Search This Blog

Thursday, June 30, 2016

Hard Rock Hotel & Casino Las Vegas experiences data breach

The Hard Rock Hotel & Casino Las Vegas has released a statement alerting customers that their data may have been compromised if they visited the resort between October 27th, 2015 and March 21st, 2016.
After receiving several reports of unauthorized activity associated with payment cards, the resort started an investigation into their card payment methods.


Hard Rock Hotel & Casino Las Vegas experiences data breach

Stay cyber safe on the road: 10 tips for this summer season

Toothbrush? Check. Towel? Check. Computer, smartphone, tablet? Check. If you are one of those travelers who can’t hit the road without having all the tech gadgets in your suitcase, then you should also be aware of the risks that lurk in the ‘shadows’ of public internet connections. It is important to be cyber safe.
But don’t worry, there are ways to protect yourself from the sticky hands of cybercriminals. A few years ago, Stephen Cobb and other ESET experts put together a short guide that we have refreshed to help you travel safely and keep all your data and devices protected:


Stay cyber safe on the road: 10 tips for this summer season

Digital patch kit: How to protect yourself from data leaks

Data leaks, as we will explore in an upcoming feature, can emerge in numerous ways. Knowing where your weak spots are as organization is, of course, important, but equally important is ensuring that you actively do everything you can to stay secure and protected.
In this piece we look at five key approaches that will plug any gaping holes in your defenses.


Digital patch kit: How to protect yourself from data leaks

Please stop spreading the Facebook privacy notice hoax

Facebook users are at it again.
A post telling users to copy and paste a message if they wish to retain control over things they share on Facebook, is being copied left, right and centre.


Please stop spreading the Facebook privacy notice hoax

Dell Services Named Leader for Workplace Services | Dell

Dell Services today announced that Everest Group has positioned Dell Services in the Leader quartile for their 2016 PEAK Matrix™ for Workplace Services.


Dell Services Named Leader for Workplace Services | Dell

Wednesday, June 29, 2016

Navigating the Grey Space of Cloud to Secure Your Enterprise

Managing network connections to hybrid cloud environments is a complex task- notwithstanding the sea of confusion over the hybrid cloud’s true definition. Paramount to the problem is securely optimizing transport and managing compute resources in geographically dispersed locations to ensure optimal application delivery and performance.



Fortinet Blog

Q&A: How Secure Are Your Company’s Applications?

Organizations of all types today face an ever evolving threatscape and growing pressure to rethink security strategies for long-term sustainability. Today’s enterprises operate in a complex technological environment, with a variety of devices, applications, and users accessing the network. Fortinet’s Mark Byers discusses the issues and trends affecting the security of enterprise applications.



Fortinet Blog

Google's CEO Sundar Pichai's online accounts hijacked

Google’s CEO Sundar Pichai is the latest public figure to have his online accounts hijacked by OurMine.
Yesterday morning, a tweet was sent from Mr. Pichai’s account with the message: “Hey, it’s OurMine,we are just testing your security, to upgrade your security please visit our website”. A similar message was also posted to his Quora account.


Google's CEO Sundar Pichai's online accounts hijacked

2016 Legacy of Good Update | Dell

Dell today reported significant progress against its 2020 Legacy of Good plan and the company’s 21 goals in support of the environment, communities and Dell team members. Dell has a long-term commitment to putting its technology and expertise to work where they can do the most good for people and the planet. The report summarizes its efforts in its Fiscal Year 2016 (February 1, 2015 - January 31, 2016).



2016 Legacy of Good Update | Dell

BMC Expands Big Data Strategy, Announces New Automation API for Hadoop Environments

BMC's Hadoop Designed Solutions Offer Enterprise Customers More Agility, Cost Optimization, and Security Across Deployments



RSS Content - BMC Software

Malicious scripts in compromised websites and how to protect yourself

When talking about the attacks and threats users must face every day, people often highlight those that are more or less predictable, such as malicious archives sent as email attachments. Even though these threats are still very prevalent (e.g. in the different ransomware variants), cybercriminals also use many other attack vectors. Some of the most dangerous are those that involve scripts, they are quite difficult for the average user to detect.



