Topics pertaining to technology, especially as they pertain to business issues are discussed. Such topics include using tech to boost productivity, marketing with social media, cybersecurity, and numerous other topics.
Search This Blog
Thursday, December 29, 2016
Wednesday, December 28, 2016
Saturday, December 17, 2016
Public and Private Cloud Adoption - What Financial Services Need to Know
Back in 1950 the first broadly available credit card was introduced to provide people with an alternative and more convenient payment option to cash. In the late 1950s mainframe computers debuted, and by 1969 the first ATM was installed. And in 1983 the first online banking service was launched on the then fledgling Internet. All of these financial technologies (sometimes referred to as “FinTech”) were developed and brought to the market to make the lives of customers easier and to move the financial industry forward.
Friday, December 16, 2016
ESET Trends for 2017: Holding security ransom
In between dreams, you hear the alarm on your mobile phone ring. You open your eyes and turn it off from your smartwatch. Your Smart TV welcomes you with the daily news and you look for the weather forecast: it is a freezing winter’s morning. Your car is waiting outside, just like any other day, but you know that if you don’t warm up the engine, it will hardly work. To save some time, you grab your smartphone, open the car app and try to remote start the vehicle from the comfort of your kitchen. But it does not start. Instead, a notification on your screen says: “Your car has been locked! If you want to use it again, follow the instructions and pay 0.5 bitcoins”.
http://www.welivesecurity.com/2016/12/15/eset-trends-2017-holding-security-ransom/
http://www.welivesecurity.com/2016/12/15/eset-trends-2017-holding-security-ransom/
Yahoo data breach: What you can do
Last night, Yahoo announced that yet another data breach has happened involving more than one billion of its user accounts.
As breaches seem to be happening more and more these days we can be forgiven for allowing data breach news to fall on deaf ears but we need to get this in perspective …
http://www.welivesecurity.com/2016/12/15/yahoo-data-breach-what-you-can-do/
Yahoo experiences biggest data breach in history: 1 billion affected
Update: Get ready for the IT security threats and challenges ahead with ESET's 2017 trends and predictions report. Download now.
Yahoo has experienced the biggest data breach in history, with up to one billion user accounts thought to have been affected by a historic security incident.
Thursday, December 15, 2016
Why Employees Could Be the Biggest Threat to Healthcare Data Security
Human beings are prone to making all kinds of mistakes. It’s the nature of being human. However, there are differences in the gravity of mistakes we make based on context – the what, when, where, why, and how often they happen. When it comes to handling healthcare data, human mistakes can sometimes lead to very serious security issues, and the wrong kinds of mistakes could even put patient lives in danger.
Fortinet Blog
Fortinet Blog
Avnet Forms Relationship with Mellanox Technologies in Latin America
Avnet expands its data center, high-performance computing and enterprise networking solutions portfolio for partners in Brazil, Chile, Colombia, Ecuador and Mexico
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
Wednesday, December 14, 2016
Got an iPhone 6 Plus with ‘Touch Disease’? Apple Launches Program to Help Fix That
Apple Inc. (NASDAQ: AAPL) recently acknowledged that some iPhone 6 Plus devices may actually exhibit ‘Touch Disease’ symptoms, and has rolled out a program to help fix the “disease.”
The term ‘Touch Disease’ was coined on the internet to refer to the display flickering or Multi-Touch issues that surface after the iPhone 6 Plus undergoes stress, such as being bent several times or dropped on a hard surface.
Got an iPhone 6 Plus with ‘Touch Disease’? Apple Launches Program to Help Fix That
Thursday, December 8, 2016
Get Safe Online: Watch out for banking scammers
Get Safe Online has warned people to be aware of banking scammers who are finding more advanced ways to access online bank details in sophisticated phishing scams.
It advised on Wednesday (6th December) that individuals should stay extra vigilant, especially if they are asked to reveal sensitive banking information.
http://www.welivesecurity.com/2016/12/08/get-safe-online-watch-banking-scammers/
QUEENSLAND BRAIN INSTITUTE TO ACCELERATE BRAIN RESEARCH WITH BROCADE
THE UNIVERSITY OF QUEENSLAND'S QUEENSLAND BRAIN INSTITUTE FIRST TO DEPLOY BROCADE GEN 6 FIBRE CHANNEL TECHNOLOGY IN AUSTRALIA FOR STORAGE NETWORKING
http://www.brcd.com/releasedetail.cfm?ReleaseID=1003309
Wednesday, December 7, 2016
Research: Furtive Malware Rises Again
The Shamoon virus, also known as Disttrack, surfaced for the first time back in 2012 targeting Middle East Oil companies. It leveraged stolen credentials to gain access, and then exhibited worm-like behavior to spread throughout the entire targeted network. All Shamoon attacks were clearly very carefully planned beforehand, as the attackers had to gain access to legitimate credentials before launching the attack.
