Search This Blog

Tuesday, May 31, 2016

How Secure is Your Company’s Financial Data?

Businesses today face an ever-evolving threatscape with growing pressure to rethink security strategies for long-term sustainability. As a result, corporate finance teams are more actively partnering with IT to ensure the organization’s security strategies protect critical financial data. Fortinet’s Araldo Menegon discusses the issues and trends affecting corporate finance teams today.



Fortinet Blog

65 million Tumblr users should probably be careful...

Earlier this month, Tumblr revealed that it had recently become aware that user addresses and salted and hashed passwords dating back to 2013 had fallen into the hands of hackers.



65 million Tumblr users should probably be careful...

Monday, May 30, 2016

Cosmosupplylab implements NetSuite OneWorld to accelerate growth

Hong Kong Company Scales Global Business and Gains Agility with NetSuite Cloud ERP



Cosmosupplylab implements NetSuite OneWorld to accelerate growth

NetSuite OneWorld ready for Singapore and Hong Kong

Localised and Designed to Meet Business Requirements, Regulatory and Tax Compliance
Meeting the Rising Demand for #1 Cloud ERP among Regional Businesses
Helping Businesses Capitalize on Opportunity Presented by the ASEAN Economic Council


NetSuite OneWorld ready for Singapore and Hong Kong

NetSuite accelerates channel growth in Asia

CuriousRubik, 3PL Total Technology, and Doji Media Join NetSuite Solution Provider Program To Transform Business Model and Launch Cloud ERP Practices



NetSuite accelerates channel growth in Asia

Treknology Bikes 3 rides with NetSuite OneWorld to transform business operations

NetSuite OneWorld Supports Retailer’s Operations in Singapore and Malaysia



Treknology Bikes 3 rides with NetSuite OneWorld to transform business operations

Image Mission streamlines operations with NetSuite to support exponential growth

A Software Donation from NetSuite.org Enables Nonprofit in Singapore to Focus on Mission to Empower Women



Image Mission streamlines operations with NetSuite to support exponential growth

Cloud enables international growth for businesses in Hong Kong and Singapore

NetSuite and Frost & Sullivan Study Finds 70% of Businesses Using Cloud Software are Internationalised vs. 22% of Non-cloud Businesses



Cloud enables international growth for businesses in Hong Kong and Singapore

Sunday, May 29, 2016

ITunes IRS Scam Latest Money Transfer Swindle

The Federal Trade Commission (FTC) has warned of a new scam where criminals dupe people into paying fraudulent claims through iTunes gift cards.
The FTC said that scammers are pretending to be agents from the IRS or U.S. Treasury and demanding that you pay back taxes via an iTunes gift card.


ITunes IRS Scam Latest Money Transfer Swindle

New Snapchat Course Will Help You Conquer Fear of Snapcat

Snapchat delivers around 700 million photos and videos to nearly 200 million monthly active users. Because of this, businesses are spending five times as much to reach the millennial Snapchatting demographic versus all previous age groups combined. Eighteen-to-24-year-olds make up 45 percent of all Snapchat users in the U.S., according to eMarketer. In the past 12 months, awareness of Snapchat among Americans 12 and older grew from 60-71 percent, according to Edison Research.



New Snapchat Course Will Help You Conquer Fear of Snapcat

What the CISSP? 20 years as a Certified Information Systems Security Professional

CISSP stands for Certified Information Systems Security Professional, a qualification that I obtained on this day in 1996. Back then, very few people had heard of CISSP or the organization that created it, the International Information Systems Security Certification Consortium. This non-profit professional body is known as (ISC)2 which is pronounced “I-S-C-squared” (because the name contains two each of those three letters, which is cute but a pain for typographers and search engines). These days CISSP is an acronym you’ll hear a lot if you spend time dealing with cybersecurity, and (ISC)2 is a name you’ll encounter at many events, such as the (ISC)2 Security Congress. In a moment I will talk about what it means to be a CISSP, but first, a few words of caution.



What the CISSP? 20 years as a Certified Information Systems Security Professional

Friday, May 27, 2016

Decision makers at banks ‘in the dark’ about data breaches

Decision makers at banks are in the dark when it comes to data breaches at their organization, according to KPMG’s 2016 Banking Outlook Survey.
It revealed that this is especially the case when it comes to the second tier of senior management.