Malicious scripts in compromised websites and how to protect yourself

Dell Teams with Securonix to Provide Advanced Security Analytics | Dell

Dell today announced a technology partnership with Securonix to improve the security of data in Active Directory (AD) and other enterprise application environments. The partnership combines the unique insights delivered by the Dell Change Auditor product with actionable security intelligence capabilities provided by Securonix.



Dell Teams with Securonix to Provide Advanced Security Analytics | Dell

Dell Announces New Interactive Display Technologies and Dell Classroom Software at ISTE 2016 | Dell

Dell today announced the debut of three new, interactive display products, purpose-built for active learning, classrooms and conference rooms. The company also revealed Dell Classroom, a Chrome-based software solution aimed at bridging the collaboration gap between students and teachers with tools that connect their devices in the classroom. These announcements come as part of Dell’s participation as a Gold sponsor in the International Society for Technology in Education (ISTE) 2016 Conference and Expo, taking place June 26-29, at which the company is hosting a slew of sessions and activities united by the theme "What are you going to create today?" The sessions will explore student-centered learning as well as ways technology can be integrated into the classroom to make students feel empowered and more engaged. 



Dell Announces New Interactive Display Technologies and Dell Classroom Software at ISTE 2016 | Dell

Using Context to Predict the Future

The vast majority of security strategies are reactive. The goal is to close the gap between the time to compromise and time to discover. According to the 2016 DBIR report, this compromise time is minutes for a majority (over 80%) of breaches. Solving this problem is complicated because threats are always changing. They have increased in frequency and volume, and they are becoming increasingly sophisticated.



Fortinet Blog

ATM security: Are cash machines really that secure?

Forty-nine years ago, if you needed cash you had to head to your bank and request it from the clerk at the counter. But on the 27th of June 1967, all that changed. On that day Londoners had their first opportunity to withdraw funds from their accounts via a new specialized cash machine, which later became known as an automated teller machine, or ATM for short.



ATM security: Are cash machines really that secure?

In Healthcare, Data Security Can Be Difficult

This is a guest post from Erik Devine, CISO, Riverside Healthcare.
In a complex healthcare system, ensuring data security can be difficult. Today, the threats are numerous and always evolving.


Fortinet Blog

Industries Perspectives: Global Financial Services – Security is Top of Mind

As cyber-attacks continue to challenge the financial industry, security remains the top priority for financial services in an ever-evolving landscape of threats. Last month, Options - a leading provider of financial technology managed services, IT infrastructure, and cybersecurity - sponsored the SALT Conference, which featured cybersecurity and regulation high on the agenda throughout the week. 



Fortinet Blog

Tuesday, June 28, 2016

Cyberattacks should be included in international humanitarian law

The seriousness of cyberattacks is such that it should be included in international humanitarian law, a new report from the Global Commission on Internet Governance has said.
The paper, titled One Internet, said that the most dangerous cyberweapons that can be employed by a state need to be better understood and used in full consideration of, for example, the Geneva Conventions.


Cyberattacks should be included in international humanitarian law

Saturday, June 25, 2016

Google makes two-step verification easier

Google has just introduced a new feature for users to make its two-step verification (2SV) process easier.
Users can now receive notifications asking them if they are trying to access their accounts, to which they can simply tap ‘yes’ or ‘no’.


Google makes two-step verification easier

EMEA PEAK16 | Dell

Dell this week welcomes more than 230 partners to Malta for its annual Dell Security EMEA PEAK16 event. Attendees will hear from Dell’s senior leadership and attend business and technical breakout sessions designed to:
  • Help partners increase their security sales year-over-year
  • Develop strategies and solutions to help grow their security practices and enhance profitability
  • Educate partners on up-sell and cross-sell opportunities within the Dell Security portfolio


EMEA PEAK16 | Dell

Friday, June 24, 2016

Brocade Network Helps DLT Solutions Accelerate Its Growth Trajectory (NASDAQ:BRCD)

