Absolute Computrace – Security Vulnerability Claims

On August 6, 2014, Kaspersky Lab presented research at the Black Hat event in Las Vegas. This was the same research they presented at an event in February 2014. The research contained the same assertions about perceived vulnerabilities with Absolute Computrace technology. In particular, Kaspersky restated their claims that Absolute Computrace can be activated without the customer’s knowledge.

Spotlight

Bayshore Networks

Bayshore Networks® is the cybersecurity leader for the Industrial Internet of Things. Our award-winning, patented IT/OT Gateway platform provides IT departments with unprecedented visibility into OT operations. The Bayshore platform enables Fortune 1000 industrial and enterprise customers to rapidly build and execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, and robotics automation. The Bayshore platform deploys from the cloud, as a virtual machine, or as a gateway hardware appliance. Bayshore has strategic partnerships with leading technology companies including Cisco Systems and BAE Systems.

OTHER WHITEPAPERS
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Cloud Native Security Model

whitePaper | December 23, 2022

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More

Spotlight

Bayshore Networks

Bayshore Networks® is the cybersecurity leader for the Industrial Internet of Things. Our award-winning, patented IT/OT Gateway platform provides IT departments with unprecedented visibility into OT operations. The Bayshore platform enables Fortune 1000 industrial and enterprise customers to rapidly build and execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, and robotics automation. The Bayshore platform deploys from the cloud, as a virtual machine, or as a gateway hardware appliance. Bayshore has strategic partnerships with leading technology companies including Cisco Systems and BAE Systems.

Events