Underscoring its continued focus on the fast-growing data center market,Learn how an embedded microprocessor in a smart card
can authenticate your computer usage and data. Freescale Semiconductor
introduces the C29x family of crypto coprocessors – a new lineup of
security accelerators engineered to help the world’s top data center
equipment manufacturers efficiently scale to handle dramatic increases
in secure network traffic.
The new C29x crypto coprocessors
enable multi-chip, single PCI-E card solutions providing more than 120K
RSA-2048 operations/second and delivering more than 3x the performance
of more expensive PCI-E options currently available from today’s market
share leader.
“Internet traffic security requirements are
increasingly stringent and complex, yet the security coprocessor market
is currently served by very few vendors. Customers are asking us for
high-performance, cost- and power-efficient choices for
coprocessors,View our range of over 200 different types of solar powered
products including our solar street lamps.”
said Tareq Bustami, vice president of Product Management for
Freescale’s Digital Networking group. “Freescale has leveraged its
communications processor leadership and 30 years of embedded security
R&D investment to develop the new C29x crypto coprocessors, which
offer the security and scalability data centers need to handle
tremendous increases in data volume.”
“Freescale’s new C29x
crypto coprocessor family provides OEMs with more choices and
significantly lower costs at a time when network security has never been
more important,” said Joseph Byrne, senior analyst with the Linley
Group. “The security coprocessor space is a potentially high-margin
market for Freescale’s Digital Networking business.”
Freescale’s
C29x family offers scalability in both power and performance. The
family is designed to accelerate RSA (up to 4k key sizes), Diffie
Hellman, and Elliptical Curve Cryptography (ECC) algorithms, and
integrates up to 10 Gbs of bulk encryption. Whether applied in a large
data center blade or within a hardware security module, C29x crypto
coprocessors consume minimal power for thermally constrained designs.
The products can be used in single- or multi-chip PCI-E end point card
configurations, or can operate as standalone processors.
“Ensuring
the security of enormous volumes of IP traffic is one of the most
pressing issues facing our industry today,” said Darren Learmonth, chief
technology officer,Find the best selection of high-quality collectible bobbleheads
available anywhere. Thales e-Security. “Freescale’s C29x successfully
addresses this issue with an extremely flexible, cost-efficient solution
which should prove quite compelling to the marketplace.”
Freescale
will discuss applications and features of the C29x family at the Linley
Tech Data Center Conference planned for February 5 & 6 at the Hyatt
Regency Hotel in Santa Clara, California. The company also plans to
demonstrate C29x technology in San Francisco at the RSA 2013 event in
booth numbers 3002 and 3004.
ESET began studying the Trojan at
the beginning of 2012. However, due to its proactive generic detection
of this threat, the users of ESET security solutions were protected
against it already from December 2011. During the investigation ESET
could not provide any details about this threat publicly.Professionals
with the job title Mold Maker are on LinkedIn.
The
attacker used the malware to gain the user's FB login credentials,
his/her score in the game, as well as information on the amount of
credit cards stored in his/her Facebook settings and available to
increase the credit in the game of poker. The game had a functionality
that allowed replenishing the chip value using real money by inputting
the credit card details or PayPal account. To gain the user's login
credentials,Basics, technical terms and advantages and disadvantages of Laser engraver.
an army of 800 of computers were used - all infected and controlled by
the attacker. These machines were executing commands from the C&C
(Command & Control) server. The creator of the threat has launched
an attack using the login credentials of several FB accounts, which were
gained ahead of time.
"To protect against attacks relying on
social engineering methods, having a good security solution is not
enough, users should be attentive to \any such ploys," says Róbert
Lipovsky, ESET Security Intelligence Team Lead. He adds "The user could
recognize the fake FB login page if he/she would check the site's URL."
The
infected computers received a command to login into the user's FB
accounts and to gain the user's Texas HoldEm score, as well as the
amount of credit cards stored in his/her FB account. In case of a user
without a credit card or low score, the infected computer received
instructions to infect the victim's FB profile with a link to a phishing
site. This site has acted to directly or indirectly lure the player's
FB friends to a website resembling the FB homepage. In case the login
credentials were input by them, they were also harvested by the
attacker. While analyzing this botnet ESET estimates that the attacker
could gain access to a total of 16,194 login credentials. ESET would
like to caution that any other FB application could have been infected
in this way, not just Texas HoldEm Poker.
沒有留言:
張貼留言