Brocade Network Helps DLT Solutions Accelerate Its Growth Trajectory (NASDAQ:BRCD)

Dell 2016 Index Ranks Top 25 Global Cities for Women Entrepreneurs | Dell

Dell 2016 Index Ranks Top 25 Global Cities for Women Entrepreneurs | Dell

Denali Holding Inc. Announces Private Offering Completion | Dell

Denali Holding Inc. (the “Company”) announced today the successful completion of the previously announced offering by two of its wholly-owned subsidiaries as co-issuers (the “co-issuers”) of $1,625,000,000 5.875 percent Senior Notes due 2021 (the “2021 Notes”) and $1,625,000,000 7.125 percent Senior Notes due 2024 (the “2024 Notes” and, together with the 2021 Notes, the “Notes”).



Denali Holding Inc. Announces Private Offering Completion | Dell

Industries Perspective: Financial Services, Looking Ahead For Cybersecurity

Financial Services continues to be a sector that is discussed frequently in global cybersecurity discussions. As part of an ongoing perspective series, Fortinet’s Araldo Menegon shares some thoughts.



Fortinet Blog

How Secure is Your Company’s Financial Data?

Businesses today face an ever-evolving threatscape with growing pressure to rethink security strategies for long-term sustainability. As a result, corporate finance teams are more actively partnering with IT to ensure the organization’s security strategies protect critical financial data. Fortinet’s Araldo Menegon discusses the issues and trends affecting corporate finance teams today.



Fortinet Blog

Wednesday, June 22, 2016

Facebook’s Mark Zuckerberg ‘tapes over webcam’

Facebook post from Mark Zuckerberg has attracted attention for ‘all the wrong reasons’.



Facebook’s Mark Zuckerberg ‘tapes over webcam’

MEDIA ALERT: BMC Highlights Big Data Management Solutions

Robin Purohit, ESO Group President at BMC, to Deliver Keynote About the Competitive Value of Automating and Optimizing Big Data



RSS Content - BMC Software

Securing Critical Infrastructures

A couple of months ago I was discussing data center security with a panel of IT managers from critical infrastructure providers. One representative from a major energy provider said that he had no intention of segmenting his network. When I asked him how he monitors his network looking for attacks that have breached his perimeter, he told me, “That’s the FBI’s job.”



Fortinet Blog

Dell SonicWALL Secure Mobile Access 100 Series OS 8.5 Offers Enhanced Security for SMB Mobile and Re | Dell

Dell Security today announced the release of Dell SonicWALL Secure Mobile Access (SMA) 100 Series OS 8.5, which provides mobile and remote workers at small- and medium-sized businesses with policy-enforced SSL VPN access to mission-critical applications, data and resources without compromising security. This newest version of the Dell SonicWALL SMA 100 Series OS affords enhanced security to customers by allowing administrators to quickly and easily provision secure mobile access and role-based privileges so workers using smart phones, tablets or laptops (managed or unmanaged) get fast, simple and secure access. At the same time, the solution enables organizations to institute BYOD security policies to protect their corporate networks and data from rogue access and malware.



Dell SonicWALL Secure Mobile Access 100 Series OS 8.5 Offers Enhanced Security for SMB Mobile and Re | Dell

Acer experiences major data breach

Acer has experienced a major data breach, with up to 34,500 of its customers thought to be affected.



Acer experiences major data breach

JD.com and Mellanox Join Forces to Drive E-Commerce Artificial Intelligence (NASDAQ:MLNX)

JD.com and Mellanox Join Forces to Drive E-Commerce Artificial Intelligence (NASDAQ:MLNX)

The 5 most common reasons for corporate data loss

There is no doubt that one of the main assets of a company is the data it stores. Information about customers, employees and finances, among other types of records, should be adequately protected and available whenever they are needed. For this reason, companies that appreciate the value of their data, invest adequate resources into protecting them and recovering them in the event of a serious incident.



