Home Tags Derivatives

Tag: derivatives

San Jose/London, May 16th, 2017: Kx Systems (Kx), a subsidiary of First Derivatives (FD) plc and provider of the industry-leading kdb+ time series database, and Vexata, the leader in high performance enterprise storage systems, announced record shatter...
PALO ALTO, CA (25 April 2017) - Kx Systems, a subsidiary of First Derivatives (FD) plc, announces that Squarepoint Capital, a global systematic investment manager, has significantly expanded its use of Kx technology for investment research. Kdb+ is Kx’s market leading time-series database, which is widely used in the financial services industry for trading and risk management platforms.
In the era of Big Fast Data analytics, kdb+ has set industry benchmarks for speed and stability... Source: RealWire
Now ZyXEL and D-Link routers from Post Office and TalkTalk under siege Analysis The Mirai botnet has struck again, with hundreds of thousands of TalkTalk and Post Office broadband customers affected.

The two ISPs join a growing casualty list from a wave of assaults that have also affected customers at Deutsche Telekom, KCOM and Irish telco Eir over the last two weeks or so. Problems at the Post Office and TalkTalk both began on Sunday and collectively affected hundreds of thousands of surfers.
Similar attacks against thousands of KCOM broadband users around Hull that started about the same time targeted users of telco-supplied routers.

Thousands of punters at the smaller ISP were left without a reliable internet connection as a result of the assault, which targeted routers from Taiwanese manufacturer ZyXEL. KCOM told El Reg that Mirai was behind the assault on its broadband customers, adding that: "ZyXEL has developed a software update for the affected routers that will address the vulnerability." The timing and nature of this patch remains unclear. ZyXEL told El Reg that the problem stemmed from malicious exploitation of the maintenance interface (port 7547) on its kit, which it was in the process of locking down. With malicious practice in place, unauthorised users could access or alter the device's LAN configuration from the WAN-side using TR-064 protocol. ZyXEL is aware of the issue and assures customers that we are handling the issue with top priority. We have conducted a thorough investigation and found that the root cause of this issue lies with one of our chipset providers, Econet, with chipsets RT63365 and MT7505 with SDK version # and # v002 respectively. Last week a widespread attack on the maintenance interfaces of broadband routers affected the telephony, television, and internet service of about 900,000 Deutsche Telekom customers in Germany.
Vulnerable kit from ZyXEL also cropped up in the Deutsche Telekom case. Other victims include customers of Irish ISP Eir where (once again) ZyXEL-supplied kit was the target. The Post Office confirmed that around "100,000 of our customers" have been affected and that the attack had hit "customers with a ZyXEL router". ZyXEL routers are not a factor in the TalkTalk case, where routers made by D-Link are under the hammer.

TalkTalk confirmed that the Mirai botnet was behind the attack against its customers, adding in the same statement that a fix was being rolled out. Along with other ISPs in the UK and abroad, we are taking steps to review the potential impacts of the Mirai worm.

A small number of customer routers have been affected, and we have deployed additional network-level controls to further protect our customers. We do believe this has been caused by the Mirai worm – we can confirm that a fix is now in place, and all affected customers can reconnect to the internet. Only a small number of our customers have the router (a D-Link router) that was at risk of this vulnerability, and only a small number of those experienced connection issues. The Post Office is similarly promising its customers that a fix is in the works. Post Office can confirm that on 27 November a third party disrupted the services of its broadband customers, which impacted certain types of routers.

Although this did result in service problems we would like to reassure customers that no personal data or devices have been compromised. We have identified the source of the problem and implemented a resolution which is currently being rolled out to all customers. It's unclear who is responsible for the growing string of attacks on ISP customers across Europe or their motives.

The mechanism of the attack is, however, all too clear. Hackers are using the infamous Mirai malware or one of its derivatives to wreak havoc.