Fortinet Blog
Fortinet Blog
BT Business & Public Sector Aims to Reduce Costs for Critical ITSM Services Supplied to Police Market by Thirty Percent with BMC’s Remedy Suite
Reduced call volumes, faster onboarding time result from efficient and intuitive self-service IT
RSS Content - BMC Software
RSS Content - BMC Software
Avnet Teams with Micro Focus to Expand its Security and Enterprise Software Offerings in Mexico
Collaboration will enable partners to provide their customers in the financial and retail industries with customized solutions
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
Where the leading apps keep your company’s data
The current digital economy revolves around data. Giving up our data is the price we pay for signing up for free internet services, as the companies who provide these services use this personal information in order to fine-tune ads paid for by their true clients: advertisers.
Where the leading apps keep your company’s data
Where the leading apps keep your company’s data
Squarespace Merchants Can Now Take Payments with PayPal Express Checkout
In its effort to give small business customers comprehensive web services, Squarespace has added yet another feature, the ability to take payments via PayPal (NASDAQ:PYPL) Express Checkout.
Squarespace Merchants Can Now Take Payments with PayPal Express Checkout
Squarespace Merchants Can Now Take Payments with PayPal Express Checkout
Avnet Introduces New Partner Programs for the Avnet Cloud Marketplace
New partner programs and platform enhancements in the U.S. and Canada help Avnet partners expand their cloud businesses
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
Spotlight: Agency 2.0 Focuses on Marketing Crowdfunding Campaigns
Crowdfunding is becoming a huge opportunity for businesses to get off the ground. But some businesses that are just getting started with crowdfunding might not know how to market their offerings just yet. That’s where Agency 2.0 comes in.
Agency 2.0 focuses on marketing specifically for crowdfunding campaigns and businesses. You can read more about the company below in this week’s Small Business Spotlight.
Spotlight: Agency 2.0 Focuses on Marketing Crowdfunding Campaigns
Tuesday, December 6, 2016
Avnet Names Kevin Summers as Chief Information Officer
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
Brocade Expands Data Center Networking Solutions to Accelerate Digital Transformation (NASDAQ:BRCD)
ADVANCEMENTS IN DATA CENTER AUTOMATION AND NETWORK VISIBILITY COMBINED WITH NEW BROCADE SLX SWITCHES ENABLE BUSINESS AGILITY AT CLOUD SPEED
Brocade Expands Data Center Networking Solutions to Accelerate Digital Transformation (NASDAQ:BRCD)
BMC Extends its Digital Service Management Leadership with Cloud-based BMC Innovation Suite for Developers
BMC Innovation Suite enables complex workflow-based app development in the cloud on AWS
using microservices-based architectures and REST APIs for the ecosystem
RSS Content - BMC Software
using microservices-based architectures and REST APIs for the ecosystem
RSS Content - BMC Software
8 in 10 U.S. Internet Users Now Buy Online, Says GlobalWebIndex
Americans are filling up their virtual shopping carts fast, a new study has found.
According to GlobalWebIndex’s bi-annual report on the latest trends in online commerce, 8 in 10 American internet users shop online.
8 in 10 U.S. Internet Users Now Buy Online, Says GlobalWebIndex
Save Your Business Some Money with These Browser Plug-ins
Driven by the pursuit of a great deal, you’ve downloaded bar code scanning apps on your phone and clipped coupons from your local newspaper. But even you — a savvy deal seeker — may not know that your computer can replace both of those money-saving activities.
Browser extensions are plug-ins you can download on web browsers like Chrome or Safari, and some of these tools can do your bargain-hunting homework for you.
Save Your Business Some Money with These Browser Plug-ins
10 Modern Search Strategies Businesses Are Not Doing
Search marketing is difficult and time consuming. There is a lot of advice and a lot of it is outdated or flat out does not work. With that I want to share with you 10 search strategies that are easy to implement and are proven to increase search rankings.
10 Modern Search Strategies Businesses Are Not Doing
10 Modern Search Strategies Businesses Are Not Doing
A Closer Look at the Mamba Ransomware that Struck San Francisco Rail System
Recently, the San Francisco Municipal Transportation Agency, also known as MUNI, was attacked by a new variant of Mamba (a.k.a HDDCryptor) – a disk-encypting ransomware. The incident left their ticketing services with inoperational systems and a note that read, “You Hacked,ALL Data Encrypted,Contact For Key(cryptom27@yandex.com)”
Fortinet first discovered Mamba two months ago. Since then, it has been under the radar – until this big attack. We will now take a look at a few irregularities and some new developments it has employed over the past few months.