The 5 most common reasons for corporate data loss

Francisco Partners and Elliott Management to Acquire the Dell Software Group | Dell

Francisco Partners, a leading technology-focused private equity firm, Elliott Management Corporation, and Dell today announced they have signed a definitive agreement for Francisco Partners and Elliott to acquire the Dell Software Group. The agreement bolsters Francisco Partners and Elliott Management’s technology portfolios with the addition of Dell Software’s diverse combination of security, systems and information management, and data analytics solutions.



Francisco Partners and Elliott Management to Acquire the Dell Software Group | Dell

Dell launches new HPC Systems and Innovation Investments | Dell

Dell today announced advancements to its high performance computing (HPC) portfolio, including the availability of new Dell HPC Systems, early access to innovative HPC technologies, technology partner collaborations, and successful global customer implementations.



Dell launches new HPC Systems and Innovation Investments | Dell

What You Need to Know: Enterprise Wireless Security Trends and Issues

Organizations of all types operate in an increasingly complex business environment, with a broader attack surface for cybercriminals to target. As more and more wireless devices enter the workplace, companies are striving to maintain the security of their wireless networks. Fortinet’s Doug Ramos discusses the issues and trends affecting enterprise wireless environments today.



Fortinet Blog

Monday, June 20, 2016

UK MPs call for tougher sanctions against cybercriminals

Individuals convicted of unlawfully obtaining or selling personal data should serve up to two years in prison, according to a new report from the UK’s culture, media and sports committee.



UK MPs call for tougher sanctions against cybercriminals

Analysis of Vulnerability CVE-2016-4957 in NTPD

The Network Time Protocol Daemon (NTPD) by NTP.org, runs on *nix operation systems. It sets and maintains system time in synchronization with internet standard time servers or local reference clocks. NTPD is shipped with many major server operating systems, routers, and infrastructure devices.



Fortinet Blog

Scammers claim there is a virus in Apple's iTunes database

Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information.



Scammers claim there is a virus in Apple's iTunes database

The security review: Nemucod, cyberbullying and Windows 10 one year on

Welcome to this week’s security review, which includes detail on the evolution of Nemucod, how to spot if your child is being cyberbullied and thoughts on Windows 10 – from a security and privacy point of view – one year on from its launch.



The security review: Nemucod, cyberbullying and Windows 10 one year on

Mellanox HPC-X Framework Extends Smart In-Network Computing (NASDAQ:MLNX)

Comprehensive HPC Software Suite Features State-of-the-Art Support for Maximizing Application Throughput in High Performance Computing Environments



Mellanox HPC-X Framework Extends Smart In-Network Computing (NASDAQ:MLNX)

Mellanox Solutions Accelerate the Fastest Supercomputer in the World (NASDAQ:MLNX)

InfiniBand Connects 70% of Overall HPC Systems and 50% of Petascale Platforms as Reported By the TOP500 Supercomputers List



Mellanox Solutions Accelerate the Fastest Supercomputer in the World (NASDAQ:MLNX)

Mellanox and Pacific Northwest National Laboratory Announce Joint Collaboration to Design Exascale System (NASDAQ:MLNX)

Mellanox and Pacific Northwest National Laboratory Announce Joint Collaboration to Design Exascale System (NASDAQ:MLNX)

6 Simple Tweaks to Help You Create Content That's More Effective

When you’ve been writing content for your business for a number of years, it’s easy to get in the habit of doing the same thing over and over again. As a result, it’s possible that your content is becoming less and less effective. Don’t worry, though. In order to reverse this trend, all you need are a few simple tweaks.



6 Simple Tweaks to Help You Create Content That's More Effective

Saturday, June 18, 2016

The Future of Healthcare Data Threats and Security

Our recent blog posts have focused on malware, and more specifically ransomware, as a primary threat vector currently plaguing healthcare.  This week, we turn our spotlight on users and the challenges of coping with behavioral threats. 



Fortinet Blog

T-Mobile Czech Republic 'suffers data leak'

Over 1.5 million customer records at T-Mobile Czech Republic were stolen by one of its employees, according to local media.



T-Mobile Czech Republic 'suffers data leak'

Nato: Cyberspace is an operational domain of warfare

Nato has acknowledged that cyberspace is now an operational domain of warfare, along with air, sea and land.



