2013年1月30日 星期三

Freescale Expands Data Center Focus

Underscoring its continued focus on the fast-growing data center market, Freescale Semiconductor introduces the C29x family of crypto coprocessors – a new lineup of security accelerators engineered to help the world’s top data center equipment manufacturers efficiently scale to handle dramatic increases in secure network traffic.

The new C29x crypto coprocessors enable multi-chip,Automate patient flow and quickly track hospital assets and people using howotipper. single PCI-E card solutions providing more than 120K RSA-2048 operations/second and delivering more than 3x the performance of more expensive PCI-E options currently available from today’s market share leader.A collection of natural parkingsensor offering polished or tumbled finishes and a choice of sizes.

“Internet traffic security requirements are increasingly stringent and complex, yet the security coprocessor market is currently served by very few vendors. Customers are asking us for high-performance, cost- and power-efficient choices for coprocessors,” said Tareq Bustami, vice president of Product Management for Freescale’s Digital Networking group. “Freescale has leveraged its communications processor leadership and 30 years of embedded security R&D investment to develop the new C29x crypto coprocessors, which offer the security and scalability data centers need to handle tremendous increases in data volume.”

“Freescale’s new C29x crypto coprocessor family provides OEMs with more choices and significantly lower costs at a time when network security has never been more important,” said Joseph Byrne, senior analyst with the Linley Group. “The security coprocessor space is a potentially high-margin market for Freescale’s Digital Networking business.”

Freescale’s C29x family offers scalability in both power and performance. The family is designed to accelerate RSA (up to 4k key sizes), Diffie Hellman, and Elliptical Curve Cryptography (ECC) algorithms, and integrates up to 10 Gbs of bulk encryption. Whether applied in a large data center blade or within a hardware security module, C29x crypto coprocessors consume minimal power for thermally constrained designs.Features useful information about ventilationsystem tiles. The products can be used in single- or multi-chip PCI-E end point card configurations, or can operate as standalone processors.

“Ensuring the security of enormous volumes of IP traffic is one of the most pressing issues facing our industry today,” said Darren Learmonth, chief technology officer, Thales e-Security. “Freescale’s C29x successfully addresses this issue with an extremely flexible, cost-efficient solution which should prove quite compelling to the marketplace.”

Freescale will discuss applications and features of the C29x family at the Linley Tech Data Center Conference planned for February 5 & 6 at the Hyatt Regency Hotel in Santa Clara, California. The company also plans to demonstrate C29x technology in San Francisco at the RSA 2013 event in booth numbers 3002 and 3004.

ESET began studying the Trojan at the beginning of 2012. However, due to its proactive generic detection of this threat, the users of ESET security solutions were protected against it already from December 2011. During the investigation ESET could not provide any details about this threat publicly.

The attacker used the malware to gain the user's FB login credentials, his/her score in the game, as well as information on the amount of credit cards stored in his/her Facebook settings and available to increase the credit in the game of poker. The game had a functionality that allowed replenishing the chip value using real money by inputting the credit card details or PayPal account. To gain the user's login credentials, an army of 800 of computers were used - all infected and controlled by the attacker. These machines were executing commands from the C&C (Command & Control) server. The creator of the threat has launched an attack using the login credentials of several FB accounts, which were gained ahead of time.

"To protect against attacks relying on social engineering methods, having a good security solution is not enough, users should be attentive to \any such ploys," says Róbert Lipovsky, ESET Security Intelligence Team Lead. He adds "The user could recognize the fake FB login page if he/she would check the site's URL."

The infected computers received a command to login into the user's FB accounts and to gain the user's Texas HoldEm score, as well as the amount of credit cards stored in his/her FB account. In case of a user without a credit card or low score,Product information for Avery Dennison customkeychain products. the infected computer received instructions to infect the victim's FB profile with a link to a phishing site. This site has acted to directly or indirectly lure the player's FB friends to a website resembling the FB homepage. In case the login credentials were input by them, they were also harvested by the attacker. While analyzing this botnet ESET estimates that the attacker could gain access to a total of 16,194 login credentials. ESET would like to caution that any other FB application could have been infected in this way,Want to find solarpanel? not just Texas HoldEm Poker.

沒有留言:

張貼留言