Fortinet Blog
Whiten Your Teeth and Give Yourself Flawless Skin with this Selfie App
If you’re looking for the perfect selfie image that looks a cut above for business profiles or company websites, the new Facetune 2 app is one option.
The original Facetune app offered photo retouching for selfies and was known for its easy to use interface and powerful image-editing and beautifying tools. This made it a popular photo app on the App Store, and the second version appears to offer even more features.
Whiten Your Teeth and Give Yourself Flawless Skin with this Selfie App
Sprint Appoints Rob Roy Chief Digital Officer to Drive Digital Sales for the Always Connected Customer | Sprint Newsroom
OVERLAND PARK, Kan. (BUSINESS WIRE), December 05, 2016 - Rob Roy joins Sprint (NYSE: S) today as Chief Digital Officer to advance the company’s use of online and mobile technology to improve the customer experience. Roy will focus on leveraging multi-touch personalization and marketing automation to build an end-to-end digital customer journey across all device types to deliver a seamless, omnichannel approach for acquiring the always connected customer, driving sales and providing support.
Sprint Appoints Rob Roy Chief Digital Officer to Drive Digital Sales for the Always Connected Customer | Sprint Newsroom
Sprint Appoints Rob Roy Chief Digital Officer to Drive Digital Sales for the Always Connected Customer | Sprint Newsroom
Sprint Extends Offer for Three FREE Lines of Unlimited Data, Talk and Text | Sprint Newsroom
Switch to Sprint and five lines of unlimited data, talk and text will cost $20 per month per line
Sprint Extends Offer for Three FREE Lines of Unlimited Data, Talk and Text | Sprint Newsroom
Sprint Extends Offer for Three FREE Lines of Unlimited Data, Talk and Text | Sprint Newsroom
How to avoid bogging down your own servers
There’s been a lot of talk recently about DDoS (distributed denial-of-service) attacks in the wake of an incident that left thousands of users without internet access as a result of the collapse of the servers at Dyn, a DNS hosting service. Needless to say, we should be aware of this threat, know how it works, and how to defend ourselves against it. Especially now, in the age of the Internet of Things, which has made it easier for cybercriminals to build an army of infected devices to carry out this kind of attack.
How to avoid bogging down your own servers
How to avoid bogging down your own servers
Monday, December 5, 2016
Android ransomware spreads further, with new methods in its toolbox
Ransomware seems to have maintained its attractiveness amongst cybercriminals, steadily growing on multiple platforms – including mobile since 2014. Android users have been targeted by various types of this extorting malware, most frequently by the police ransomware, trying to scare victims into paying up after (falsely) accusing them of harvesting illegal content on their devices.
Android ransomware spreads further, with new methods in its toolbox
Android ransomware spreads further, with new methods in its toolbox
Friday, December 2, 2016
26,500 National Lottery accounts accessed by cybercriminals
Around 26,500 National Lottery players in the UK have had their online accounts accessed by cybercriminals, operator Camelot has revealed.
The operator was first alerted to a security incident on November 28th, during routine online security monitoring.
26,500 National Lottery accounts accessed by cybercriminals
Security Leads the Way for MSO Evolution to MSP
Like every other service provider segment, MSOs are looking for ways to leverage recent changes in technology and customer buying patterns in order to expand their addressable market and service offerings. MSOs now have an opportunity to claim a larger share of this growing business market by providing a new set of commercial services built on a number of new technologies. With the commercial availability of SD-WAN technology, for example, MSO’s now have a path to create competitive offerings that were previously confined to telecommunications service providers
Fortinet Blog
Fortinet Blog
Avnet Announces Distribution Agreement with Central Semiconductor in the Americas
Phoenix and Hauppauge, New York – November 30, 2016 – Avnet, Inc. (NYSE: AVT), a leading global technology distributor, today announced a distribution agreement with Central Semiconductor Corp., a leading manufacturer of innovative discrete semiconductors. Effective immediately, Central Semiconductor’s entire line of discrete semiconductors will be available for purchase by customers in the Americas through Avnet’s broadline components Electronics Marketing group and Avnet USI, Avnet’s defense/aerospace specialty distribution business unit.