Nato: Cyberspace is an operational domain of warfare

Friday, June 17, 2016

Are You Making These 5 Small Business Mistakes Online?

Small business owners are busy. It’s difficult to focus the right amount of attention on all facets of your business when you’ve got both offline and online operations to juggle. It’s no surprise mistakes are made along the way. But, with nine out of 10 U.S. consumers using the Internet¹ to look for local goods and services and research a potential purchase, one mistake you can’t afford to make is neglecting your online presence.
Here are a few common errors that many small businesses make online, and what you can do to help make sure your business is on the right track.


Are You Making These 5 Small Business Mistakes Online?

Avnet Receives Team and Individual Accolades from TDK-Lambda America

PHOENIX–Avnet, Inc. (NYSE: AVT), a leading global technology distributor, was recently named 2016 Best Performing National Distributor by TDK-Lambda Americas, for reaching a record-high $12M in point of sale (POS) for the year in North America. In addition, Avnet Electronics Marketing Americas’ Director of Supplier Management Doug Barker was recognized by TDK-Lambda Americas for his outstanding support and commitment.



Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

Nemucod ups its game

Some time ago, we detailed how the Locky ransomware infection process works. Since then, the creators of the Nemucod “downloader” (the code responsible for downloading and executing malware like Locky) have been hard at work polishing their code.
One of the latest versions of Nemucod shows some notable changes over the older versions. In the past, the process was pretty simple: “User opens malicious file → File downloads payload → payload gets executed”. In the more recent versions however, it’s somewhat less straightforward.


Nemucod ups its game

Organizational cybersecurity efforts ‘needs bolstering’

Organizations need to take charge of their cybersecurity efforts to ensure they are well-equipped to deal with this growing threat.
This is one of the main findings of the second annual RSA Cybersecurity Poverty Index, which also highlighted the increased risk firms face today.


Organizational cybersecurity efforts ‘needs bolstering’

Thursday, June 16, 2016

Brocade Wins Best of Show Grand Prize Award for SDI/NFV at Interop Tokyo 2016 (NASDAQ:BRCD)

Brocade Wins Best of Show Grand Prize Award for SDI/NFV at Interop Tokyo 2016 (NASDAQ:BRCD)

Tech Mahindra and Dell Boomi Collaborate to Simplify Enterprise Digital Transformations | Dell

Dell Boomi and Tech Mahindra today announced an alliance that enables organizations to more easily implement digital strategies and drive business transformation. As a "Dell Boomi Certified System Integrator", Tech Mahindra, provider of innovative and customer-centric information technology services and solutions, is now able to offer its customers a platform that integrates any combination of cloud and on-premises applications without software, appliances or coding.



Tech Mahindra and Dell Boomi Collaborate to Simplify Enterprise Digital Transformations | Dell

Avnet Expands Hybrid Cloud Solutions with Co-location Services from CoreSite

Increasing U.S. partner’s hybrid cloud solutions revenue by offering secure co-location solutions



Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

Cyber Threat Assessment: How to Find Indicators of Compromise

The threat landscape is in a constant state of evolution, and the arms race between cyberguardians and cybercriminals has been heating up dramatically over the course of the last year. An additional 20 billion IoT devices will be connected to the network by 2020, along with expansive growth in personal end user devices, forcing individuals and organizations to face an exponentially expanding attack surface bound to the borderless cyberspace. 

Fortinet’s Matti Blecher offers some perspective on this and how threat assessment can help.


Fortinet Blog

Windows 10 Security and Privacy: In-depth review and analysis

As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come. Microsoft has promised greater security in Windows. During the past 12 months I have been kept very busy researching and documenting Windows 10’s security, as well as its privacy issues. I have now completed a white paper on the subject: Microsoft Windows 10 Security and Privacy: An ESET White Paper.