The IoT malware scans for telnet before attempting to hack into vulnerable devices, using a brute-force attack featuring 61 different user/password combinations, the various default settings of kit from various manufacturers. Up to 5m devices are up for grabs thanks to wide open management ports, according to some estimates. Jean-Philippe Taggart, senior security researcher at Malwarebytes, said: "The leaked Mirai code, poorly secured remote administration on IoT devices, coupled with the recent availability of a Metasploit module to automate such attacks make for an ideal botnet recruitment campaign. "So far, it seems the infection does not survive a reboot, but the malicious actors tend to disable access to the remote administration as part of the infection.

This prevents the ISP from applying an update that would solve these issues.

The botnet gains a longer life as users seldom reboot their routers unless they're experiencing a problem." Other experts imply further attacks along the same lines are inevitable because the state of router security is poor and unlikely to improve any time soon. Daniel Miessler, director of advisory services at IOActive, commented: "Recent attacks to Deutsche Telekom, TalkTalk and the UK Post Office will be felt by hundreds of thousands of broadband customers in Europe, but while the lights stay on and no one is in any real physical or financial danger, sadly nothing will change.
IoT will remain fundamentally insecure. "The current state of IoT security is in bad shape, and will get a whole lot worse before it gets any better.

The Mirai botnet, which is powered by 100,000 IoT devices that are insecure by default, is just the most obvious and topical example." ® Sponsored: Customer Identity and Access Management
Good news: You have to drop the ball first to be vulnerable An amusing security hole has been found in MySQL that can be potentially abused to gain remote root access to servers. Less funny is the fact that details on how to exploit the vulnerability are now public and there's no patch available. Don't panic, though: although the programming blunder is present in all default installations of MySQL 5.5, 5.6 and 5.7, if you've taken basic precautions, you're probably safe. First, the issue: the bug, CVE-2016-6662, was discovered by Dawid Golunski, who says he reported it to MySQL overseer Oracle on July 29. He found that you can misuse an SQL command to write arbitrary text to the open-source database's configuration files. He has published limited proof-of-concept code to open a remote root shell on a vulnerable installation. Second, how is this possible? Bear in mind that MySQL is launched by a script file called mysqld_safe (unless you're using an RPM distribution with systemd, and MySQL 5.7.6 or later).

This script runs as root even if you tell MySQL to run as a non-root user.
It reads from the database's configuration files for a setting called malloc_lib and dynamically loads the shared library referenced by this setting. So if you can upload a malicious library onto a server and then tamper with one of MySQL's config files so that mysqld_safe loads that library, and thus injects evil code into the server, you can get remote code execution as root when the database is next started and before it drops its privileges. That's a lot of ifs. You can, via SQL, abuse the database variable general_log_file to write to a configuration file thus: set global general_log_file = '/etc/my.cnf'; set global general_log = on; select ' [mysqld] malloc_lib=/tmp/mysql_exploit_lib.so [seperator] '; set global general_log = off; But that requires you to be able to run arbitrary SQL on the victim's machine, and with permission to set general_log_file. One way to do this would be to exploit an SQL injection vulnerability in a web app script to upload a malicious .so library and then fiddle with the config file via the logging system.

Again, the attacked web app would need permission to do that, and any sane environment would turn that off. Also, the hijacked configuration file would have to be writeable for the MySQL server, but not world writeable or the database would reject it for security reasons.

Alternatively, a new config file could be created by the logging system in one of the various file system locations MySQL looks in for its settings. If a web app can use the FILE SQL command, and has an SQLi vulnerability, a hacker can exploit that hole to upload a trigger file so that at some point in the future, such as when an INSERT command completes, the trigger script kicks in and the general_log_file trick can be performed as the MySQL root user.