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
How To Evaluate a Next- generation Endpoint Protection
We are lately seeing blogs attempting to publicly demonstrate that next-generation protection solutions, like Adaptive Defense, are vulnerable. These proofs of concept aim to demonstrate that there are malicious files that evade detection when reaching a system or attempting to run. The problem with these demonstrations is that the writer expects the malicious files to be stopped before being run. But that’s a mistake, and reveals a clear misunderstanding of this new protection model based on the continuous monitoring of process activities.
How To Evaluate a Next- generation Endpoint Protection
How To Evaluate a Next- generation Endpoint Protection
Thursday, December 1, 2016
How to avoid hacking to Critical Infrastructure
The cyber-attacks on the backbone of today’s economies are materialized in those assaults that affect society as a whole. The strategic priorities of national security include infrastructure exposed to the threats that can affect the operation of essential services.
How to avoid hacking to Critical Infrastructure
How to avoid hacking to Critical Infrastructure
Hackathon Sophia Antipolis 2016
Last Saturday evening I had the honour to chair the selection committee for a Hackathon on Security...and many connected objects. While the meaning of "security" here was very broad (it included physical security for women and for elderly people, health, computer security, etc), it was a captivating experience.
Fortinet Blog
Fortinet Blog
Cryptography: How something nerdy went mainstream
Cryptography is one of the fundamental aspects of information security. It is used to encrypt or encode messages so that their content may not be read, modified, or hidden by an unauthorized third party. In this way, it helps information to meet three key requirements to be secured: confidentiality, integrity, and availability.
This method takes place in most of our daily activities. Think, for example, when you send an email – if the email provider did not use encryption techniques, the content might be intercepted and read by unknown people.
Cryptography: How something nerdy went mainstream
4 Mobile Marketing Trends to Focus on in 2017
As we begin our descent to the end of 2016, it’s vital for small businesses to look ahead to 2017 and beyond. Creative marketing can set your business apart from the pack, so it’s wise to stay updated on new approaches and trends.
The amount of consumers accessing the web via mobile devices now outweighs desktop users. These days, it’s not enough to just be “mobile friendly.” Here are four ways your small business should be utilizing mobile marketing in the upcoming year.
4 Mobile Marketing Trends to Focus on in 2017
7 Ironclad Reasons Snapchat Stories are Superior to Instagram Stories
There are seven reasons why Snapchat stories is superior to Instagram stories and none of the reasons are features that can be copied.
The core functionality of Snapchat and Instagram are worlds apart, and that has created two different native cultures.
7 Ironclad Reasons Snapchat Stories are Superior to Instagram Stories
The ABCDEs Of Developing A Profitable Business With Online Courses
Many people are making money from selling online courses.
But success on the Internet is not as easy as knowing your ABCs.
The ABCDEs Of Developing A Profitable Business With Online Courses
Fortinet Joins AWS Public Sector Partner Program to Accelerate Cloud Security for Government and SLED Organizations
With the breadth of sensitive data and highly regulated workloads that government and state and local education (SLED) institutions manage comes the critical need for a cybersecurity strategy that can adapt and scale with the data, from IoT to the cloud, while adhering to regulations and compliance requirements.
Fortinet Blog
Fortinet Blog
Avnet Expands its Internet of Things Portfolio with relayr Solutions
Avnet to provide partners with the enterprise middleware platform, skills, starter kits and other resources needed to capitalize on the high-growth potential of IOT
Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.
900,000 Germans knocked offline, as critical router flaw exploited
As many as 900,000 Deutsche Telekom customers were knocked offline on Sunday and Monday as an attempt was made to hijack broadband routers into a botnet.
900,000 Germans knocked offline, as critical router flaw exploited
900,000 Germans knocked offline, as critical router flaw exploited
Wednesday, November 30, 2016
WhatsApp to offer encrypted video calling
WhatsApp is to add encrypted video calling to its service on Monday, as it continues to bolsters security on the app.
This new and secure addition to the app is designed to compete with other popular video calling services, like FaceTime and Skype.
WhatsApp to offer encrypted video calling
Sunday, November 27, 2016
Sednit: A very digested read
Sedit is one of the most notorious groups of cyberattackers operating in the world today. Active from at least 2004 – possibly earlier – it has unfortunately stepped up activity over the past two years, keen to hit its targets as hard as possible.
All too aware of this, ESET, a global leader in information security, has been relentlessly pursuing Sednit over this time, an exercise which has proved to be highly informative. This has resulted in a trilogy of papers, which details many aspects that are unique to the group.
Sednit: A very digested read
9 Ways CEOs Can Best Hone Their Leadership Skills
While some people are born leaders, it’s an area everyone can stand to improve upon — especially if you’re trying to grow a team.
