More on BloombergThe judge said Centripetal was owed $755.8 million for past use of the inventions, which he increased by two-and-a-half times after finding that Cisco’s infringement was “willful and egregious.” He also ordered that Cisco pay a 10% royalty on sales of some of its products for the next three years, and then 5% in royalties for three years after that.
Cisco Cybersecurity Patent Infringement
-
- JuniorGeek
- Posts: 236
- Registered for: 4 years 2 months
- 4
- Location: Caboolture 4CAB POI FttN / Zürich GigETH DOCSIS 3.1
- x 2
- x 6
- Mood:
- Has thanked: 26 times
- Been thanked: 32 times
- Gender:
- Zodiac:
- Contact:
Cisco Cybersecurity Patent Infringement
Cisco Systems Inc. was told to pay $1.9 billion after losing a trial brought by a Virginia company that claimed the networking giant copied patented cybersecurity features and shut the smaller company out of government contracts.
word count: 105
Tags:
-
- JuniorGeek
- Posts: 236
- Registered for: 4 years 2 months
- 4
- Location: Caboolture 4CAB POI FttN / Zürich GigETH DOCSIS 3.1
- x 2
- x 6
- Mood:
- Has thanked: 26 times
- Been thanked: 32 times
- Gender:
- Zodiac:
- Contact:
New HEH botnet can wipe routers and IoT devices
The disk-wiping feature is present in the code but has not been used yet.
Named HEH, the botnet spreads by launching brute-force attacks against any internet-connected system that has its SSH ports (23 and 2323) exposed online.
If the device uses default or easy-to-guess SSH credentials, the botnet gains access to the system, where it immediately downloads one of seven binaries that install the HEH malware.
HEH was discovered by security researchers from Netlab, the network security division of Chinese tech giant Qihoo 360, and detailed for the first time in a report published today.
https://blog.netlab.360.com/heh-an-iot-p2p-botnet/
Named HEH, the botnet spreads by launching brute-force attacks against any internet-connected system that has its SSH ports (23 and 2323) exposed online.
If the device uses default or easy-to-guess SSH credentials, the botnet gains access to the system, where it immediately downloads one of seven binaries that install the HEH malware.
HEH was discovered by security researchers from Netlab, the network security division of Chinese tech giant Qihoo 360, and detailed for the first time in a report published today.
https://blog.netlab.360.com/heh-an-iot-p2p-botnet/
word count: 110