The trigger file would look something like this: CREATE DEFINER=`root`@`localhost` TRIGGER appendToConf AFTER INSERT ON `active_table` FOR EACH ROW BEGIN DECLARE void varchar(550); set global general_log_file='/var/lib/mysql/my.cnf'; set global general_log = on; select " [mysqld] malloc_lib='/var/lib/mysql/mysql_hookandroot_lib.so' " INTO void; set global general_log = off; END; In his proof-of-concept exploit code, Golunski notes: This is a limited version of the PoC exploit.
It only allows appending to existing mysql config files with weak permissions. Full PoC will be released at a later date, and will show how attackers could exploit the vulnerability on default installations of MySQL on systems with no writable my.cnf config files available. The upcoming advisory CVE-2016-6663 will also make the exploitation trivial for certain low-privileged attackers that do not have FILE privilege. If a miscreant can execute arbitrary SQL commands on your database, you're already in a world of pain. However, if your web app's permissions aren't locked down, and the MySQL user can write to or create new configuration files for itself, an SQL injection vulnerability will rapidly turn into a remote root shell via Golunski's CVE-2016-6663 and CVE-2016-6662 bugs. In the absence of a patch from Oracle, make sure you're not at risk of any SQLi attacks, don't give your web scripts access to dangerous SQL commands, and don't allow the server to modify its own configuration files. MySQL derivatives MariaDB and PerconaDB have issued fixes to address the reported failings. Oracle's update is expected to arrive at the end of October at the earliest. "No official patches or mitigations are available at this time from the vendor," said Golunski. "As temporary mitigations, users should ensure that no MySQL config files are owned by the MySQL user, and create root-owned dummy my.cnf files that are not in use. "These are by no means a complete solution and users should apply official vendor patches as soon as they become available." Oracle did not respond to a request for comment. ®
reader comments 34 Share this story The successors to Silk Road, the darknet drug market shut down by the FBI in 2013, are raking in tens of millions of pounds in total revenue every month, according to a new report.British dealers apparently have a serious finger in the pie, taking home roughly 16 percent of the global revenues, or around £1.75 million, between an estimated 338 vendors. The report, commissioned by the Dutch government to gauge the growth of darknet markets in the years following the demise of Silk Road, found some good news for beleaguered law enforcement: "cryptomarkets have grown substantially in the past few years, but not explosively," though the numbers of vendors and hosting sites have grown.
In fact, researchers found around 50 of these markets in total, however, the total volume of listings is now only six times larger than in 2013. Among the eight most popular marketplaces surveyed, there are plenty of illicit goods and services to buy, the vast majority (57 percent) of the listings were found to offer drugs. Over a third featured cannabis derivatives (37 per cent), stimulants (29 percent), and members of the ecstasy family (19 percent). Researchers also found that a quarter of listings were priced above £768 ($1,000), implying that many dealers were using online markets to buy in bulk for offline sale. The often-used analogy "an eBay for drugs" is not entirely correct, because eBay is intended as an online retail market.

This is an important finding. Cryptomarket trade may have an impact beyond creating a new way for drug users to access a wide range of drugs; based on the extent of wholesale transactions, we believe it is likely that many cryptomarket customers are drug dealers sourcing stock intended for offline distribution.

Cryptomarkets may therefore be diffusing a wide range of substances into local offline drug markets. In all, researchers estimate that cryptomarkets generated a total monthly revenue of between £9.2m ($12m) and £16m ($21m) in January 2016, or several million more when the prescription drugs, alcohol, and tobacco which were also found for sale are included. Most vendors (890) were based in the US, with the UK in second place, followed by Germany with 225 sellers.
Intercontinental trade is common, with many vendors willing to ship to Australia and New Zealand, though intracontinental deals are more usual. The balance of evidence suggests that as security techniques are honed, increasing numbers of buyers and sellers are feeling confident enough to evade detection.
In its overview of detection methods, the report admits that as the "Internet-facilitated drugs trade is still a relatively new and continuously evolving phenomenon... strategies may not be fully developed yet." This post originated on Ars Technica UK
London, (7 July 2016) – VirtusaPolaris, the market-facing brand of Virtusa Corporation and Polaris Consulting & Services, Ltd. and a leading worldwide provider of information technology (IT) consulting and outsourcing services, today announced the signing of a global reseller agreement with SAP SE (NYSE:SAP).