Decision makers at banks ‘in the dark’ about data breaches

DMA Locker 4.0: The Next Threat to Healthcare?

Lately, healthcare has been making headlines due to an onslaught of ransomware attacks from viruses like TeslaCrypt and CryptoWall. As a result of many lucrative successes in extorting ransom payments, the industry has been rightly named the number one target of cyber criminals by several research groups. And it doesn’t seem to be slowing down. Cyber criminals are looking to profit off of the traditionally soft target healthcare has presented due to its general lack of highly secure network and data center architectures. 



Fortinet Blog

Brocade Completes Acquisition of Ruckus Wireless (NASDAQ:BRCD)

Brocade Completes Acquisition of Ruckus Wireless (NASDAQ:BRCD)

Dan Allison named VP of Healthcare and Life Sciences for Dell Services | Dell

Dell Services announced today that it has named information technology (IT) and business process services industry veteran Dan Allison as vice president and global general manager of the company’s healthcare and life sciences (HCLS) division. In this role, Allison will lead Dell Services’ strategy and engagement with healthcare and life sciences customers, supporting their efforts to improve outcomes through information-enabled care.


Dan Allison named VP of Healthcare and Life Sciences for Dell Services | Dell

Brocade and Guiyang High-Tech Industrial Investment Group Co., Ltd (HTII) Announce Joint Venture in China (NASDAQ:BRCD)

NEW COMPANY WILL COMBINE BROCADE NETWORKING SOLUTIONS WITH LOCAL INNOVATION IN BIG DATA TO HELP CUSTOMERS BUILD NETWORKS THAT ARE PLATFORMS FOR INNOVATION



Brocade and Guiyang High-Tech Industrial Investment Group Co., Ltd (HTII) Announce Joint Venture in China (NASDAQ:BRCD)

Bayrob - An Ancient Evil Awakens

While ransomware has attracted much attention from security researchers lately, other malware hasn’t stopped. They are quietly seizing their own place in the attack market.  This article analyses one of them - “Bayrob”.  Our analysis is based on a new variant of Bayrob. We will discuss its background and describe some of its most interesting features, including the purpose of several different processes/services, code obfuscation, data encryption, and its C&C communication.  



Fortinet Blog

Thursday, May 26, 2016

3 Ways to Market Your Local Business Online

According to research from Verisign, 91 percent of consumers use the Internet to look for local goods and services.¹ If your local business is not online, you may be missing out on a significant number of potential customers.
Getting online and establishing a presence for your business doesn’t need to take much time or money. Here are three ways to get started today:


3 Ways to Market Your Local Business Online

Cerber Ransomware Marks Its Presence in the Wild, Catches up with CryptoWall and Locky

FortiGuard Labs uses the data it gathers from its over 2 million security sensors to keep an eye on trends related to ransomware--one of the areas of greatest concern when it comes to cyber security threats today.



Fortinet Blog

Another malware wave hits Europe, mainly downloading ransomware Locky

ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries. The most notable detection rates are seen in Luxembourg (67%), Czech Republic (60%), Austria (57%), Netherlands (54%) and the UK (51%), but also in other European states.
After arriving as an email attachment, the threat behind these detections is designed to download and install different variants of malware to victims’ machines.


Another malware wave hits Europe, mainly downloading ransomware Locky

phishing attacks

There has been a notable escalation in phishing attacks in 2016, according to a new report from the Anti-Phishing Working Group (APWG).
It noted that there have been more phishing attacks during the the first quarter of this year, “than at any other time in history”.


phishing attacks

eBay Virtual Reality Department Store Shows Futureworld Shopping

For some time, small business owners have been pondering how virtual reality might change the way they serve customers. Now one of the world’s largest online retailers may be pointing the way.
Sure, shopping from a mobile gadget is already convenient enough, but eBay thinks the shopping experience can be improved further with the use of virtual reality.


eBay Virtual Reality Department Store Shows Futureworld Shopping

Beware Burger King WhatsApp scam: It's a trap

Just when it seemed that the latest round of scams via WhatsApp was coming to a close, we have discovered a new one. This fake survey promises a chance at a discount coupon from Burger King, but ultimately ends by signing up victims to services that were not requested.
In this post, we will show our readers how not to fall into these traps, and also what technical resources attackers use. The WhatsApp scam campaign, so far, has spread in at least the following languages: English, German, Spanish, Portuguese, and Italian.