9 Ways CEOs Can Best Hone Their Leadership Skills
9 Ways CEOs Can Best Hone Their Leadership Skills
ICO concerned about privacy protection on WhatsApp/Facebook
An Information Commissioner’s Office (ICO) investigation into WhatsApp’s decision to share customer data with Facebook has confirmed initial concerns that personal information is not being properly handled.
The UK’s information commissioner, Elizabeth Denham, said in an official company blog that consumers have been left in the dark about this development.
ICO concerned about privacy protection on WhatsApp/Facebook
Monday, November 14, 2016
Unmasking the Bonasira Cyperine Author
Following our research on Cyperine 2.0 and Next Man History Stealer, the malware author rebranded their info stealer as Medusa. While it basically has the same featurse as Cyperine, you now need a valid account to access the builder. The example below compares Cyperine on the left and Medusa on the right, which shows a user logged in as Deadzeye.
Fortinet Blog
Fortinet Blog
Apple ID smishing evolves to lure more victims
Smishing is nothing new. We’ve been warning readers of We Live Security about SMS phishing attacks (also known sometimes as SMSishing) for years.
But even if they’re not new, they continue to pose a threat to many smartphone owners and – in some cases – have even been seen to evolve as scammers attempt to trick more users into handing over their precious credentials.
Apple ID smishing evolves to lure more victims
Saturday, November 12, 2016
Google fixes Safe Browsing security loophole
Google has announced new measures that resolve a security loophole that allows certain websites to circumnavigate its Safe Browsing service.
Writing for its official security blog, Brooke Heinichen, a strategist for the tech giant’s safe browsing team, said that it has picked up on a pattern of behavior that subverted this important security mechanism.
Google fixes Safe Browsing security loophole
Tesco Bank not alone in being targeted by Retefe malware
Tesco Bank, which recently saw thousands of its customers lose funds to cybercriminals, has been found on the target list of the so-called Retefe malware. This trojan horse goes after users’ online banking credentials, which can be then misused to conduct fraudulent transactions. Many more thousands might be at risk as the malware’s target list contains several other banks.
Tesco Bank not alone in being targeted by Retefe malware
Tesco Bank not alone in being targeted by Retefe malware
News UK Leverages BMC Digital Service Management Solutions
Read all about it! BMC enables News UK to develop and implement a service asset strategy to support tier-1 services that drive newspaper sales and ad revenues
RSS Content - BMC Software
RSS Content - BMC Software
Thursday, November 10, 2016
Careers in fighting cybercrime
One of the ways in which STOP. THINK. CONNECT.™ – which describes itself as “the global online safety awareness campaign to help all digital citizens stay safer and more secure online” – works towards achieving its aims is by inviting participating partners such as ESET to offer tips and advice in the course of its frequent Twitter chats (#ChatSTC).
Careers in fighting cybercrime
Careers in fighting cybercrime
Is Your WordPress Site the Next Victim of a Cyber Attack?
Unfortunate as it is for webmasters, there will never be a time when black hat SEO schemes cease to exist. Hacker culture only continues to advance and evolve right alongside online development, so the best thing you can do is ensure that your website is protected.
Sucuri, an authority in cyber security, monitors hacker trends and threats across the major CMS platforms and leans over 500 hacked sites daily. Just recently, they identified new occurrences of hacked subdirectories on WordPress.
Is Your WordPress Site the Next Victim of a Cyber Attack?
The Dos and Don’ts for an Aesthetically Pleasing Website
Small business owners know that content is vital for increasing reader engagement, encouraging customers, and pushing people through the sales funnel. That being said, even the most interesting information in the world won’t do well if it’s on a poorly designed website.
There are specific design choices (like white text on a black background) that discourage readers by making the viewing experience unpleasant or even uncomfortable. If you want to build the most beautiful and effective site possible, follow this list of dos and don’ts.
The Dos and Don’ts for an Aesthetically Pleasing Website
Analysis of ISC BIND DNAME Answer Handling DoS (CVE-2016-8864)
A defect in BIND's handling of a DNAME answer was fixed in a critical update from the Internet Systems Consortium (ISC) several days ago. This defect affects all BIND recursive servers, and can be exploited to remotely take down recursive servers by sending a simple DNAME answer thereby causing a denial of service (DoS.)
Fortinet Blog
Fortinet Blog
Why Healthcare Security Breaches Are Big Wins for Cybercriminals
The healthcare industry is under attack for a reason. Cybercriminals view it as a place that’s ripe for “big wins,” and the number of large healthcare institutions recently falling victim to data breaches shows they’re having success.
