11.5 C
Friday, October 20, 2017
Home Tags World Wide Web

Tag: World Wide Web

Jakarta, Indonesia, 8 June 2016: Huawei, Canovate and IBM are among the latest companies to join the line-up of more than one hundred exhibitors at Indonesia’s first major ICT event – which will provide a platform for Indonesia to strengthen its quest to build a robust digital economy and ecosystem.Communic Indonesia 2016 – which focuses on data centres and Cloud technologies, big data, cable and satellite, and enterprise solutions – will be collocated with a dedicated series of industry events, including the Indonesia ICT Summit and Broadcast Indonesia 2016, all taking place at the Jakarta International Expo, in Kemayoran, from Wednesday, August 31 to Saturday, September 3.Together with Broadcast Indonesia 2016, Communic Indonesia 2016 is expected to attract more than 450 exhibitors from across Asia and beyond, showcasing ICT solutions and digital multimedia and entertainment technology to operators, ISPs and broadcasters under one roof.

An exciting line up of speakers – featuring Ericsson, Hewlett-Packard and Bitcoin Indonesia – has also been confirmed. “Indonesia is fast becoming South East Asia’s up-and-coming region in the ICT and digital multimedia market, with huge growth potential across the country,” said Show Director Rupert Owen. “Communic Indonesia will gather industry professionals from across the region to network and discuss a multitude of relevant industry issues, opportunities and challenges relating to satellite, Internet of Things, big data, Cloud, security, and 4G, 5G and LTE.” Communic Indonesia 2016 is expected to attract more than 12,000 visitors across the four days, with more than 11 countries participating, including China, Germany, Hong Kong, Indonesia, Philippines, Singapore, Taiwan, Thailand and the USA. Indonesia – which spans more than 17,000 islands – currently has a population of more than 250 million people and is expected to reach 258.6 million by the end of 2016.

The country depends on the continuing investment in the communications infrastructure to provide essential services and meet the growing needs and expectations of its consumers. “As the government announces the Indonesia Broadband Plan, major investments are expected in the broadband connectivity infrastructure and its related ICT verticals,” said Mr Ben Wong, President Director of event organiser PT Pamerindo Indonesia. “The Jakarta International Expo is a world-class venue located in the heart of Indonesia and we are confident the event will provide the ideal platform to discuss Indonesia’s digital future.” -ENDS- If you would like to connect with us on social media, please visit the below links. Facebook: https://www.facebook.com/communicindonesia/?fref=tsLinkedin: https://www.linkedin.com/groups/7001307Twitter: @CommunicIndo For further information, please contact Jayne Garfitt or Michelle Mahoney at Proactive International PR on +44 1636 812152. Or send an email to jayne.garfitt@proactive-pr.com or michelle.mahoney@proactive-pr.com
…Computop’s secure Paygate platform enables reliable and secure international and domestic payment processing for audiences in key global markets…London, United Kingdom – 08 June 2016 – Computop, the leading payment service provider (PSP), today announced it is helping Bigpoint, the online game developer and publisher, maximise monetisation for its gaming products in international markets.
Serving 385 million registered users in 200 countries, Bigpoint offers its global audience 180+ payment methods and manages over 1 billion commerce transactions daily on its gaming platform. Founded in 2002, Bigpoint’s free-to-play online distribution model enables consumers to play and enjoy its games on multiple devices to suit their gaming needs. Users can elect to pay absolutely nothing and still enjoy the game, or customise their experience by purchasing items through micro transactions during the game.

The Computop Paygate platform underpins the payment processing for Bigpoint in a variety of regions around the world including Europe, Eastern Europe, as well as South and North America. The relationship with Computop has seen Bigpoint expand the boundaries of its free-to-play games to a variety of global territories. With an international footprint, and deep local market domestic knowledge, Computop is able to facilitate the right payment mix for the user communities Bigpoint serves. “Providing the right payment mix has a direct impact on our conversion rates,” confirms Nils Plohmann, Lead Payment Manager at Bigpoint GmbH. “In Brazil, for example, Computop has enabled us to team up with PagBrasil, a specialist provider of local online payment methods popular with Brazilian consumers.

Following the switchover to payment using PagBrasil, our online transaction conversion rates experienced a major increase.” The extensive range of acquiring banks connected to the Computop Paygate platform also gives Bigpoint the flexibility to switch with ease to providers offering the domestic payment methods it needs to generate increased conversion and acceptance rates.

For example, this facility recently enabled Bigpoint to initiate a test run with Chase Paymentech in the US. “With Computop’s assistance we’ve been able to evaluate if migrating to Chase Paymentech would deliver more appealing payment options for US players.

The results were impressive, generating a 20-30% jump in conversion rates in what is one of our Top Five global markets,” said Plohmann. “Our deep understanding of relevant international and domestic payment methods that increase conversion has helped Bigpoint to expand into new markets and acquire new customers,” comments Ralf Gladis, CEO of Computop. “In contrast to our competitors, Computop doesn't sell financial services.

Customers like Bigpoint can therefore take advantage of a vast choice of local experts worldwide and pick the best financial partner for each geography in order to maximise success rates in local territories.” ENDS About BigpointBigpoint is a leading global online game developer and publisher. Headquartered in Hamburg, Germany, Bigpoint designs high-quality games for all gamer segments for browser, client and mobile.

They are published on bigpoint.com, as well as by more than 1,000 international distribution partners and media companies. Employees from 35 countries use state-of-the-art technology to transform the industry with innovative gaming concepts, while setting international standards to fulfill the expectations of more than 350 million gamers in over 200 countries.