Beware Burger King WhatsApp scam: It's a trap

Electric Jukebox charts global success with NetSuite OneWorld

Electric Jukebox charts global success with NetSuite OneWorld

Dell Boomi Wins Two Silver Stevie® Awards in 2016 American Business Awards | Dell

Dell Boomi, won two Silver Stevie® Awards in the 14th Annual American Business AwardsSM. The awards recognize Dell Boomi’s innovation and product leadership in the integration platform as a service (iPaaS) market. At the company level, Dell Boomi was recognized as the Silver Award winner in the Most Innovative Company of the Yearcategory. At the product level, Dell Boomi received a Silver Award for its API management offering in the New Product or Service of the Year category for Software Integration Solution.



Dell Boomi Wins Two Silver Stevie® Awards in 2016 American Business Awards | Dell

GDPR Day: countdown to a global privacy and security regimen?

On this day, May 25, in the year 2018, the General Data Protection Regulation will go into effect. Commonly referred to as GDPR or the Regulation, this set of rules governing the privacy and security of personal data is being laid down by the European Commission, but it has serious implications for companies in countries outside the European Union (EU).



GDPR Day: countdown to a global privacy and security regimen?

Sprint Introduces Business Share More Plans - More Value, Simplicity and Flexibility than AT&T, Verizon or T-Mobile | Sprint Newsroom

Businesses of any size can reduce costs and complexity with new shared data plans designed specifically for today’s dynamic mobile workforce
Plus, Sprint business customers can experience the Super-Fast LTE Plus Network in more than 200 markets



Sprint Introduces Business Share More Plans - More Value, Simplicity and Flexibility than AT&T, Verizon or T-Mobile | Sprint Newsroom

Hello, my name is Carl, and it has been 0 days since I was last pwned.

Fortinet Blog

Financial industry ‘needs to come together to fight cybercrime’

The financial industry needs to come together to better understand the threat of cybercrime, according to an expert.
Gottfried Leibbrandt, CEO of SWIFT, described cybersecurity as a “critical issue”, which needs to be improved.


Financial industry ‘needs to come together to fight cybercrime’

Securing Business-to-Business Environments

Business to Business, or B2B networks are pervasive within Financial Services network environments. They are also highly vulnerable to attack.  One reason is that these networks are often woefully unprotected. Some organizations have implemented simple firewall capabilities into these B2B networks, and most have VPNs. But because performance is paramount, security is often seen as a bottleneck; so many of these networks are often only secured using simple router ACLs (RACLs) and NAT. Seriously.



Fortinet Blog

Wednesday, May 25, 2016

The Ultimate Guide to Periscope Video Streaming

Periscope, the live streaming video mobile app, cemented its position as one of the top social media networks when it was named the, “Apple App Store’s 2015 App of the Year”, an honor the company called, “a delightful surprise”.
While the team behind Periscope may have been surprised, a look at the numbers reveals the app’s meteoric rise: a mere four months after its launch on March 26, 2015, the app boasted 10 million active accounts and 2 million users.


The Ultimate Guide to Periscope Video Streaming

Expert insight from the author of the ESET TeslaCrypt decryptor

Our news about ransomware TeslaCrypt operators shutting up shop attracted a lot of attention and prompted several additional questions.
So we’ve approached the best-placed person to address them – Igor Kabina, the ESET malware researcher who first noticed that things had started to change around TeslaCrypt ransomware and ultimately created the universal ESET TeslaCrypt decryption tool.


Expert insight from the author of the ESET TeslaCrypt decryptor

Don’t want ransomware to rock your universe? Add this to your towel

What is the most important thing you should take with you on a cosmic trip? As highlighted by an annual celebration on May 25th, dubbed Towel Day, it is the humble towel. As the late author Douglas Adams put it in his famous Hitchhiker’s Guide to the Galaxy:



Don’t want ransomware to rock your universe? Add this to your towel

How To Create a QR Code For Your Small Business

The demise of the QR (Quick Response) code has been predicted for some time, but this technology is thriving, especially outside of the U.S.