Fortinet Blog
Fortinet Blog
Secure your router: How to help prevent the next internet takedown
Who knows what evil lurks in the hearts of webcams? After the Dyn DDoS last month, this is a question on the minds of a lot of security people. Someone recently asked me if we shouldn’t adopt a new name for the Internet of Things (IoT) because the existing term is too vague. I responded that this vagueness was in fact the desired effect; many people have little to no understanding of how many devices in their house are now interconnected. This leaves us surrounded by things that are effectively web-enabled computers, which most people don’t even know need to be secured.
So what do you need to do to help secure your devices, to decrease the chances of their being used for ill? There are a few things you can do, regardless of whether you know exactly which devices need protecting. You may be able to improve the security of the IoT devices themselves, which is ideal if the device is one that will accompany you in your daily travels.
Secure your router: How to help prevent the next internet takedown
Targeted online guessing ‘a major threat to online security’
The paper found that this tactic exploits security shortfalls in many users, which, in this instance, is to use the same password – often containing personal information – across multiple accounts.
Targeted online guessing ‘a major threat to online security’
BMC’s Control-M Delivers Simplified Management for SAP® Workloads
Control-M extends support to SAP S/4HANA® to improve digital enterprise agility
RSS Content - BMC Software
RSS Content - BMC Software
Wednesday, November 9, 2016
Shopping at the Online Blackmarketplace
Malware and hacking services are becoming commoditized. Ransomware as a service has become popular this year. More effective security tools have cybercriminals looking for new tools and techniques to more effectively target victims and bypass security. And malware developers are continually looking for new markets where they can connect and sell their services.
Fortinet Blog
Fortinet Blog
Monday, November 7, 2016
How to do an APK Analysis Using AppMon
There are a great many tools available to help quickly analyze the behavior of mobile malware samples, making the task easier for analysts, testers, and pen testers. In the case of Android, one such app is AppMon, which, through its binary instrumentation, provides access to the log showing which functions are being used and their respective parameters.
In this article, we will take a look at how it works.
How to do an APK Analysis Using AppMon
Is the New Hype App Appropriate for Small Business?
Vine’s glory days may be over, but its creators don’t look to have given up on social apps just yet.
Is the New Hype App Appropriate for Small Business?
Is the New Hype App Appropriate for Small Business?
Saturday, November 5, 2016
Colossal DDoS attack in Liberia wipes majority of country offline
Liberia has been hit with one of the most harmful DDoS attacks yet, with most of its residents unable to get online.
It has been revealed that the cause of this is the Mirai botnet, the same system that resulted in the largest DDoS attack yet on Dyn back in October.
Colossal DDoS attack in Liberia wipes majority of country offline
I can see your texts: A deep dive into SMS/messaging clients, security, and privacy
My mother texted me the other day about cycling and performance components. No one other than myself really wants to read that. Looking at the multitude of different types of SMS users out there, however, there is a very high probability that there is someone who wants to read or gain access to another user’s SMS messages. What kind of SMS client is their target using? Is the target taking precautions to protect their data? Does the target even know what data is stored on their device and how easily it can be accessed?
I can see your texts: A deep dive into SMS/messaging clients, security, and privacy
I can see your texts: A deep dive into SMS/messaging clients, security, and privacy
Join Us for Microsoft Chat About Using the Cloud to Grow Your Business #MSBizTips
The cloud can be an elusive concept for a lot of business owners. You probably know that it’s important. But you might not understand exactly what kind of impact it can have on your business or how you can best utilize it as a business tool.
Since there are many different cloud based tools and features, it can be a good idea to get different perspectives to help you make the most out of it for your small business. And you have the opportunity to get some of those different perspectives as part of an upcoming Twitter chat.
Join Us for Microsoft Chat About Using the Cloud to Grow Your Business #MSBizTips
William Hill website hit with DDoS attack
UK-based bookmaker William Hill has been hit with a distributed denial of service (DDoS) attack, preventing many of its customers from being able to access its main website.
The company had, earlier this week, (November 1st) revealed on social media that its website was experiencing “a few technical issues”.
William Hill website hit with DDoS attack
Verizon Calls New LG Phone Perfect for Content Creators, But Why?
The V20 from LG (KRX:066570) was announced in August, and it is now available online from Verizon (NYSE:VZ) targeting content creators.
Today’s smartphones are more than just phones, and manufacturers are addressing different segments with a range of models. With the V20, LG has designed a device with quality audio/video capture technology, and a removable battery to ensure you always have power with extra batteries.
Verizon Calls New LG Phone Perfect for Content Creators, But Why?
