Connected vehicles are a big new area of investment. We saw evidence of that at the recent Consumer Electronics Show (CES) and we’re hearing a lot more about it this week, as carmakers strut their stuff at the North American International Auto Show. Security isn’t generally part of the conversation, but as we’ve noted here on more than one occasion: connected vehicles introduce a myriad of challenging security problems, from authentication to communications and system integrity, not to mention data privacy. [Read more Security Ledger coverage of connected vehicles here.] Now networking giant Cisco says that it sees a role for its technology in protecting vehicle area networks (VANs), just as the company’s networking equipment enabled and protected local and wide area networks (LANs and WANs) over the last two decades. In a blog post, Cisco said it is rolling out “a range of products and services” that it […]
Search Results for "Cisco"
Cisco Survey: 100% of Fortune 500 Hosting Malware?
If you’re working in IT at a Fortune 500 firm, Cisco Systems has some unwelcome news: you have a malware problem. According to the 2013 Annual Security Report from the networking giant, 100 percent of 30 Fortune 500 firms it surveyed sent traffic to Web sites that host malware. Ninety-six percent of those networks communicated with hijacked servers operated by cyber criminals or other malicious actors and 92 percent transmitted traffic to Web pages without content, which typically host malicious activity. “It was surprising that it was 100 percent, but we know that it’s not if you’re going to be compromised, but when,” said Levi Gundert, a technical lead in Cisco’s Threat Research, Analysis and Communications (TRAC) group in an interview with The Security Ledger. Among the high points (or low points) in Cisco’s Report: Cisco observed the highest number of vulnerabilities and threats on its Intellishield alert service in the 13 years […]
NSA Toolbox Included Hacks For Juniper, Cisco, Dell
The German magazine Der Spiegel made headlines this week with its story detailing the US National Security Agency’s (NSAs) offensive hacking capabilities. The story is based on classified NSA documents absconded with by former contractor Edward Snowden and lays bare a Webster’s Dictionary full of classified hacking tools and programs. Among the highlights of the story: + The NSA developed and deployed a wide range of hacking tools that could compromise hardware from leading IT and networking equipment makers including Cisco Systems, Juniper Networks and the Chinese vendor Huawei and Dell Inc. + The NSA tools were designed to provide persistent access that allowed the NSA to monitor activity on the compromised endpoint, avoid detection by third party security software and survive software and firmware updates. One such tool, DEITYBOUNCE, provided persistent access to Dell’s PowerEdge servers by “exploiting the system BIOS” and using “System Management Mode to […]
Set Top Boxes To Surveillance: Cisco Aims To Be IoT’s 600lb Gorilla
Cisco Systems is one of the biggest ecosystem players with its eyes trained on the Internet of Things. This makes sense. After all, the company made its fortune selling the gear – routers and switches – that make the Internet hum, and that helped extend Internet connectivity to homes and businesses. Along the way, Cisco has been aggressive about acquiring new and promising technologies that promise to grow its top line. took some bad turns – unsuccessfully branching into consumer electronics in 2009 with the acquisition of Pure Digital, maker of the Flip camcorder, and Linksys, a maker of home networking gear, in 2003. The company discontinued the Flip product and sold Linksys to Belkin earlier this year amid a major corporate shake-up designed to re-focus the company. Now, with the next wave (Cisco calls it the 4th) of Internet connectivity upon us – namely: the “Internet of Things” (or […]
INE Security Alert: Top 5 Takeaways from RSAC 2025
Cary, North Carolina, 13th May 2025, CyberNewsWire