Risk
9/10/2012
02:33 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Avira And Labwise Partner To Protect Smart TVs And Set Top Boxes From Malware

Labwise will implement Avira's Protection Suite software into third-party smart TVs and set top boxes

Germany & Tampere, Finland --- September 10, 2012 - Security expert Avira and digital television specialist Labwise announced today an agreement in which Labwise will implement Avira's Protection Suite software into third-party smart TVs and set top boxes in order to protect these devices and digital IP (Internet Protocol) networks from malware and virus attacks. "As televisions and set-top boxes are becoming more interactive -- using IP networks and IP technologies with open software and application platforms -- we expect that these smart TV devices will quickly become vulnerable to virus attacks in a similar fashion as what has happened in the computer and smart phone industries," said Pasi Toiva, Managing Director of Labwise Ltd. "So we are working with Avira to integrate their state of the art virus protection to prevent these attacks from happening in the TV device industry." Labwise is an independent digital TV testing and verification company that works with the world's leading manufacturers of televisions and electronics devices. Avira is an award-winning maker of security software that detects and blocks viruses, Trojans, keyloggers, spyware, worms and other digital threats. "Avira takes its role seriously to protect not only devices, but also the networks and people who use them," said Travis Witteveen, COO of Avira. "We already protect over 100 million users using Microsoft, Mac OS, Android or Linux devices in the world, and we are honored to be working now with Labwise to secure TV devices and entertainment networks as well." About Labwise Ltd Labwise Ltd is a professional digital television specialist offering services and support in the fields of device testing, device specifications and standards, product implementation, product management and product sourcing for TV device manufacturers, system providers, operators and distributors. Labwise is headquartered in the city of Tampere, Finland. Visit www.labwise.fi for more information.

About Avira Avira wants its customers to 'live free' from spyware, phishing, viruses and other internet-based threats. The company was founded 25 years ago on Tjark Auerbach's promise to "make software that does good things for my friends and family." More than 100 million consumers and small businesses now depend upon Avira's security expertise and award-winning antivirus software, making the company the number-two market share leader globally. Avira provides IT-security protection to computers, smartphones, servers and networks, delivered as both software and cloud-based services.

In addition to protecting the online world, Avira's CEO promotes well-being in the offline world through the Auerbach Foundation, which supports charitable and social projects. The philosophy of the foundation is to help people to help themselves.

For more information, please visit www.avira.com or join the community at www.facebook.com/avira.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web