Friday, November 4, 2016
Thursday, November 3, 2016
The Angry Spam and The Tricky Macro Delivers Updated Hancitor
Hancitor is one of the better-known malware downloaders due to its numerous SPAM runs and evolving delivery technique. It reminds us of Upatre, which gained notoriety status over the past two years but has now died down, possibly due to the takedowns of its major payloads. In the case of Hancitor, it still seen as a favourite carrier of very much active malware families such as Pony and Vawtrak.
Just recently, we found a new spam campaign of Hancitor with some notable developments that may have been in the previous variants, but were not discussed in any other reports. This article revolves around the macro tricks it uses to stall analysts, and new commands that it utilizes to better persist on infected devices. Finally, this variant also contains an interesting piece of comment by the malware author written in the macro code, which made us feel obliged to take a closer look in the first place.
Fortinet Blog
Penn State Health Selects Cerner's Clinically Driven Revenue Cycle
Penn State Health Selects Cerner's Clinically Driven Revenue Cycle
November 03, 2016
Academic health system to integrate revenue cycle management platform with existing EHR
Penn State Health has selected Cerner Millennium Revenue Cycle™, a patient-centric financial management platform designed to optimize provider and user workflow. The new platform will be integrated with the existing Cerner electronic health record (EHR) at the Milton S. Hershey Medical Center, resulting in a Clinically Driven Revenue Cycle™ across the health system, including more than 60 clinics.
As part of the expanded relationship, Cerner will also extend the clinical and financial health information technology system to Penn State Health St. Joseph, previously St. Joseph Regional Health Network.
“Having one integrated platform will support our efforts to create seamless coordination and collaboration among our departments and venues of care,” said Stephen Massini, chief financial officer, Penn State Health. “Incorporating clinical data into our revenue cycle processes will enable a better experience for our patients and providers and enhance our ability to holistically manage our patient’s financial responsibility.”
Cerner’s Clinically Driven Revenue Cycle is designed to support clinicians and staff to update the billing process throughout the patient’s visit, enhance clinical documentation to help improve reimbursement and limit claims errors. Patients will benefit by having direct access to their clinical results and a streamlined financial experience, including visibility of their financial liability from a single source.
“This expanded relationship makes Penn State Health a robust academic client with an integrated health IT system that supports the delivery of high quality care across the continuum,” said Dick Flanigan, president of Cerner HS. “We look forward to providing Penn State Health with a platform that works for the organization versus the organization working around a disrupted and disparate system.”
Estonia: Digital powerhouse offering e-residency to non-nationals
Ask anyone what the most digitally advanced country in the world is and it’s a safe bet that they’ll say either the US or China, followed by Japan or even the UK. Not many would think of a tiny northern European country in the former Soviet Block, but Estonia is a decade ahead of other developed countries in terms of technological advancement.
Estonia: Digital powerhouse offering e-residency to non-nationals
Estonia: Digital powerhouse offering e-residency to non-nationals
Solutions - Precision Voltage Reference Drives Up to 200mA, Achieves 0.1ppm/mA Load Regulation & 10ppm/°C Drift
MILPITAS, CA – November 3, 2016 – Linear Technology announces the LT6658, a precision voltage reference that incorporates two high current output buffers. Based on a 2.5V bandgap voltage reference, each output can be separately configured for any voltage between 2.5V and 6V. Both outputs offer 0.05% initial accuracy, 10ppm/°C temperature drift and only 1.5ppm of low frequency noise. The outputs can drive up to 50mA and 150mA, respectively, and sink up to 20mA. Typical load regulation is only 0.1ppm/mA with up to 150mA of load current. In parallel, the buffer outputs can be combined for even higher current capability.
Solutions - Precision Voltage Reference Drives Up to 200mA, Achieves 0.1ppm/mA Load Regulation & 10ppm/°C Drift
Solutions - Precision Voltage Reference Drives Up to 200mA, Achieves 0.1ppm/mA Load Regulation & 10ppm/°C Drift
Inspira Health Network Selects Cerner's Clinical and Population Health Management Systems
From Cerner:
Inspira Health Network Selects Cerner's Clinical and Population Health Management Systems
November 02, 2016
Regional health care network brings advanced health IT platform to pursue improved care delivery and management
Inspira Health Network, one of the region’s leading networks of health care providers, has selected Cerner, a global leader in health care technology, to implement a network-wide health IT system. Named InspiraOne, Cerner’s integrated health IT system will support the delivery of care across the full continuum of primary, acute and advanced services.
“We see InspiraOne as more than just a health IT system. It’s the catalyst to dramatically transform how we are able to care for our patients at our more than 100 points of access,” said John DiAngelo, president and CEO of Inspira Health Network. “Since engaging with us after the Siemens Health Services acquisition, Cerner has proven its dedication to help us achieve our goals to improve the quality and safety of our patient care.”