Windows 10 Security and Privacy: In-depth review and analysis

Mellanox Announces ConnectX-5, the Next Generation of 100G InfiniBand and Ethernet Smart Interconnect Adapter (NASDAQ:MLNX)

ConnectX®-5 Introduces New Acceleration Engines for Maximizing High-Performance, Cloud, Storage, Artificial Intelligence, Web2.0 and Database Applications



Mellanox Announces ConnectX-5, the Next Generation of 100G InfiniBand and Ethernet Smart Interconnect Adapter (NASDAQ:MLNX)

Spark Ventures Standardizes Service Management Across Six Companies with BMC's Remedyforce

New Remedyforce features including automated agentless discovery simplify, automate and elevate service management excellence to realize the benefits of high-speed IT



RSS Content - BMC Software

Alienware Turns 20 | Dell

Alienware rolls out a fierce new lineup of powerful, VR-optimized products at this year’s E3 in Los Angeles. Currently celebrating its 20th anniversary as a pioneer in specialty high-performance PC gaming systems, Alienware offers new solutions targeted at gamers looking for the best experiences in PC gaming and virtual reality.



Alienware Turns 20 | Dell

VerticalScope experiences major data breach: 45 million records stolen

VerticalScope has experienced a major data breach, with cybercriminals making off with over 45 million records belonging to over 1,100 websites, it has been reported.
LeakedSource, which provides detailed information on data breaches, said that some of the websites impacted by this include Techsupportforum.com, MobileCampsites.com, Pbnation.com and Motorcycle.com.


VerticalScope experiences major data breach: 45 million records stolen

Obfuscated Bitcoin Miner Propagates Through FTP Using Password Dictionary

Although bitcoin miners have been used by cybercriminals before as a way to monetize their malicious activities, this recent sample (MD5:522f8ba8b2dec299cc64c0ccf5a68000) caught our attention because it is unusually heavy, persistent, and obfuscated. Fortinet detects this threat as W32/Miner. (3)



Fortinet Blog

ICSA Labs Certifies Fortinet’s Advanced Threat Protection Framework

Fortinet’s Advanced Threat Protection (ATP) Framework has once again achieved Advanced Threat Defense (ATD) Certification from ICSA Labs for Q1 of 2016.  We remain one of the four vendors in the entire industry who have achieved this independent certification.



Fortinet Blog

Quantum Computation: A cryptography armageddon?

Cryptography is a cornerstone of information security. It is used to encode and decode data in order to fulfill the requirement for confidentialityintegrityauthenticity as well as non-repudiation. Together, these are frequently referred to as cryptography services.



Quantum Computation: A cryptography armageddon?

Mellanox Enhances Cloud Efficiency With 25Gb/s Ethernet Connectivity (NASDAQ:MLNX)

Mellanox ConnectX-4 Lx 10/25 Gb/s Ethernet Adapters Improve Application Efficiency



Mellanox Enhances Cloud Efficiency With 25Gb/s Ethernet Connectivity (NASDAQ:MLNX)

Brocade and Harris Corporation Form Strategic Partnership to Deliver Cybersecurity Solutions (NASDAQ:BRCD)

INITIAL SOLUTION WILL ENABLE HIGHLY SCALABLE CYBER MANEUVER FOR FEDERAL AGENCIES AND FINANCIAL INSTITUTIONS



Brocade and Harris Corporation Form Strategic Partnership to Deliver Cybersecurity Solutions (NASDAQ:BRCD)

Apple looks into the benefits of differential privacy

Differential privacy is going to be key to how Apple collects, stores and uses data, the tech giant revealed during its Worldwide Developers Conference.



Apple looks into the benefits of differential privacy

The Myth of the ”Platform” Security Strategy

We all know about the challenges of having far too many security vendors deployed across our networks. 