Every one of the 40 online games in Bigpoint´s portfolio is free-to-play and includes a customized micropayment system for each game to allow users to make micropayments to speed up their game progression. Many of the titles have won various international prizes and audience awards, such as the German Developer Award 2014 and the Game Connection Award 2015 for Shards of War. In addition to its headquarters in Hamburg, Bigpoint holds a development hub in Berlin, a mobile game studio in Lyon and maintains presences throughout Europe, the USA and Asia for distribution purposes. For more information and press material, please visit the press area at www.bigpoint.net. About ComputopComputop is a leading global payment service provider (PSP) that provides compliant and secure solutions in the fields of e-commerce, POS, m-commerce and Mail Order and Telephone Order (MOTO).

The company, founded in 1997, is headquartered in Bamberg, Germany, with additional independent offices in China, the UK and the US.

Computop processes transactions totalling US$ 17 billion per year for its client network of over 10,000 mid-size and large international merchants and global marketplace partners in industries such as retail, travel and gaming.

Global customers include C&A, Fossil, Metro Cash & Carry, Rakuten, Samsung and Swarovski.

Following the recent asset deal with the Otto Group, Computop is now processing payments for merchants that previously used EOS Payment, including all 100 Otto retail brands.
In cooperation with its network of financial and technology partners, which it has expanded over many years, Computop offers a comprehensive multichannel solution that is geared to the needs of today’s market and provides merchants with seamlessly integrated payment processes.

For further information, please visit www.computop.com. Computop media inquiries in the UKAscendant Communications, for ComputopCharlotte Hanson, +44 (0) 208 334 8041chanson@ascendcomms.net Computop media inquiries in the U.S.Ascendant Communications, for ComputopJessica Mularczyk, +1-508-498-9300jmularczyk@ascendcomms.net
Bug would have allowed miscreants to rewrite messages A vulnerability in Facebook's web chatrooms and its Messenger app let miscreants surreptitiously tamper with messages after they had been sent. The flaw was discovered by eggheads at security firm Check Point, who reported it to the social network giant. We're told attackers needed only a basic knowledge of HTML to take advantage of the bug to modify or delete any message, photo, file or link.

The attacker would have to be part of a conversation before it he or she could manipulate it. The hole could have been exploited to rewrite conversations and put people in legally or personally tricky positions; run phishing scams; or distribute malware, among other possibilities. Experts from the Israeli security firm discovered that, to tamper with a discussion, a hacker simply needed to identify the unique ID for the sent messages that he or she wanted edit.

This was easily achieved by sending requests to www.facebook.com/ajax/mercury/thread_info.php. Once a message ID was pulled up, a miscreant would be able to alter the contents of the message and submit it to the Facebook servers without others in the chat being alerted.

This process would require only very basic HTML knowledge and a browser debug tool – most browsers include one. Youtube Video Altering the contents of sent messages holds hugely attractive possibilities for hackers.

They can insert links to malware, including ransomware, into a previously benign Facebook message chain, or they can manipulate message contents and history for fraudulent purposes – for example to falsify details of an agreement or transaction. Facebook's Messenger app alone passed 800 million monthly users earlier this year, making it a potentially rich hunting ground for cybercriminals. The vulnerability was fully disclosed to the Facebook Security team by Check Point on May 2.

Facebook responded quickly, and after a joint effort the vulnerability was patched by May 16.

Facebook users do not need to make any changes to their accounts. "By exploiting this vulnerability, cybercriminals could change a whole chat thread without the victim realizing," said Oded Vanunu, head of products vulnerability research at Check Point. "What's worse, the hacker could implement automation techniques to outsmart security measures, allowing them to launch long-term, insidious attacks. We applaud Facebook for such a rapid response, and for working with us to put security first for their users." The resolution of the problem came days before Facebook announced it was closing its native message facility, forcing users to install the Messenger client, which comes with end-to-end encryption by default. ® Sponsored: Rise of the machines
Forum Advances Autonomous Robotics for Security, Surveillance AppsPHILADELPHIA – June 7, 2016 – Rajant, the pioneer of innovative mobile mesh technology for private wireless networks, announced today its role in the Robolliance program, an initiative tasked with educating the security industry marketplace about ground-breaking security robotics products. Rajant makes mobile, scalable and highly reliable kinetic wireless mesh network technology, which provides an always connected communications network so critical applications can be accessed in real time. “We are excited to have Rajant as one of the founding technology sponsors of the Robolliance,” said Cliff Quiroga, Vice President and Deputy General Manager of Sharp Robotics Business (SRBD). “As part of our own work in robotic automation, we have identified wireless communications as a crucial success factor for any deployment of mobile platforms, and Rajant is a leader in this field.” Worldwide spending on robotics is expected to reach $67-billion by 2025, more than double the current market, according to the Boston Consulting Group. “We are proud to have been selected for Sharp’s Robolliance initiative and to contribute our expertise toward the creation, delivery and support of Unmanned Ground Vehicles (UGVs),” said Bob Schena, Chairman and CEO of Rajant. “The Robolliance program also will afford us numerous opportunities to connect our industry-leading Kinetic Mesh™ networks and InstaMesh® technology with other sectors and customers seeking autonomous, robotics and security solutions worldwide.” Autonomous and robotic applications allow vehicles or equipment to operate independently without anyone behind the wheel, using sensors, software, computers and other technology to give the machines a limited understanding of their environments.

This data then is used by control algorithms to determine the next action the machines need to take for given tasks. To maximize performance, the network infrastructure supporting this data has to deliver low-latency, high-throughput and continuous-communication capabilities. Operations leaders across multiple industries – including oil & gas, mining and municipalities – have implemented Rajant kinetic mesh wireless networks to facilitate autonomous applications because they help ensure all three requirements. Rajant wireless nodes create a private wireless mesh network when deployed with other nodes.