How To Create a QR Code For Your Small Business

BMC Appoints Paul Cant Vice President of Enterprise Solutions Operation for EMEA

RSS Content - BMC Software

Brocade Advances Automation Leadership With Open Network Automation Platform (NASDAQ:BRCD)

BROCADE WORKFLOW COMPOSER TRANSFORMS IT OPERATIONS WITH DEVOPS-INSPIRED, CROSS-DOMAIN NETWORK AUTOMATION TO INCREASE BUSINESS AGILITY



Brocade Advances Automation Leadership With Open Network Automation Platform (NASDAQ:BRCD)

Business Intelligence Solutions Provide Small Business Insights

Big data and business intelligence (BI) used to be only for enterprise companies. Now, however, thanks to the software as a service (SaaS) revolution, even small businesses can afford to track and tap into a wealth of information.
However, becoming a data-driven small business isn’t easy. Because you’re dealing with complex troves of records that have multiple sources and are therefore highly unlikely to be structured uniformly, it can be difficult to process it all and interpret it into insights your business can actually use.


Business Intelligence Solutions Provide Small Business Insights

Dell Cloud Client-Computing today announced its broadest portfolio of new and updated virtual worksp | Dell

Dell Cloud Client-computing today at Citrix Synergy unveiled its broadest portfolio of new and updated virtual workspace solutions including new thin client and software solutions to meet the demands of the modern workplace. Dell is introducing two new thin clients: the Wyse 7040, specifically designed with the highest levels of security and performance to meet the needs of future-ready focused organizations, including specific capabilities aimed at the needs of the Federal market, and the Wyse 3030 LT, a highly secure and affordable solution based on ultra-secure Dell Wyse ThinOS or new Wyse ThinLinux technology. In addition, Dell is also announcing the latest version of its virus-resistant, thin client operating system, ThinOS 8.3, the debut of Wyse ThinLinux, and the latest version of its management software, Wyse Device Manager 5.7.





Dell Cloud Client-Computing today announced its broadest portfolio of new and updated virtual worksp | Dell

Dell Introduces Three New Smart Printers | Dell

Dell today announced three new members of its line of smart printers for medium-to-large organizations, expanding on its line of printers offering reliability, ease of management and improved productivity. The Dell Color Smart Printer (S5840cdn), Dell Smart Printer (S2830dn) and Dell Smart Printer (S5830dn) give companies new, accessible options for replacing legacy imaging devices with printers that better meet the needs of today’s workplaces.



Dell Introduces Three New Smart Printers | Dell

NetTALK Mobile App Reduces International Calling Costs

NetTALK, a platform similar to Vonage that lets users make inexpensive international calls via their WiFi or wireless connection, just announced the launch of several new features, one of which is intended primarily for small business use: 4G LTE wireless telephony service.
The company also introduced a mobile app (netTALK Connect Talk), a messaging app (netTALK Connect Messenger) and a new WiFi version of DUO, its patented hardware device that connects landline phones to the netTALK service


NetTALK Mobile App Reduces International Calling Costs

SWIFT announces security boost to thwart cyberattacks

Following a spate of recent incidents involving some of its customers, SWIFT has announced new measures it is looking to implement to keep cyberattacks at bay.
Information sharing is one of the key ways in which it will do this, the global provider of secure financial messaging services said.


SWIFT announces security boost to thwart cyberattacks

Check On UPS Delivery Progress with New Follow My Delivery App

While most delivery services offer basic location services, UPS on Wednesday announced that it will be rolling out its “Follow My Delivery” app that allows users to check on UPS delivery progress.
The minute-by-minute tracking service works on both computers and smartphones and at the moment, it is only available for packages shipped using the more expensive UPS Worldwide Express and UPS Air options.


Check On UPS Delivery Progress with New Follow My Delivery App

Interoperability is the Key to Successful SDN/NFV Implementations

The key to success in the emerging world of white box hardware, SDN, NFV, NFV Orchestrators (NFVO), and Virtual Network Functions (VNFs) is interoperability.  The promise of a new kind of network - easy to provision, flexible, easy to automate, and most critically, a source of new value-added functions is dependent on a whole range of disparate elements working together.