As part of the agreement, SAP will resell VirtusaPolaris’ trade repository reporting solution EMIRIS as the SAP® Trade Repository Reporting application by Virtusa.

The cloud-based solution is now globally available, enabling clients using the SAP Treasury and Risk Management application to automate their processes relating to the legal requirements of reporting the lifecycle events of dedicated derivative transactions.Statutory obligations of reporting to various trade repositories can often be a time-consuming and complicated process for both financial and non-financial companies.

For companies managing derivative transactions, the reporting of lifecycle events is legislated differently across the various global markets, which makes the process even more complicated.

Despite the fact that such lifecycle events are vaguely understood, the main challenge is to record, prepare and map the data needed against the different legislation schemas.
In addition to this, some of the trade repositories require additional fields or sometimes even new types of data, which makes the process highly complex and costly.
In order to help companies with this process, SAP now offers a comprehensive automated solution for the reporting.
SAP Trade Repository Reporting supports EMIR, and the reporting of dedicated OTC derivatives across asset classes as required by regulatory requirements. “Importantly, our dedicated team monitors regulatory changes as well as trade repository changes to their APIs, to enable proactive implementation of necessary changes to the solution”, said Henrik Crone, senior director, VirtusaPolaris. “We provide this service within our offering so that our clients can give complete focus to their core business.” “We are delighted to collaborate with SAP to help financial and non-financial companies successfully meet their regulatory requirements. Leveraging our strong understanding of the derivatives market coupled with a wide range of advisory services for regulatory requirements, we are uniquely positioned to help our clients automate and transform their operations to drive efficiencies and cost advantages,” said Joakim Wiener, senior vice president, VirtusaPolaris. “Clients are increasingly demanding automation of repository reporting processes,” said Martin Naraschewski, vice president, Finance Solutions, SAP SE. “With today’s announcement, SAP and VirtusaPolaris are striving to help clients meet obligations of current legislation, as well as those in the future, so that users are enabled to eliminate what used to be a very time-consuming process.” For more information, please visit us at the International SAP Conference for Treasury Management from July 12-14, 2016 in Barcelona, Spain. About VirtusaPolarisVirtusaPolaris, the market-facing brand reflecting the combined strengths of Virtusa Corporation and Polaris Consulting & Services, Ltd. is a global provider of information technology (IT) consulting and outsourcing services that accelerate business outcomes for Global 2000 companies and leading software vendors in banking and financial services, insurance, healthcare, telecommunications, technology, media and entertainment. VirtusaPolaris’ solutions address the CXOs’ dual challenge of growing revenues while improving IT cost efficiencies.
VirtusaPolaris’ digital services leverage innovative new technologies to reimagine the customer experience, increasing retention and creating lasting value.
VirtusaPolaris’ preemptive outsourcing solutions help clients reduce risk and improve IT operations. VirtusaPolaris delivers services across the IT lifecycle, including consulting, solution design, technology selection, implementation, testing and maintenance & support, including infrastructure support.
Inheriting a strong heritage in software engineering, VirtusaPolaris is highly qualified to both develop and maintain software, using a proven platforming methodology and advanced Agile and Accelerated Solution Design techniques to reliably produce results on time and within budget. Holding a record of success across industries and unparalleled domain expertise, VirtusaPolaris understands clients’ business challenges best and uses that to deliver distinctive, differentiated and innovative application of technology to solve those problems.

Examples of large business transformations completed include the world’s largest P&C claims modernization program, one of the largest corporate customer portals for a premier global bank, an order to cash implementation for a multinational telecommunications provider, and digital transformations for media and banking companies. Virtusa Corporation is headquartered in Massachusetts, and together with Polaris, has 50 offices across North America, Europe and Asia. Polaris Consulting & Services is a subsidiary of Virtusa Corporation.

Copyright © 2016 Virtusa Corporation.

