyber problem. No one is doing what Trinity Cyber is doing. No one else can. We make the adversary fail, and we feel this strategic support validates the elegance of our solution.” “As cyberattacks become more sophisticated, technology to counter…

FIX Network, an innovative technology company from Vilnius, Lithuania, has developed a new two-factor authentication (2FA) SIM card and app for protecting mobile data and digital identities. The ultimate goal of the company is to provide comprehensive blockchain-based solutions for mobile devices, enabling subscribers to secure their digital assets and identities by safekeeping private keys on their SIM cards. However, due to the urgent and immediate requirement of securing phone numbers – which may be considered to be the most valuable digital identities – FIX Network will provide a free-to-use 2FA application, together with newly issued and truly subscriber-owned phone numbers that will serve as secure and global digital identities. These numbers will be fully controlled by the subscriber, preventing unauthorized porting or malicious hijacking of the phone number. This 2FA solution will also include the practical ability to recover access to digital identities through user-defined policies that include…

The Chinese telecommunications, enterprise and consumer technology and equipment provider ZTE Corporation has launched its first domestic cybersecurity lab in Nanjing, China, thus confirming its commitment to the ICT industry to counter cybersecurity threats. The company is also planning to expand across the globe with similar facilities in the near future, with the first installations being in Italy and Belgium. According to a statement by ZTE, the opening of a new lab represents an important milestone for the company as it aims to increase transparency and enhance trust with third parties, including customers, global regulators and other stakeholders. This initiative is in direct response to the national security concerns that are prompting several countries to apply restrictions on the use of equipment from Chinese vendors in 5G rollouts. Zhong Hong, Chief Security Officer at ZTE, said, “The security lab is an open and cooperative platform for the industry.…

The global organization representing the interests of mobile network operators, GSMA, has called for European governments to “safeguard network security and competition” in the telecommunications infrastructure industry. The association has issued a warning to Europe to refrain from activities that would obstruct the use of certain equipment necessary for 5G mobile network development. According to the GSMA, “Actions that disrupt the equipment supply for the various segments of the network (access, transport and core) will increase costs to European operators, businesses and citizens; delay 5G deployment by years across Europe and potentially also jeopardise the functioning of existing 4G networks upon which 5G is intended to be built.” Although no specific company names are mentioned in the statement, the GSMA initiative highlights the industry’s significant endeavor to prevent the application of additional sanctions, similar to those announced by the United States and Australian governments on Chinese vendors Huawei…