Fortinet Blog

The security review: Ray-Ban scam is back

The security review: Ray-Ban scam is back

Wednesday, June 15, 2016

Things you can learn from a million users

Recently, I had the pleasure of leading a FortiGate-5000 series chassis deployment. While I’ve worked on the 5000 series before, this was my first “soup to nuts” deployment of our 4th generation chassis. The 5000 series is not merely a very large appliance. It is a vessel for FortiGate and FortiController blades. The firewall is actually a cluster of FG-5001D worker blades that rely on the 5144C chassis for power and connectivity. With two NP6 ASICS, each FG-5001D has similar throughput characteristics to the FG-1500D appliance. However, apart from the physical dimensions, there are a few other differences between the two:

  • More RAM to handle high session counts
  • Additional CPU power for content/NGFW
  • 40GBE support via QSFP+ on the front panel
In some respects, an individual FG-5001D blade has more in common with the 3700D. However, the party trick of the FG-5001D is its potential rack density. Up to 12 can be deployed in an ActiveN scenario. Achieving a similar capacity with a stack of 2U 1500D’s is likely to give your data center planner a cardiac event.


Fortinet Blog

Tuesday, June 14, 2016

AVT-PR-EBV Elektronik and Taoglas sign Distribution Agreement

Poing, Germany – EBV Elektronik, an Avnet (NYSE: AVT) group company and the leading specialist in EMEA semiconductor distribution, signed a Europe wide distribution agreement with Taoglas, a leading worldwide provider of IoT (Internet of Things) and M2M (Machine to Machine). The agreement is effective immediately.



AVT-PR-EBV Elektronik and Taoglas sign Distribution Agreement

Monday, June 13, 2016

32 million Twitter account credentials up for grabs - but site says it wasn't hacked

What has happened?

LeakedSource is claiming that a database of over 32 million Twitter account credentials is up for sale on the criminal underground – containing details such as users’ Twitter handles, email addresses, and plaintext password.


32 million Twitter account credentials up for grabs - but site says it wasn't hacked

Denali Holding Inc Announces Fiscal Q1 Financial Results | Dell

Denali Holding Inc. (“Denali”), parent company of Dell Inc., today announced its fiscal 2017 first quarter results, with revenue of $12.5 billion from continuing operations, down 2 percent year-over-year, driven by declines in the company’s Client Solutions and Enterprise Solutions Groups, while Dell Software Group revenue was flat. The company reduced its operating loss by 52 percent and grew its non-GAAP operating income by 37 percent year-over-year.



Denali Holding Inc Announces Fiscal Q1 Financial Results | Dell

From a drip to a flood: The impact of a data leak

With every passing second, every click of a mouse and every swipe of a screen, the world is becoming increasingly digitized, interconnected and virtual. And we’re better for it. Our lives are easier, more engaging and enjoyable. That’s the power of technology.
However, there’s always a flipside – for all the opportunities and advantages that come with tech, there are risks and new threats. That’s inevitable.


From a drip to a flood: The impact of a data leak

Brocade Announces Employment Inducement Awards in Connection With Acquisition of Ruckus Wireless, Inc. (NASDAQ:BRCD)

Brocade Announces Employment Inducement Awards in Connection With Acquisition of Ruckus Wireless, Inc. (NASDAQ:BRCD)

Hours before Euro 2016, fake websites are still offering overpriced tickets

The competition to find the best national football team in Europe starts in just a few hours, and fans across the continent are eager to see their favorite players perform live. But for the unwary, the process of buying late tickets for UEFA Euro 2016 matches can be tricky, and risks ending in disappointment, lost money or even compromised data.



Hours before Euro 2016, fake websites are still offering overpriced tickets

Sunday, June 12, 2016

Communications of the Bolek Trojan

A few weeks ago CERT Polska released a short blog post introducing a new malware family now known as Bolek. PhishMe and Dr.Web have since added some additional insight into the family. Browsing through a memory dump of the malware, a Webinjects section sticks out. Webinjects usually imply banking malware, so it seems Bolek picks up where its predecessor, Carberp, leaves off. This post takes a closer look at its command and control (C2) mechanism and what it takes to elicit a configuration file from its C2 servers.



Communications of the Bolek Trojan

Extending Your NGFW for Complete Application Security

Security vendors have been touting the advantages of next-generation firewalls (NGFW) that provide application inspection for several years now. As application traffic became more prevalent, criminals found that hiding malware inside application traffic was an excellent way to bypass traditional security. 