The more nodes added to the network, the more paths for communication are established, a differentiating factor relative to other networking technologies. The nodes use multiple radios to perform multiple functions concurrently.

Each node is independent with full routing capabilities and communicates in full duplex.

That means each node can send and receive data simultaneously, and enable multiple-hop routing effectively and efficiently. To learn more about the Robolliance program, please visit the web site: www.robolliance.com. # # # About Rajant CorporationRajant Corporation is the exclusive provider of private wireless networks powered by the patented Kinetic Mesh™ network, BreadCrumb® network nodes, and InstaMesh® networking software. With Rajant, customers can rapidly deploy a highly adaptable and scalable network that leverages the power of real-time data to deliver on-demand, critical business intelligence. Rajant BreadCrumbs can seamlessly integrate with any Wi-Fi or Ethernet-connected device to deliver low-latency, high-throughput data, voice and video applications across the meshed, self-healing network. With the ability to take private network applications and data everywhere, Rajant networks are used across a broad array of industries, including military, industrial, transportation, utilities, telecommunications, and all levels of governments.

For more information, visit www.rajant.com. Media Contact:Kelly MancarusoProactive International PR (for Rajant Corporation)+44 (0)1636 812152Kelly.mancaruso@proactive-pr.com
Cyber-security firm to work with security specialist value-added distributor to support aggressive EMEA expansion plansLondon – 7 June 2016 – Malwarebytes™, the leading advanced malware prevention and remediation solution, today announced it has signed Wick Hill as a pan-European value-added distributor specialising in security.

The agreement supports Malwarebytes’ rapidly growing presence in Europe and continued strategy to expand in the area through channel relationships. Ian Kilpatrick, chairman Wick Hill Group Wick Hill and Malwarebytes will work together to offer the cyber security company’s advanced endpoint protection and remediation capabilities for enterprises to resellers in the UK, DACH, Benelux, France and the Nordics, as part of a two-tier distribution model. Wick Hill is frequently recognised as one of the best specialist security distributors in the region, and the deal will further expand Malwarebytes’ reach while providing Wick Hill with access to an increasingly in-depth portfolio of layered solutions. Anthony O’Mara, VP, EMEA at Malwarebytes, said: “Given the ever advancing threat landscape, the possibility of suffering a security breach has never been higher. Our proven ability to quickly detect and remediate these threats means our products are in higher demand than ever. “Given its reach and reputation in the cyber security space, Wick Hill is an ideal partner for us.

The company also operates an enviable range of partner support services and has a track record of helping vendors expand their reseller base and grow sales.

As part of Rigby Private Equity (RPE), Wick Hill also has access to an established network of resellers across EMEA, and we will be taking advantage of that to grow our presence even further in the future.” Ian Kilpatrick, chairman Wick Hill Group, continued: “We are delighted that Malwarebytes has chosen Wick Hill as a pan-EMEA distribution partner.

Driven by the strength of its product set, the company has a uniquely valuable brand in the security market, providing resellers with a massive opportunity.” “In today’s increasingly insecure IT environment, multi-level protection is vital and we feel Malwarebytes fits perfectly into our existing portfolio. We’re very excited about helping the company grow its EMEA channel to expand across the region.” In July 2015, Wick Hill became part of Rigby Private Equity (RPE). RPE is building an EMEA-wide, high-value, specialist distribution business, with a common proposition and consistent delivery.
Value added distributor Zycko, is also part of RPE with the combined Wick Hill and Zycko product portfolio encompassing networking, infrastructure, security, communications, storage, access, performance, monitoring and management. Paul Eccleston, head of RPE, commented: “The appointment of Wick Hill by Malwarebytes is another milestone for RPE, following Zycko’s recent appointment by Unitrends as its sole EMEA wide distributor.
It demonstrates that there is a strong need for a pan-EMEA distributor that can work with companies wanting to expand and grow internationally, in partnership with a value added distributor that can deliver technical and sales support consistently, whilst giving vendors access to an established reseller network.” -- ENDS -- About MalwarebytesMalwarebytes protects consumers and businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that removed more than five billion malicious threats from computers worldwide. More than 10,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data.

Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts.

For more information, please visit us at https://www.malwarebytes.com/.Malwarebytes reflects the operating philosophy of its founder and CEO Marcin Kleczynski: to create the best disinfection and protection solutions to combat the world’s most harmful Internet threats. Marcin was recently named “CEO of the Year” in the Global Excellence awards and has been named to the 2015 Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal’s 40 Under 40 award, adding those to a 2014 Ernst & Young Entrepreneur of the Year Award. About Wick HillEstablished in 1976, value added distributor Wick Hill specialises in secure IP infrastructure solutions.

The company sources and delivers best-of-breed, easy-to-use solutions through its channel partners, with a portfolio that covers security, performance, access, networking, convergence, storage and hosted solutions. Wick Hill is particularly focused on providing a wide range of value-added support for its channel partners.

This includes strong lead generation and conversion, technical and consultancy support, and comprehensive training. Wick Hill Group is part of Rigby Private Equity, a subsidiary of Rigby Group Investments, an independent company within Rigby Group plc. Wick Hill has its headquarters in the UK and offices in Germany and Austria. Wick Hill also offers services to channel partners in fourteen European countries and worldwide, through its association with Zycko, as part of RPE. For further press information on Wick Hill, please contact Annabelle Brown on 01326 318212, email pr@wickhill.com. Wick Hill https://www.wickhill.com.

For further press information on Malwarebytes, please contact Aislinn Collins on 07980 711864, email malwarebytes@fieldhouseassociates.com
Braskem, one of the world’s largest petrochemical companies, has deployed AspectCTRM trade and risk management at its Netherlands-based naphtha trading operation.