Fortinet Blog

Tuesday, May 24, 2016

Critical infrastructure: It's time to make security a priority

The security of industrial systems has been a matter of analysis and debate for years, especially after the onset of threats against them such as the Stuxnet worm in 2010, and the recognition of the vulnerability of these systems to external attacks.
Six years after Stuxnet and in the wake of other threats that followed, such as Flame or Duqu, IT security teams face numerous challenges in the quest to safeguard critical data against threats that no longer differentiate among different types of industries.
One question becomes clear: are all these businesses and industries prepared to face future challenges?


Critical infrastructure: It's time to make security a priority

Ensono Selects BMC’s TrueSight to Elevate IT Performance and Analytics for Global Customers

Infrastructure Management Services Provider Turns to BMC for its Digital Transformation



RSS Content - BMC Software

Airtime Group Video Chat Launched With Mobile App

Four years after falling flat as a random chat “roulette” site, video sharing service Airtime has been relaunched as a free group video chat mobile app.
The brainchild of Napster co-founder Sean Parker, Airtime was launched in 2011 as a live video chat site. It generated a huge level of buzz, stringing up endorsements from the likes of Snoop Dogg, Olivia Munn and Martha Stewart.


Airtime Group Video Chat Launched With Mobile App

Dell announces that it has been positioned as a Leader in The Forrester Wave™: Identity Management A | Dell

Dell today announced that it has been positioned as a Leader in The Forrester Wave™: Identity Management And Governance, Q2 2016, for the evaluation of its Dell One Identity Manager solution. In its 17-criteria evaluation of identity management and governance providers, Forrester Research, Inc. identified the nine most significant providers, and researched, analyzed and scored them. In this evaluation, Dell’s top scores were in the criteria of:


Dell announces that it has been positioned as a Leader in The Forrester Wave™: Identity Management A | Dell

Teenager charged over Mumsnet hack and DDoS attack

An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users’ accounts breached, passwords stolen, and the site blasted offline.
David Gerrard Buchanan, 18, from Haslemere, Surrey, was charged by the Metropolitan Police’s Cyber Crime Unit (MPCCU) with two counts under section 1 of the Computer Misuse Act 1990 and one count under section 3, in connection with attacks last year against the immensely popular British parenting website.


Teenager charged over Mumsnet hack and DDoS attack

Monday, May 23, 2016

Three Brocade Employees Recognized as CRN Women of the Channel (NASDAQ:BRCD)

RAELYN KRITZER NAMED ONE OF CRN'S WOMEN OF THE CHANNEL POWER 100



Three Brocade Employees Recognized as CRN Women of the Channel (NASDAQ:BRCD)

Auto Scaling Cloud Security | Fortinet Blog

The Fortinet Security Fabric spans the entire distributed network, from IoT to the cloud, to provide an integrated and collaborative approach to securing the next generation of networks and threats. It weaves together a variety of security components, from clients and firewalls to content security and access control, in a range of form factors, in order to share threat intelligence and coordinate threat response.



Auto Scaling Cloud Security | Fortinet Blog

Security Considerations for Carriers: What’s on the Horizon? | Fortinet Blog

Not too long ago, carriers had fairly straightforward options for their security: they bought one vendor’s box with the same vendor’s firewall, email filtering, and web application firewalls.



Security Considerations for Carriers: What’s on the Horizon? | Fortinet Blog

Broadcom Selects Avnet as Exclusive Broadline Distributor in the Americas and EMEA

Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

Avnet Wins CIO Asia Award in the Growth Category

Avnet recognized for its development of an innovative contract renewal platform designed to improve business processes and increase revenues



Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

Tech support scams go with a Bing

It’s understandable that Microsoft is sensitive about the expanding and highly adaptive trade in tech support scams, since users of its services remain a primary target for this type of scam. That said, users of other platforms are far more likely to be targeted nowadays than they were a few years ago.
There have been other changes in the support scam threatscape, too. As I’ve pointed out here and elsewhere many times, the tech support scam focus has shifted somewhat from cold calling to pop-ups and SEO-exploiting ads picked up by major search engines, so that the victim gets to call the scammer instead of vice versa.


Tech support scams go with a Bing


#Bing


Financial institutions ‘need to prioritize’ cybersecurity

Financial institutions need to put cybersecurity at the top of their agenda, according to a new report titled Cyber and the City.
Writing in one of the forewords, Mark Weil, CEO of Marsh Ltd and chair of the of TheCityUK Cyber Taskforce, said that this isn’t currently the case.