All Rights Reserved. ### SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries.
http://www.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.

All other product and service names mentioned are the trademarks of their respective companies.
SAP Forward-Looking StatementAny statements contained in this document that are not historical facts are forward-looking statements as defined in the U.S. Private Securities Litigation Reform Act of 1995. Words such as “anticipate,” “believe,” “estimate,” “expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,” “should” and “will” and similar expressions as they relate to SAP are intended to identify such forward-looking statements.
SAP undertakes no obligation to publicly update or revise any forward-looking statements.

All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations The factors that could affect SAP's future financial results are discussed more fully in SAP's filings with the U.S.
Securities and Exchange Commission ("SEC"), including SAP's most recent Annual Report on Form 20-F filed with the SEC. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates.
For more information, please contact:Cathy O’NeillSpark Communications / Tel: 020 7436 0420 / Email: cathy@sparkcomms.co.uk
[London – 15 June 2016] The managed services market is characterised by a rapid pace of change; profitability is based on scale, and the number of mergers and acquisitions is rising as companies seek to expand to meet rising demand.

These are some of the conclusions drawn from Managed Service Providers in Europe - the Top 1000 the latest database report from IT Europa which is published today.Overall the market grew at a rate of 8.5%, but this masks a rapid year-on-year expansion in some smaller markets (Bulgaria 33%, Slovakia 21%, Turkey 18%) while France, Netherlands and Germany all grew just over 10%, the largest, the UK grew by 7%, and some, like Spain, actually showed a decline. Russia and Norway both grew by 14%. And this is a sector that matters: total revenues for all companies in the report totals €350bn ($390bn) and they employ a total staff number of 1.6 million.

Analysis also shows a top twenty which is geographically diverse, and with not as many global players as might be expected, though the big names are there.

Telecoms companies and their derivatives make up about a third of the top twenty, which should be no surprise. What are they offering? In terms of services, 86.5% of MSPs are offering Network/Infrastructure Management; 72.4% are offering Server/Web Management; 71.9% are offering Security Management; 61.2% are offering Storage/Backup Management; 60.5% are offering SaaS; 50.3% are offering applications management; 36.6% are offering telecom services; and 13.2% are offering Managed Print Services. There are companies from 34 European countries featured in the report.

The top 5 largest geographic markets covered in terms of companies profiled are: UK (325 companies), Germany (106), France (104), Netherlands (69) and Italy (43). Of the 1000 companies profiled, 696 are independent companies, 46 parent companies, 148 subsidiaries, and 110 publicly listed. “We are seeing more and more traditional channel organisations embrace managed services as a delivery model as customer demand continues to rise,” says Alan Norman, Managing Director of IT Europa. “The factors behind the surge in demand, the changes in customer buying behaviour driving them and the opportunities this presents for MSPs will be a major subject for debate at the Managed Services & Hosting Summit 2016 (http://www.mshsummit.com/) which takes place in London in September.” The Managed Service Providers in Europe - the Top 1000 database report spans 34 countries and represents the most detailed view available of this key market sector.
It has been compiled from detailed interviews by IT Europa’s own research team.

The company profiles include sales figures for each company in Euros and US dollars; contact details for key executives, vertical markets addressed, country sales breakdown, hardware, software and services breakdown, vendor relationships, ownership details and company overview.

The report is available from IT Europa (http://www.iteuropa.com/) costing from £4,350 for the top 1000 or £2350 for the top 500.

Data can also be extracted and supplied by country, region or on a bespoke basis. About IT EuropaIT Europa is the leading provider of strategic business intelligence, news and analysis on the European IT marketplace and the primary channels that serve it.
It publishes European channel publications, such as the IT Europa, ISVEuropa and MSPEuropa newsletters, markets a range of database reports and organises European conferences and events for the IT and Telecoms sectors.

For further details visit: www.iteuropa.com For further information contact:Alan NormanTel: +44 (0) 1895 454 604Email: alan.norman@iteuropa.com