The rollout follows a competitive tender process in which positive references for Aspect from existing users played a key role.At Braskem’s Rotterdam trading site, Aspect’s cloud-delivered, software-as-a-service (SaaS) solution supports core line of business processes including trade capture, position keeping, exposure tracking, transfer cost capture, contract generation and document management. According to feedstock trader Antonio Tettamanzy, “Aspect was chosen because their team was very thorough in demonstrating how the finished system would fit together and work, and the feedback we got from existing users was very encouraging. We’ve been especially impressed by how quickly the initial deployment went and how soon it began generating meaningful reports.” He adds: “We intend to expand significantly our use of AspectCTRM across our entire front, middle and back office environments.” Headquartered in Brazil, Braskem operates seven petrochemical crackers in Latin America and it is one of the biggest consumers of naphtha in the world.

The trading operation was established in Europe three years ago to be closer to Braskem’s key European feedstock suppliers.Aspect’s VP of EMEA sales, Yags Savania, said the Braskem win marked a significant milestone for the company in the petrochemicals sector. “We’re proud to be working with a company of Braskem’s standing and reputation.
It is especially gratifying to be chosen after a searching evaluation of the industry’s key players and it demonstrates the true value of our solutions and shows confidence in our technology roadmap.” About BraskemA subsidiary of the Odebrecht Group, Braskem (www.braskem.com) is the largest thermoplastic resins producer in the Americas, with annual production volume of over 16 million tons, which includes other chemical products and basic petrochemicals, with annual revenue of R$ 54 billion.

Driven by its purpose of improving people’s lives and creating sustainable solutions in chemicals and plastics, Braskem is present in more than 70 countries, has around 8,000 Team Members and operates 40 industrial units in Brazil, the United States, Germany and Mexico, the latter in partnership with Mexican company Idesa. About AspectAspect is a leading global provider of multi-commodity trade, risk and operations management applications delivered Software-as-a-Service (SaaS) in the cloud. With almost 500 customers in 90 countries, it’s one of the fastest growing providers with rapid deployment, affordable subscriptions, and immediate ROI for all size companies.
Solutions include AspectCTRM®, a full-featured commodity trading and risk management enterprise suite for front, middle and back office.
It’s available in three editions: Lite, Standard and Enterprise, expanding in functionality according to the needs and budgets of clients.

Aspect is the only ETRM/CTRM solutions provider with market data and analytics tools delivered with its trade and risk functions on the same platform.

This provides users with a seamless packaged solution beginning with pre-trade pricing analysis and market assessments via AspectDSC.

Aspect’s solutions are available on desktop, tablets and mobile devices and through its new Aspect Partner Program (APP). Media ContactBrigette GebhardAspect+1 347-328-0396bgebhard@aspectenterprise.com
New detection identifies the fundamental behaviours at the heart of enterprise ransomware attacksInfosecurity Europe, UK (Stand S80) — 7 June 2016 — Vectra® Networks, the leader in automated threat management, today announced it has successfully enabled enterprise customers to halt ransomware attacks with a new class of threat detection capabilities available in its X-series platform, designed for real-time detection of in-progress cyber attacks. Ransomware is a type of malware that is installed on one or more computers in a network that encrypts data and demands that the user or organisation pay a ransom to the malware operators to decrypt the data. The FBI reported nearly 7,600 ransomware complaints between 2005 and 2015, almost one-third of which were received in 2015 and cost victim organisations roughly $57 million (£39 million). “With ransomware, everyone’s data is fair game and this makes it a very insidious attack,” said Oliver Tavakoli, CTO of Vectra Networks. “Unlike other crimeware models, attackers don’t need to worry about exfiltrating and reselling stolen data on the black market; they just need the data to be valuable to the victim.” “For organisations that have not implemented a perfect data backup strategy, this means they must pay up to get their data back or face the consequences, which could very well include risk to the operational livelihood of their business,” he added. As ransomware has evolved in the enterprise, the malware has moved beyond targeting an individual machine to systematically encrypting files on networked file shares that can have broad impact across an organisation. The new Vectra detection can identify ransomware within seconds of it encrypting files on networked file shares by recognising patterns of behaviour typically associated with ransomware. “Ransomware’s objective is to get inside a network and work quickly at encrypting as much data as possible to increase the likelihood of the ransom being paid,” said Tavakoli. “Our ransomware detection coupled with a simple defensive canary file share measure can significantly limit the damage of an attack. “With the new Vectra detection for ransomware activity, organisations can identify the early signs of a ransomware attack within moments of infection and help to shut it down before it has a chance to take hold on a customer’s network and cause significant damage.” The ransomware detection spots encryption across the network along with potential pre-cursor behaviours such as command-and-control (C&C) encryption key transmissions and network reconnaissance scans.
Vectra then automatically identifies, prioritises and alerts on these early signs within moments of infection, enabling timely remediation before the ransomware has a chance to take critical assets and files hostage. The new Vectra detection provides coverage against HydraCrypt, CTB Locker, CryptoWall, CryptoLocker, Locky, and many other ransomware variants.

The new ransomware detection is available in the Vectra X-series version 2.5 and later.

Current customers have already been automatically updated to this latest version. For more information on the ransomware pandemic, visit the Vectra Networks ransomware resource page. About Vectra NetworksVectra® Networks is the leader in automated threat management solutions for real-time detection of in-progress cyber attacks.

The company’s solution automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organisations can quickly prevent or mitigate loss.
Vectra prioritises attacks that pose the greatest business risk, enabling organisations to make rapid decisions on where to focus time and resources.
In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection.

The American Business Awards also selected Vectra as the Gold Award winner for Tech Startup of 2015.
Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures.