Financial institutions ‘need to prioritize’ cybersecurity

The security review: ESET release decryptor for TeslaCrypt ransomware

Welcome to this week’s security review, which includes ESET releasing a new decryptor for TeslaCrypt ransomware, new revelations about a 2012 LinkedIn data breach and expert insight into Operation Groundbait.



The security review: ESET release decryptor for TeslaCrypt ransomware

BMC Nets 5-Star Rating in CRN’s Partner Program Guide for Tenth Consecutive Year



RSS Content - BMC Software

Sunday, May 22, 2016

Consumers Think Local Businesses Need Better Online Presence

Local businesses need better online presence and must improve local marketing campaigns in order to succeed in their communities, a new survey says.
Sixty-two percent of consumers say that small businesses aren’t doing enough to maintain their digital profiles — with prices and availability having been cited as the two most common reasons individuals shy away from supporting local businesses.


Consumers Think Local Businesses Need Better Online Presence

Snapchat Daily Video Views Have Skyrocketed

Social media messaging app Snapchat has more than doubled the number of daily video views on its platform to 10 billion views in under a year. That’s up from 6 billion video views on Snapchat in November 2015 and 4 billion daily video views in September 2015.
This exponential growth of Snapchat daily video views represents a 150 percent increase in video consumption in just under a year. The boost has seen the service overtake Facebook in the video view stakes. By comparison, Facebook reported 8 billion daily video views in November 2015.


Snapchat Daily Video Views Have Skyrocketed

NetSuite honors top partners at SuiteWorld 2016

Alliances, Solution Providers and Developers Recognized for Helping NetSuite Customers Achieve Their Business Vision



NetSuite honors top partners at SuiteWorld 2016

Gulf Software Distribution and NetSuite sign strategic agreement to drive cloud ERP in Middle East

New Subsidiary of Gulf Business Machines, the Region’s Largest IT Solutions Provider, Launches NetSuite Practice to Meet Growing Demand for Cloud ERP



Gulf Software Distribution and NetSuite sign strategic agreement to drive cloud ERP in Middle East

NetSuite accelerates channel growth as new partners seek to thrive in a cloud model

CohnReznick, ManageForce and Metafile Join NetSuite Solution Provider Program to Diversify and Grow



NetSuite accelerates channel growth as new partners seek to thrive in a cloud model

Anaplan joins NetSuite SuiteCloud development network program

Cloud Leaders to Bring New Planning Capabilities to Enterprise Customers



Anaplan joins NetSuite SuiteCloud development network program

Android AdWare Trying to Deceive the Analyst | Fortinet Blog

Recently, we - i.e Giuseppe Pacelli (student at Eurecom), Matteo Bertolino (student at Eurecom) and their supervisors Ludovic Apvrille (Telecom ParisTech) and myself - had a closer look at a few Android samples infected with the Feiwo adware.
This adware family is not new, but the instances we analyzed were still undetected by all anti-virus vendors last week, as far as we know.


Android AdWare Trying to Deceive the Analyst | Fortinet Blog

Get Ahead of Evolving Healthcare Cyberthreats | Fortinet Blog

Q: Why are conventional firewalls no longer enough?
A: They never were to begin with.


Get Ahead of Evolving Healthcare Cyberthreats | Fortinet Blog

Will we ever fix ‘broken’ USB stick security?

In a recent study, researchers from Google and the universities of Illinois and Michigan dropped nearly 300 USB sticks off at the University of Illinois Urbana-Champaign campus and measured how many of these were plugged into student machines.
The findings were alarming, and indicative of just how dangerous USBs can be. “We found that users picked up, plugged in, and clicked on files in 48% of the drives we dropped,” the authors of the report commented. “They did so quickly: the first drive was connected in less than six minutes.”


Will we ever fix ‘broken’ USB stick security?

117 million LinkedIn members compromised by 2012 data breach

Over 117 million emails and passwords belonging to LinkedIn members have been put online for sale, it has been revealed.
Worryingly, this trove of information is not thought to have been obtained from a recent data breach.


117 million LinkedIn members compromised by 2012 data breach

Dogspectus Ransomware Analysis | Fortinet Blog

On April 25, 2016, Blue Coat published an article on a new Android Ransomware, called "Dogspectus.” On May 12, 2016, Dell SonicWALL published a separate report on the Android Lockscreen malware campaign with similar characteristics to Dogspectus. These similarities are not a coincidence. We began our own extensive investigation into this ransomware some time ago, and will share additional technical details of this malware here that have not been previously discussed.