Fortinet Blog

Avnet Introduces New Offerings to Accelerate Partner Opportunities in DevOps and Agile Development Environments

Distributor to offer partners in the U.S. and Canada comprehensive resources, tools and services to automate deployments based on HPE Synergy for Composable Infrastructure



Press Releases | Avnet Newsroom: In this section of the Avnet Newsroom, you'll find our press releases listed in chronological order and archived by year. Organize press releases with the dropdown menu or try the 'search newsroom' feature to search by keyword, date range and more.

Friday, June 10, 2016

Hitting emails and Facebook: Ray-Ban scam is back

A while ago, we informed you about a Ray-Ban scam campaign flooding Facebook via hacked profiles. Using fake ads that offered massive discounts, attackers tried to lure users into “buying” branded sunglasses, thus giving up their payment card details via an unsecured channel.
Spread mostly via posts disguised as ads for Ray-Bans, the scam also tags a small group of the intended victim’s friends. Attackers have also created a lot of bogus Facebook pages and events indirectly leading users to visit their scam stores. Other channels used to spread this hoax included communication apps such as WhatsApp, Viber, iMessage or Facebook Messenger.


Hitting emails and Facebook: Ray-Ban scam is back

Mellanox Paves the Way to Higher Efficiency Data Centers With 25 Gb/s Ethernet (NASDAQ:MLNX)

Mellanox 25 Gb/s Ethernet Adapters Enable New Levels of ROI by Improving the Density/Price Point for Hyper-Scale Deployments



Mellanox Paves the Way to Higher Efficiency Data Centers With 25 Gb/s Ethernet (NASDAQ:MLNX)

Most organizations unconfident in ability to protect data

The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach, a Gemalto study has found.
At a time when one-third of organizations have experienced a data breach in the last 12 months, and more than 3.9 billion data records have been lost or stolen since 2013, the report’s findings will be a cause for some concern.


Most organizations unconfident in ability to protect data

Dell today announced new and promoted partners to the Dell Internet of Things (IoT) Solutions | Dell

Dell today announced new and promoted partners to the Dell Internet of Things (IoT) Solutions Partner Programand winners of the "Connect What Matters" IoT Contest. The addition of VMware, Nokia, Eurotech and others to the program allows Dell to provide more technology choices for customers and unlock new market opportunities. The promotion of DGLogikExara, and FogHorn from Registered to Associate tier demonstrates that partners can advance in the program based on established success criteria.



Dell today announced new and promoted partners to the Dell Internet of Things (IoT) Solutions | Dell

University of Calgary bows down to ransomware demands

The University of Calgary has handed over $20,000 CND to cybercriminals, who had launched a ransomware attack on the institution.
It revealed that 10 days after its systems were affected, it has been unable to fully restore its systems back to normal.


University of Calgary bows down to ransomware demands

Threat Intelligence Cyber Defense, Part 3 of 3

In my last blog we discussed some high level defensive tactics we can take within each phase of the attack chain, once we understand the attacker’s attack methodologies, in order to build a more intelligent defensive posture.  (https://blog.fortinet.com/post/threat-intelligence-cyber-defense-part-2-of-3)
Now in this final blog in this series, I will take a look at how we can go a bit deeper within each phase of the attack to get more granular with our cyber defense.  


Fortinet Blog

Crimeware: Malware and massive campaigns around the world

Within the world of IT security, one of the biggest concerns for companies and users is malicious code that can compromise their systems and/or information networks. This concern is not at all unfounded, as cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats observed by the various antivirus laboratories grows constantly and daily, and shows increasing diversity.
2015 was no exception, and not only was the growth of cybercrime observed worldwide but we also saw a change in its aggressiveness and in the types of attack (ransomware being one particular example).


Crimeware: Malware and massive campaigns around the world

IRS’s new Get Transcript online service benefits from enhanced cybersecurity

The Internal Revenue Service (IRS) in the US has relaunched its Get Transcript online service, which it says is more secure than the previous version.
The service is characterized by being “more rigorous”, the IRS said in an official announcement, with new security features adding additional layers of cybersecurity.


IRS’s new Get Transcript online service benefits from enhanced cybersecurity