The company’s headquarters are in San Jose, Calif., and it has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com. # # # Vectra and the Vectra Networks logo are registered trademarks and Security that thinks, the Vectra Threat Labs, and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
Cisco has confirmed that Cisco IOS XR Software, Cisco IOS Software, Cisco IOS XE Software, Cisco NX-OS Software, Cisco ASA Software, and Cisco StarOS Software are affected by the vulnerability described in this advisory.Note: Affected devices that are configured with a global IPv6 address on at least one interface and are processing traffic can be exploited by a remote attacker.

Affected devices that are configured with only a link-local address on interfaces and are processing IPv6 traffic can be exploited with crafted packets only by a Layer 2 adjacent attacker.For information about which software releases are affected, see the "Fixed Software" section of this advisory.Cisco IOS XR SoftwareThe following Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS XR Software and IPv6 is enabled on one or more interfaces:Cisco 12000 Series Routers Cisco ASR 9000 Series Aggregation Services Routers Cisco Carrier Routing System Cisco Network Convergence System 4000 Series Cisco Network Convergence System 6000 Series Routers All types of line cards on those platforms are affected by this vulnerability.If a device is running an affected release of Cisco IOS XR Software and IPv6 is enabled, administrators can identify interfaces that have assigned IPv6 addresses by using the show ipv6 interface brief command in the command-line interface (CLI).

The following example shows the output of the command on a device that is running Cisco IOS XR Software with IPv6 enabled: RP/0/RP0/CPU0:router# show ipv6 interface brief<!output omitted> GigabitEthernet0/2/0/0 [Up/Up]fe80::212:daff:fe62:c150 202::1 In addition, if IPv6 is enabled, the ipv6 enable interface configuration command is present in the configuration.

The following example shows the output of a vulnerable configuration: RP/0/RP0/CPU0:router(config)# interface GigabitEthernet0/2/0/0 RP/0/RP0/CPU0:router(config-if)# ipv6 enable If IPv6 is not supported by the Cisco IOS XR Software release that is running on a device, use of the show ipv6 interface brief command produces an error message.
If IPv6 is not enabled on the device, use of the show ipv6 interface brief command does not show any interfaces with IPv6 addresses.
In either scenario, the device is not affected by this vulnerability.Cisco IOS Software Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS Software and IPv6 is enabled on one or more interfaces. By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.(enable|address) privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 enable and ipv6 address appear in the output of the command.The following example shows the output of the show running-config | include ipv6.(enable|address) command on a device that is running Cisco IOS XE Software with IPv6 configured: Router# show running-config | include ipv6.(enable|address) ipv6 enable ipv6 address dhcp rapid-commitipv6 address autoconfig ipv6 address MANAGEMENT ::1FFF:0:0:0:3560/128ipv6 address 2001:DB8::1/64 Cisco IOS XE SoftwareThe following Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS XE Software and IPv6 is enabled on one or more interfaces that process traffic:Cisco 4300 Series Integrated Services Routers Cisco 4400 Series Integrated Services Routers Cisco ASR 900 Series Aggregation Services Routers Cisco ASR 1000 Series Aggregation Services Routers Cisco Cloud Services Router 1000V Series Switches running Cisco IOS XE Software By default, IPv6 is not enabled.This vulnerability does not depend on any specific combination of Embedded Services Processor (ESP) and Route Processor (RP) installations on the chassis.

Any combination of ESP and RP chassis installations is affected by this vulnerability.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.(enable|address) privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 enable or ipv6 address appear in the output of the command.The following example shows the output of the show running-config | include ipv6.(enable|address) command on a device that is running Cisco IOS XE Software with IPv6 configured: Router# show running-config | include ipv6.(enable|address) ipv6 enable ipv6 address dhcp rapid-commitipv6 address autoconfig ipv6 address MANAGEMENT ::1FFF:0:0:0:3560/128ipv6 address 2001:DB8::1/64 Cisco NX-OS SoftwareAll Cisco products running Cisco NX-OS Software are affected by this vulnerability if IPv6 is enabled on one or more interfaces that process traffic.

By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.address privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 address appears in the output of the command.The following example shows the output of the show running-config | include ipv6.address command on a device that is running Cisco NX-OS Software with IPv6 enabled: Router# show running-config | include ipv6.address ipv6 address 2001:DB8::1/64 Cisco ASA SoftwareIPv6 is not enabled by default.

To enable IPv6 on a Cisco ASA or Cisco ASASM, at a minimum a link-local address needs to be configured for IPv6 to operate correctly.
If a global address is configured, a link-local address is automatically configured on each interface. To verify that the Cisco ASA or Cisco ASASM has IPv6 enabled, administrators can use the show ipv6 interface command in the CLI and confirm that the command returns output.

The following example shows a Cisco ASA that has two interfaces (inside and outside) configured and IPv6 enabled: ciscoasa# show ipv6 interface outside is up, line protocol is up IPv6 is enabled, link-local address is fe80::219:2fff:fe83:4f42 No global unicast address is configured Joined group address(es): ff02::1 ff02::1:ff83:4f42 ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised retransmit interval is 1000 milliseconds Hosts use stateless autoconfig for addresses. inside is up, line protocol is up IPv6 is enabled, link-local address is fe80::219:2fff:fe83:4f43 No global unicast address is configured Joined group address(es): ff02::1 ff02::1:ff83:4f43 ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised retransmit interval is 1000 milliseconds Hosts use stateless autoconfig for addresses. Cisco StarOS SoftwareCisco ASR 5000 Series devices running Cisco StarOS Software are affected by this vulnerability if IPv6 is enabled on one or more interfaces that process traffic.