Dogspectus Ransomware Analysis | Fortinet Blog

Dell SCOS 7 for Future Ready Storage | Dell

Dell today announced Storage Center Operating System 7, the culmination of a three-year effort to redefine the economics of enterprise storage with an innovative platform which embraces and helps accelerate the industry shift to modern, flash-based architectures.



Dell SCOS 7 for Future Ready Storage | Dell

Hackers selling 117 million LinkedIn passwords - May. 19, 2016

LinkedIn was hacked four years ago, and what initially seemed to be a theft of 6.5 million passwords has actually turned out to be a breach of 117 million passwords.



On Wednesday, the professional social network company acknowledged that a massive batch of login credentials is being sold on the black market by hackers.



Hackers selling 117 million LinkedIn passwords - May. 19, 2016

Metadata from phone calls ‘reveals personal information’

Metadata that is generated through phone calls discloses a significant amount of personal information, a new study from Stanford University in the US has found.
The paper, which was published in the Proceedings of the National Academy of Sciences, revealed that information that is logged, such as the length and time of a phone call, can be used to generate accurate profiles of people.


Metadata from phone calls ‘reveals personal information’

Buchanan Technologies Enables Digital Enterprise Management for Global Customers with Transformative BMC Solutions

Remedy Service Management Suite and TrueSight Operations Management Deliver Increased End User Efficiency and Satisfaction While Reducing Support-Related Costs



RSS Content - BMC Software

Dell announces industry-first zero-day malware prevention for thin clients and virtual desktops. | Dell

Dell Cloud Client-Computing, the No. 1 provider of secure thin-client solutions and the expert in VDI, today announced the addition of two new security solutions to provide organizations with advanced threat prevention that spans from the endpoints to the data center for Windows-based thin clients and virtual desktops. Leveraging IP from its award-winning Dell Data Protection portfolio of security solutions, Dell is applying its endpoint security expertise beyond the PC to the thin client and virtual machines, to give customers an industry-leading approach to comprehensively securing their data. 



Dell announces industry-first zero-day malware prevention for thin clients and virtual desktops. | Dell

A Website Startup Guide for Small Businesses

Starting a new business can be one of the most exciting, anxiety-inducing ventures one can undertake in a lifetime. In this technological era, a website is another business necessity. While you may have a great product or service, without a website, your credibility diminishes greatly. Customers look to your website to find out who you are and if you’re trustworthy.
How do you get started? Whether or not you have a degree in computer science, your business can have an amazing website. A few important areas include salient content, superb organization, web management software, web hosting software, and user-friendly design.


A Website Startup Guide for Small Businesses

Friday, May 20, 2016

ESET releases new decryptor for TeslaCrypt ransomware

Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt.
We have been covering this malware for a few months now, sometimes along with Locky or beingspread by Nemucod. Recently, TeslaCrypt’s operators announced that they are wrapping up their malevolent activities:


ESET releases new decryptor for TeslaCrypt ransomware

Operation Groundbait: Espionage in Ukrainian war zones

In addition to the armed conflict in eastern Ukraine, in recent years the country has been facing a significantly higher number of targeted cyberattacks, or so-called advanced persistent threats (APTs).
After BlackEnergy, which has, most infamously, facilitated attacks that resulted in power outages for hundreds of thousands of Ukrainian civilians, and Operation Potao Express, where attackers went after sensitive TrueCrypt-protected data from high value targets, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.


Operation Groundbait: Espionage in Ukrainian war zones

Thursday, May 19, 2016

Papua New Guinea: An App for Midwives that Could Save Lives - SPIEGEL ONLINE

Infant and maternal mortality rates in Papua New Guinea are among the highest in the world. A pair of German siblings wants to support midwives in the country in the form of an app. Villages may be without electricity, but the mobile grid is strong and lives could be saved.



Papua New Guinea: An App for Midwives that Could Save Lives - SPIEGEL ONLINE

Jigsaw ransomware 2.0: A fake or work in progress?