As part of InspiraOne, Cerner’s Millennium® electronic health record (EHR) will be extended across Inspira’s three hospitals and more than 100 ambulatory clinics, which will displace 17 disparate IT platforms, including the Soarian clinical platform.
Inspira will also implement HealtheIntentSM, Cerner’s near real-time population health management platform designed to aggregate data from multiple sources into a single patient record. With HealtheIntent, Inspira will provide more than 1,100 clinicians a more holistic view of a person’s health status and help them develop insights and identify opportunities to improve care coordination across five counties.
Additionally, Inspira will leverage Cerner’s remote-hosting services for the management and support of its EHR, an offering where Cerner will manage and deliver clinical data from its data center.
For seven consecutive years, Cerner has been named “Best in KLAS” for its CernerWorks Remote Hosting Option. The KLAS report is based on feedback from thousands of health care providers globally who rank health care suppliers based on their ability to meet the needs of health care organizations.
“Inspira encourages its population to lead healthier lives by creating a culture of proactive health management. The network-wide EHR and population health management platforms will help Inspira manage and engage individuals across the region it serves,” said Dick Flanigan, president of Cerner HS. “We are grateful for the confidence Inspira has shown in Cerner, and we are proud to welcome them to the Cerner family.”
Wednesday, November 2, 2016
Prana Studios Taps IBM Cloud to Create Complex Visual Special Effects
From IBM:
As an award-winning visual effects company, Prana collaborates with major movie studios and independent production companies around the world to create state-of-the-art visual imagery for full-length feature animated, live action and hybrid films. It also creates visual effects for special-venue attractions and live shows.
Prana Studios Taps IBM Cloud to Create Complex Visual Special Effects
Leading visual effects and animation studio chooses IBM Cloud to run and develop critical applications for the creation of next-generation visual effects
Select a topic or year
BANGALORE, India - 02 Nov 2016: IBM (NYSE: IBM) today announced that Prana Studios, a leading 3-D animation and visual effects studio, has selected IBM Cloud to run new high resolution rendering jobs that are required to create high-quality visual effects.
Earlier this year, the company turned to IBM Cloud as its platform of choice to create the Ultra-High Definition (UHD) special visual effects for a high end theme park attraction in the U.S. The project required over one thousand bare-metal servers to render a highly photo-realistic 24K 3D-Stereo show in a format that was twelve times larger than the typical 2K UHD content projects Prana manages. That’s because the imagery and animation would be presented by 12 projectors simultaneously, each projecting at 60 Frames Per Second (FPS) in 3-D stereo across a massive 400-foot wide U-shaped screen inside the attraction. (Most movies project at 24 FPS.)
Though Prana operates a large data center of its own, it turned to IBM and IBM Cloud for its high-performance bare-metal servers, global scalability with 47 data centers around the world, and flexible infrastructure and pricing.
“Scaling to cloud was the logical next step for us to continue to operate efficiently even on such a complex project,” said Anish Mulani, President and COO. “In our experience with other cloud vendors they relied too much on virtual machines and a template approach to the technical and cost aspects. This was further augmented by the excellent support team from IBM who were available on site to understand our specific workflows and engineer the cloud infrastructure to our performance requirements.”
“Prana has earned a reputation as an innovative, creative powerhouse, so its selection of the IBM Cloud as the platform for this unique attraction was a natural fit,” said Vivek Malhotra, Director, Cloud, IBM India and South Asia. “From the compute-intensive work for this project to the need to connect with its client, the power and availability of our bare metal servers helped them achieve their goals and make their deadlines.”
In addition to being compute-intensive work, the amusement park project was also highly iterative, with creative enhancements at every step. In order to enable Prana to turn-around the show in the time allocated, the rendered output on the IBM Cloud was transferred back to Prana’s on-premise servers via IBM Aspera’s high-speed file transfer technology. This ensured the client continued to engage with Prana creatively without having to worry about the impact of creative changes on the production schedule and quality of the show.
IBM Cloud delivers fast, easy and automated access to public, private and hybrid cloud services to help clients digitally transform. IBM Cloud is a growing collection of services including analytics, mobile, networking, storage, Internet of Things and cognitive computing. As a result, IBM helps companies securely manage and gain insight into their data no matter where it resides.
Prana is a wholly-owned subsidiary of parent company, Prana Studios Inc., in Los Angeles, California.
About Prana Studios
For more information on Prana visit www.pranastudios.com.
About IBM Cloud
For more on IBM Cloud visit www.ibm.com/cloud-computing.
Subscribe to:
Posts (Atom)