By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show ipv6 interface summary privileged EXEC command in the CLI.
If IPv6 is enabled, an IPv6 address appears in the output of the command.The following example shows the output of the show ipv6 interface summary command on a device that is running Cisco StarOS Software with IPv6 enabled: [local]router# show ipv6 interface summary Friday February 21 09:00:07 UTC 2014Interface Name Address/Mask Port Status============================== =================== ================== ======int1_test_v6 2001:db8::1/64 20/1 vlan 122 UPint2_test_v6 2001:db8::2/64 21/1 vlan 122 UPint3_test_v6 2001:db8::3/64 22/1 vlan 122 UPint4_test_v6 2001:db8::4/64 23/1 vlan 130 UP Determining the Cisco IOS XR Software ReleaseTo determine which Cisco IOS XR Software release is running on a device and the name of the device on which it is running, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco IOS XR Software, Cisco IOS XR Software or similar text appears in the system banner.

The location and name of the system image file that is currently running on the device appears next to the System image file is text.

The name of the hardware product appears on the line after the name of the system image file.The following example shows the output of the show version command on a device that is running Cisco IOS XR Software Release 4.1.0 with an installed image name of mbihfr-rp.vm: RP/0/RP0/CPU0:router# show version Mon May 31 02:14:12.722 DSTCisco IOS XR Software, Version 4.1.0Copyright (c) 2010 by Cisco Systems, Inc.ROM: System Bootstrap, Version 2.100(20100129:213223) [CRS-1 ROMMON], router uptime is 1 week, 6 days, 4 hours, 22 minutesSystem image file is "bootflash:disk0/hfr-os-mbi-4.1.0/mbihfr-rp.vm"cisco CRS-8/S (7457) processor with 4194304K bytes of memory.7457 processor at 1197Mhz, Revision 1.2 Determining the Cisco IOS Software ReleaseTo determine which Cisco IOS Software release is running on a Cisco product, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears.
If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software.

The image name appears in parentheses followed by the Cisco IOS Software release number and release name.
Some Cisco devices do not support the show version command or may provide different output.The following example identifies a Cisco product that is running Cisco IOS Software Release 15.5(2)T1 with an installed image name of C2951-UNIVERSALK9-M: Router> show version Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2015 by Cisco Systems, Inc.Compiled Mon 22-Jun-15 09:32 by prod_rel_team... Determining the Cisco IOS XE Software ReleaseTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco IOS XE Software, Cisco IOS XE Software or similar text appears in the system banner. The following example shows the output of the show version command on a device that is running Cisco IOS XE Software Release 3.6.2S, which maps to Cisco IOS Software Release 15.2(2)S2:  Router# show version Cisco IOS Software, IOS-XE Software (PPC_LINUX_IOSD-ADVENTERPRISEK9-M), Version 15.2(2)S2, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems, Inc.Compiled Tue 07-Aug-12 13:40 by mcpre Determining the Cisco NX-OS Software ReleaseTo determine which Cisco NX-OS Software release is running on a device, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco NX-OS Software, Cisco Nexus Operating System (NX-OS) Software or similar text appears in the system banner.The following example shows the output of the show version command for a Cisco Nexus 5000 Series Switch running Cisco NX-OS Software Release 7.1(1)N1(1):  # show versionCisco Nexus Operating System (NX-OS) SoftwareTAC support: http://www.cisco.com/tacDocuments: http://www.cisco.com/en/US/products/ps9372/tsd_products_support_series_home.htmlCopyright (c) 2002-2012, Cisco Systems, Inc.

All rights reserved.The copyrights to certain works contained herein are owned byother third parties and are used and distributed under license.Some parts of this software are covered under the GNU PublicLicense.

A copy of the license is available athttp://www.gnu.org/licenses/gpl.html.SoftwareBIOS: version 3.6.0loader: version N/Akickstart: version 7.1(1)N1(1)system: version 7.1(1)N1(1) Determining the Cisco ASA Software ReleaseTo determine whether a vulnerable version of Cisco ASA Software is running on an appliance, administrators can issue the show version command.

The following example shows a device running Cisco ASA Software Release 8.4(1): ciscoasa#show version | include VersionCisco Adaptive Security Appliance Software Version 8.4(1) Device Manager Version 6.4(1) Customers who use Cisco ASDM to manage devices can locate the software release in the table that appears in the login window or the upper-left corner of the Cisco ASDM window.Determining the Cisco StarOS Software ReleaseTo determine which Cisco StarOS Software release is running on a Cisco product, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. Each software image can be identified by its release version and its corresponding build number. The following example identifies a Cisco product that is running Cisco StarOS Software Release 15.0 (49328): [local<host_name># show versionActive Software:Image Version: 15.0 (49328)Image Branch Version: 015.000(001)Image Description: Production_BuildImage Date: Tue Apr 23 00:45:12 EDT 2013Boot Image: Unknown
Secure Cloudlink eliminates the need for passwords safeguarding organisations from cyber attack, security breaches, support costs and software license abuseA new, patented cloud services brokerage (CSB) solution providing secure identity management and cloud services distribution has been launched designed specifically to eliminate the need for passwords. The solution from British cloud security software company Secure Cloudlink Ltd – Secure Cloudlink – supports three factor, SSO (single sign on) and biometric user authentication but unlike other solutions in the market, does not store, send or replicate any user credentials outside of an organisations’ directory service. Secure Cloudlink acts as a secure, centralised user authentication and application to manage all users access rights to all authorised applications without the need to create and manage internal domains. Brian Keats, CEO, Secure Cloudlink Ltd, stated: “Passwords are quickly evolving into an untenable means of authentication because of their fundamental security vulnerabilities.

That evolution is being accelerated by the dramatic shift to mobile computing and the ever-rising tide of data breaches. We identified the need for a fundamentally new way of anonymous authentication bypassing the vulnerabilities that exist because of the inherent properties of passwords being human-accessible shared secrets.” “It’s impossible to use the same password everywhere because different sites insist on different password formats.