Just recently we reported on various ransomware types that failed in their malicious intentions. Some were cracked by security experts due to poor implementation, while others flopped because the decryption key had been ‘left’ on the victims’ machine, allowing decryption of files without paying the ransom.



Jigsaw ransomware 2.0: A fake or work in progress?

Dell Announces New Solutions and Services in Collaboration with SAP | Dell

Today at SAPPHIRE® NOW, Dell announced new solutions, innovations and services developed in collaboration with SAP that deliver greater performance, insight and agility for organizations processing large volumes of data. This new set of offerings can help customers optimize SAP® solution environments running on clouds; deploy IoT enabled solutions; build on specialized healthcare applications; and streamline data migration and analytics with Dell’s world-class services.



Dell Announces New Solutions and Services in Collaboration with SAP | Dell

Dell announces its latest endpoint security solution, Dell Data Protection | Threat Defense designed | Dell

Dell today announced its latest endpoint security solution, Dell Data Protection | Threat Defense, a new advanced-threat prevention solution specifically designed for the needs of growing businesses with limited or no in-house IT staff. Threat Defense uses artificial intelligence and machine learning to proactively prevent, rather than reactively detect, advanced persistent threats and malware including zero day and targeted attacks such as spear phishing or ransomware. The solution offers a significantly higher level of protection, stopping 99 percent of malware execution, far above the average 50 percent efficacy rating of many traditional anti-virus solutions.



Dell announces its latest endpoint security solution, Dell Data Protection | Threat Defense designed | Dell

Avnet and Arizona State University Launch Innovation Lab

Avnet makes $250,000 annual commitment to accelerate the success of entrepreneurs and spark next-generation technology ideas



Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

NetSuite makes bold happen at SuiteWorld 2016

Cloud ERP Leader’s Accelerated Product Innovation Meets the Needs of Businesses of Any Size, Any Business Model in the Cloud Economy



NetSuite makes bold happen at SuiteWorld 2016

Aspect Software implements NetSuite OneWorld for transformative growth

Leading Enterprise Contact Center and Workforce Optimization Software Provider Gains Flexibility, Scalability with NetSuite Cloud ERP



Aspect Software implements NetSuite OneWorld for transformative growth

NetSuite optimizes omnichannel fulfillment with intelligent order management

NetSuite Unveils New Capabilities to Enable a Buy Anywhere, Fulfill Anywhere, Return Anywhere Commerce Experience



NetSuite optimizes omnichannel fulfillment with intelligent order management

NetSuite OneWorld 16 adds enhancements for global enterprises

Enabling Global Enterprises to Transform their Businesses with Agility of a Start-up on #1 Cloud ERP



NetSuite OneWorld 16 adds enhancements for global enterprises

NetSuite unveils SuiteBilling

Industry’s First and Only Cloud Unified Order-to Billing-to-Revenue Solution
Delivering Future-Proof Billing Functionality for Any Business Model – Product, Time, Service, Subscription, and Usage or Combination that May Arise
Synchronizing Complex Processes from Order to Billing to Revenue Recognition
Readying Businesses for Change, Business Model Innovation and Digital Transformation


NetSuite unveils SuiteBilling

Threat Intelligence – Cyber Defense – Part 2 of 3 | Fortinet Blog

In my last blog post, we walked through, at a high level, who the various threat actors are, and looked at a blended attack chain to get an idea of how “bad guys” are stealing data or causing disruption.  (https://blog.fortinet.com/post/threat-intelligence-understanding-your-threat-actors-101-part-1-of-3)



Threat Intelligence – Cyber Defense – Part 2 of 3 | Fortinet Blog

20 Free Website Builders For Small Business

In this day and age, it’s nearly impossible for a small business to succeed without establishing some sort of digital presence. Unfortunately, not every would-be entrepreneur is a digital guru — and not every start-up can afford to spend money on a shiny, new website.
Thankfully, there are plenty of free website builders out there designed to arm small business owners with all the basic tools they need to get up-and-running and turn a few heads online.


20 Free Website Builders For Small Business

Cybercrime on the rise as economic crime 'goes digital'

Incidents of cybercrime are on the rise, with a new study from PwC reporting it as the “only economic crime to have registered an increase”.
The Global Economic Crime Survey 2016 said that “to some extent”, economic crime has “gone digital”.


Cybercrime on the rise as economic crime 'goes digital'