Tag: malware

Who goes there? Why router authentication may be an ISP’s weakest link

Many ISPs underestimate the level of risk to their own backend infrastructure from poorly secured household routers. The growing use of intelligent CPE to deliver data-centric, value-added services to the home in concert with cloud-based servers means that routers are now more tightly coupled to the service provider’s core network than ever before. This blog outlines the dangers to ISP revenue, reputation and quality of service if CPE authentication processes are inadequate. We’ll also look at how ISPs can add a trusted and unclonable identity into each device to safeguard the integrity of their own network and services.

Read More

Protecting routers from ‘the perfect storm’

As routers become more advanced and take a greater role in delivering advanced services, they also become an even more attractive target for bad actors. There should be few things that scare broadband service providers more than their router population becoming infected with persistent malware.
In this blog, we will cover the importance for ISPs to have a trusted and unclonable identity into each CPE in order to safeguard the integrity of their own network and services. Plus we will answer how ISPs can ensure that its CPE suppliers build the right security foundation into the CPE and that their CPE always runs the intended software, and any malicious modification is detected and efficiently remediated.

Read More

Why application security testing is only half the battle

With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.

Read More

Buyer Beware! Are you sure it’s not an illicit streaming device?

Black Friday and Cyber Monday were the peak shopping days ahead of the festive holidays. Bargains galore for consumers. A bonanza for online retailers as well as pirates! With the increased professionalism of pirates, some consumers may not realize they’ve bought an illicit streaming device (ISD).

Legal but modified
Over the years we’ve seen that the most popular devices exploited by pirates are

Read More
Loading