Even if it were possible, it wouldn’t be sensible.
So we tend to use many different passwords and then forget which password to use for what, so resort to using similar passwords and never changing them, or to writing them down.

Either way, security is compromised.” According to Gartner in its report ‘Design IT Self Service for the Business Consumer’ “password resets account for as much as 40 per cent of IT service desk contact value.”[1] Designed from the ground up with security in mind Secure Cloudlink’s Cloud Services Brokerage platform overcomes identity security issues associated with passwords by the inclusion of a unique and patented token passing technology.

This advanced authentication method requires no user credentials to be stored separately or outside of the directory service dramatically reducing the risk of a cyber breach and costs associated with password reminders. “This usability problem has got worse in recent years through the ubiquity of smaller keyboards such as those on mobile devices, more complex requirements for “password strength” at many sites, and the introduction of one-time-passcodes as a second factor “secret” that forces the users to type not one, but two passcodes every time they authenticate,” continued Brian. “Although some organisations are investing in technology to automate password resets to reduce the number of calls user credentials still persist exposing the organisation to the threat of cyber attack.

At SCL our approach is to eliminate the passwords and streamline the granting of access to applications, IT resources and on-line services.” Secure Cloudlink is the only platform that anonymises user identities over the web for secure access to cloud services.
Its unique technology never requires access or stores user security credentials when connecting internal users, customers and suppliers to web-based applications. The use of Federated Security authentication, also means that network users can enjoy seamless and secure access to multiple cloud services without even appearing to have left the corporate network. With a secure single-sign-on Secure Cloudlink reduces IT service desk time managing multiple passwords by deploying users with a single, secure access point for access to their applications via their desktop, tablet or mobile. Users can be provisioned access both at single and group level, and with a bulk upload facility.

Furthermore, Secure Cloudlink provides an environment that allows centralised management access to employees, contractors, suppliers and customers without creating new domains and user accounts in an existing directory. The company has already sold the Secure Cloudlink solution to a number of customers across a diverse range of markets including government, SaaS providers, and financial institutions.
It is a highly applicable solution for any organisation looking to provide a simple, secure yet password free user access to cloud and on-premise applications and services. [1] Gartner, Design IT Self Service for the Business Consumer, February 19, 2014, Gartner Foundational July 6, 2015 -ENDS- NOTES TO EDITORSAbout Secure CloudlinkSecure Cloudlink – no passwords Secure Cloudlink is a patented cloud services brokerage (CSB) solution providing both secure identity management and cloud services distribution which uniquely eliminates the use of passwords. Unlike other user authentication solutions Secure Cloudlink does not store transmit or replicate user credentials ‘behind the scenes’ removing the security risks, frustrations, system and cost overheads associated with issuing and maintaining passwords. Including biometric user interfaces, multi-factor authentication and single sign on (SSO) capabilities , Secure Cloudlink is a highly cost competitive, secure, and centrally managed access solution to on-premise and SaaS applications including, financial services, Microsoft Office 365 and Mimecast. For further information please go to http://www.securecloudlink.com/ ContactsRob GaskinSecure Cloudlink LtdT: +44 (0)1372 888 660E: rob.gaskin@securecloudlink.com Beau Bass/Nick Bird (media enquires)SpreckleyTel: 0044 (0)207 388 9988Email: securecloudlink@spreckley.co.uk
Commissioned by Nok Nok Labs, the White Paper evaluates key privacy implications of processing biometric data; comparing the benefits and risks of on-device and on-server matching for biometric authenticationLondon, UK – May 12, 2016 – Nok Nok Labs, an innovator in modern authentication and a founding member of the FIDO (Fast IDentity Online) Alliance, today published a White Paper from PwC Legal comparing key privacy implications of on-device and on-server matching of biometric data. Phillip Dunkelberger, President & CEO of Nok Nok Labs For organisations considering biometrics as they move away from reliance on usernames and passwords, the report highlights why device-side matching of biometric data is a compelling approach to satisfy key privacy requirements on cross-border personal data transfers, as well as providing the benefits of individual choice and control around such personal data. Biometric data is considered to be sensitive personal data and some jurisdictions have already specifically referenced it in privacy guidance and legislation.

This paper emphasises key privacy considerations, sets out the implications of processing biometric data in the EU, Switzerland, Canada, USA and the Asia-Pacific region, and touches on best practice recommendations in these jurisdictions. “Biometric authentication and verification can be one of the most secure ways to control access to restricted systems and information,” said Stewart Room, partner at PwC Legal. “Unlike authentication based on traditional passwords, authentication through biometric data is easier to use in practice, and can be far more secure. “However, this is a double-edged sword, because biometric data is extremely sensitive due to its uniqueness and how intrinsic it is to a specific individual.

Additional efforts must be made to keep this data secure including choosing a proper compliance system and infrastructure, training staff how to handle it and protecting it from unauthorised access or disclosure.” Other key findings in the White Paper include: Freely given, informed user consent is required before processing biometric data in almost every jurisdiction covered in the White Paper With centralised storage of biometric data, the potential for large-scale loss of data is significantly increased On-device authentication will generally avoid international cross-border biometric data transfer implications.

Conversely, on-server authentication for a global network of biometric users results in international transfers of data; transfer of personal data, including biometric data, out of a jurisdiction is generally restricted “Biometrics are a compelling way to improve mobile application usability and avoid the security pitfalls of username/passwords, but significant privacy concerns come into play,” said Phillip Dunkelberger, President & CEO of Nok Nok Labs. “With biometrics, it is crucial to understand the difference between on-device and on-server matching, as the difference between the two approaches significantly affects the risk and exposure of data in a breach.

