|
Intel's zero day threat protection raises more questions than answers |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Intel's zero day threat protection raises more questions than answers Par security_watchdogLe [2011-01-28] à 16:18:26
Présentation : Intel has confirmed to V3.co.uk reports made this week by its chief technology officer Justin Rattner that the chip giant is currently developing security technology that will prevent zero-day attacks. Details on the new technology, which is expected later this year, are thin on the ground. However, Intel seems to be hyping it up already as a major step forward in the fight against cyber crime. Zero day threats cause businesses and security vendors countless headaches because they consist of previously unseen code, and as such render the traditional AV signature update method of threat protection useless. Intel said the technology will also be hardware based, although it isn't clear whether this means a hardware software mix or completely implemented in silicon. Also unclear is whether the offering is the first to come from Intel's proposed acquisition of security giant McAfee, however with the deal having only this week been given a tentative green light by the EU, this is unlikely. Intel said at the time of its proposed acquisition that security will be more effective when enabled in hardware , but serious questions have been raised about whether highly responsive threat protection can really be delivered via a hardware-based system. More and more vendors such as Symantec, Kaspersky and Trend Micro are using the cloud to help protect their customers against zero day threats. A cloud-based system powered by a network of threat intelligence sensors and reputation based technologies can react in real-time and stop threats before they even hit the device. Pushing security down to the hardware level makes it very difficult to be reactive, agile or fundamentally secure. It would be something of a retrograde step if Intel did this with its supposedly ground-breaking new security offering.
Les derniers articles du site "security_watchdog" :
- Postman wins inaugural Cyber Security Challenge - LinkedIn service returns after China outage - 419 scammers use Libyan unrest to con vitcims - Internet Storm Center warns of BIND zero-day flaw - Scammers take to the web to exploit Mubarak and Egyptian unrest - Night Dragon Chinese man admits renting server space to hackers - Patch Tuesday fixes Microsoft and Adobe flaws - Intel's zero day threat protection raises more questions than answers - Are Anonymous threatening reprisals for UK arrests - NoTW phone hacks highlight more concerns for IT managers
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|