The on-device approach, as used by Nok Nok Labs technology, ensures optimal privacy for biometric information.” The full report can be found here: https://go.noknok.com/PwCLegal-Biometric-WP.html. # # # About PwC LegalAt PwC Legal we combine legal advice with the expertise of professionals in Tax, Accounting and HRS to provide our clients with commercial solutions to the most complex business issues. We're a network of 2,500 legal experts in over 85 countries committed to delivering an exceptional service to clients and experience for our people.

The white paper has been prepared by PwC Legal LLP upon request by Nok Nok Labs, Inc, and does not constitute legal advice. About Nok Nok LabsNok Nok Labs provides organisations with the ability to bring a unified approach to deploy easy to use and secure authentication infrastructure to their mobile and web applications, using standards-based solutions that include support for FIDO and other specifications.

The Nok Nok S3 Authentication Suite enables organisations to accelerate revenues, reduce fraud, and strengthen security and privacy. Nok Nok Labs is a founding member of the FIDO Alliance with industry leading customers and partners that include NTT DOCOMO, PayPal, Alipay, Samsung and Lenovo.

For more information, visit www.noknok.com. Nok Nok Labs, Nok Nok and NNL are all trademarks of Nok Nok Labs, Inc.

FIDO is a trademark of the Fast IDentity (FIDO) Online Alliance.
Media contacts for Nok Nok LabsLindsey Challis or Gemma WhiteNok Nok Labs team at Finn Partners+44 020 3217 7060NNL@finnpartners.com Tom RiceNok Nok Labs team at Merritt Group+1 703-856-2218NNLPR@merrittgrp.com
When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.In all case...
- Reducing operating costs through accurate sizing at point of sale -eCommerce experts and service provider Tryzens has entered into an exclusive partnership with personalised size guide provider What’sMySize.

The move means Tryzens will be responsible for managing and supporting the product and systems behind What’sMySize’s innovative solution.

Tryzens will offer the sizing guide solution to the market at large and more specifically for their eCommerce customers, as a built-in extra to their Acceleration Service for Demandware, Hybris and Magento platforms. Shoppers use the What’sMySize function located on the product pages of a retailer’s website, to input their measurements.

Thereafter, they are provided with the right clothing and/or shoe sizes for that retailer. With a variance of 1-2 inches between clothing brands, consumers are often surprised by discrepancies in sizing. Whilst they may be a size 10 with one retailer, they could be an 8 or a 12 with another, theoretically similar brand. What’sMySize helps online consumers significantly reduce their need to order multiple sizes and return products by ensuring the right size is purchased every time.

This in turn, has beneficial implications for retailers looking to reduce their operational costs. “With a return rate for online retail fashion and apparel purchases ranging between 20% to 50%, retailers are losing money when they don’t need to” says Kavita Kapoor, CEO, What’sMySize. “There’s unnecessary expense in the end to end experience from direct delivery costs through to stock management and wastage. Just by checking your measurements on Whatsmysize.com a consumer can see that their recommended clothing size can vary significantly between brands.
In partnering with Tryzens we are able to enhance the online experience; building consumer confidence that they’re buying the right size, which in turn increases loyalty and trust in a Brand.” Tryzens is supporting the What’sMySize product roadmap for new and existing clients, by including the sizing function as an additional extra to their popular Acceleration Service.

This will allow Tryzens to provide their clients with the tools to reduce their returns from the outset. What’sMySize’s easy to use integration function allows each retailer to install the What’sMySize service directly onto their website. “What’sMySize is a really innovative platform for the eCommerce retail fashion/apparel market and we are proud to be in an exclusive partnership with this great team,” says Andy Burton, CEO, Tryzens. “We passionately believe in delivering business outcomes for our clients and not just being a traditional SI.

As such, it is important that everything we do either helps our clients reduce operating costs or increase their sales, and ideally both! With the financial, operational and customer experience ‘costs’ associated with a high rate of return, there is plenty of opportunity to help our clients set the benchmark for Generation Consumer’s customer experience, and this partnership will directly address a key industry and consumer issue. We can now integrate this service into our existing eCommerce portfolio and assist our customers in achieving a direct improvement in their operating costs and margins.” What’sMySize has already been proven to decrease retailer return rates.

During a recent study of a UK high street retailer, returns were reduced by 25% over a period of 70 days, when the What’sMySize technology was implemented. NOTES TO EDITORS About TryzensSince 2004, Tryzens has been trusted by retail’s biggest names as an independent expert to plan, implement and maintain eCommerce systems and to optimise retail performance through systems & services. Tryzens enables its clients to leverage efficient, effective and reliable retail solutions that carry the promise of a positive and unified experience that in turn delights their customers, builds loyalty and drives growth. From concept to outcome, Tryzens offer a range of services to support our clients throughout their multi-channel development, whether starting in-store or online.www.tryzens.com About What’sMySizeWhat’sMySize is a fitting room in your sitting room.

Translating your measurements into the correct clothing size for all your favourite brands. No more confusing multi brand size charts, just a single What’sMySize profile that works across multiple retailers. We pride ourselves on being the easiest sizing solution for retailers to implement and with our proven success at reducing size related return rates we delight retailers and consumers alike. What’sMySize was created by ex Figleaves.com technologists as a side project.

The clever tech they crafted won the prestigious Innovate UK Award (previously known as the Digital Britain Technology Strategy Board). What’sMySize has been actively resizing Britain since 2013 when it was officially incorporated. Led by co-founders Kavita Kapoor and Tammy Learn the technology continues to work with fashion labels from around the world to take the mystery out of online sizing. Editorial contactsNick Ringrow / Paul MooreSpreckley PartnersT: 020 7388 9988E: ringrow@spreckley.co.uk