Search This Blog

Monday, June 5, 2017

New Loki Variant Being Spread via PDF File | Fortinet Blog

The Loki Bot has been observed for years. As you may know, it is designed to steal credentials from installed software on a victim’s machine, such as email clients, browsers, FTP clients, file management clients, and so on. FortiGuard Labs recently captured a PDF sample that is used to spread a new Loki variant. In this blog, we will analyze how this new variant works and what it steals.



New Loki Variant Being Spread via PDF File | Fortinet Blog

Spring Parade for Refreshed Android Marcher | Fortinet Blog

Android malware continues to grow exponentially now that it has overtaken the top position as the most popular OS (across all platforms), making it the target of choice for malware authors. Android Marcher is an Android banker malware that has been on the FortiGuard Labs radar since late 2013. Since that time it has been seen in a number of campaigns targeting many different banks and countries. And now, Marcher has once again resurfaced with a new campaign. Over the past few months we have observed it masking itself in a variety of ways – sometimes hiding behind the icons of games, banks or popular applications to lure victims into installing it on their devices.



Spring Parade for Refreshed Android Marcher | Fortinet Blog

Byline: What is Next for Cloud Services in the Federal Space? | Fortinet Blog

Historically, federal agencies have been wary of using public cloud due to security concerns. Yet the agility and cost savings offered by cloud infrastructure is proving to be a major incentive, leading to a recent big push for agencies to re-engage with public cloud providers. 



Byline: What is Next for Cloud Services in the Federal Space? | Fortinet Blog

Infographic: Protecting Today’s Financial Services Industry in a Digital Environment | Fortinet Blog

Consumers around the world across a variety of industries are adopting digital technologies to improve their daily lives, and they expect organizations to support this behavior. In the financial services sector, they’re using technologies like digital banking and insurance apps for tasks that used to be completed offline.



Infographic: Protecting Today’s Financial Services Industry in a Digital Environment | Fortinet Blog

An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability | Fortinet Blog

FortiGuard Labs recently came across a new strain of samples exploiting the CVE-2017-0199 vulnerability. This vulnerability was fixed by Microsoft and the patch was released in April 2017. Due to its simplicity, it can be easily exploited by attackers. It has also been found in-the-wild by other vendors. We have also blogged about some samples recently found in spear phishing attack.



An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability | Fortinet Blog

Hands-on with Apple's new MacBooks

New iPad, new screen size

Apple's WWDC 2017 keynote

Apple is getting into the AR game

Apple's HomePod is a smart speaker for your home

Apple's new iPad Pros get speed and a new size

Apple does AR on the iPad and iPhone

4th QUARTER PRESS RELEASE

4th QUARTER PRESS RELEASE

MICROCHIP TECHNOLOGY FOURTH QUARTER

MICROCHIP TECHNOLOGY FOURTH QUARTER

Interview: Dick Costolo talks to Walt Mossberg about Steve Jobs, Bill Ga...





#Recode


Supercut of the biggest announcements from Apple WWDC 2017

Apple's App Store gets a makeover

National Bank of Canada Accelerates Time to Market with BMC

BMC Digital Service Management and Business Automation Solutions Selected to Increase Efficiency, Optimize Costs and Reduce Risk



RSS Content - BMC Software

Thursday, May 18, 2017

QuickBooks Online Introduces Changes in Site Navigation

QuickBooks Online accounting software for small businesses recently announced it is rolling out some new navigation changes to improve productivity and online experience.
The company whose accounting software helps small businesses organize their finances and makes it easier to manage essential financial tasks like creating invoices, keeping track of sales and expenses, and producing reports, says its goal is to create a better experience for those small business customers. The company says  changes will ultimately allow small business owners and managers to get back to doing what they love — running their businesses.


QuickBooks Online Introduces Changes in Site Navigation

New Pirates of the Caribbean film ‘stolen by cybercriminals’

Cybercriminals have reportedly stolen Walt Disney’s upcoming Pirates of the Caribbean film, and are threatening to release it online if their ransom demands are not met.
CEO Bob Iger reportedly broke the news to ABC employees, adding that chunks of the new film, Pirates of the Caribbean: Dead Men Tell No Tales, will be put into the public domain unless the cybercriminals are paid using the digital currency bitcoin.


New Pirates of the Caribbean film ‘stolen by cybercriminals’

Check-EternalBlue: Is your PC patched against the WannaCryptor - aka worm vulnerability?

By now, most of us have heard about last week’s global ransomware attack, which spread all over the world on May 12th, 2017. It is a new variant of WannaCryptor, which is also known as WannaCry and WannaCrypt, and detected by ESET as Win32/Filecoder.WannaCryptor.D. And it has characteristics of a worm, capable of compromising other computers on the network.
This attack, which is still ongoing, although with less impact as before, has set a new milestone in the history of events related to malware outbreaks. A combination of factors – and some negligence – has enabled the massive damage that this “ransomw0rm” has caused.


Check-EternalBlue: Is your PC patched against the WannaCryptor - aka worm vulnerability?

Wednesday, May 17, 2017

Who’s Behind the WannaCry Ransomware Attack?

Who’s Behind the WannaCry Ransomware Attack?

WannaCry: Evolving History from Beta to 2.0

The WannaCry malware was responsible for a massive infection beginning that affected organizations and systems around the world. FortiGuard Labs has been monitoring this malware carefully. We have provided an analysis of this attack, along with how to protect your organization here.  In this blog post I’ll briefly describe some of the distinct characteristics of each version of this malware, from beta to the latest 2.0 version, and share some interesting findings.



Fortinet Blog

Ransomware Infographic: An Anatomy of the WannaCry Cyberattack

Ransomware Infographic: An Anatomy of the WannaCry Cyberattack

Is Snapchat Really Right For Your Small Business?

Is Snapchat really the way to go for your small business? Low growth numbers in Q1 2017 and stiff competition from the likes of Facebook and Instagram Stories have business owners wondering if this video app might self destruct just like the videos and pictures sent on the network eventually do.
However, if you think about best practices when using the app, Snapchat can still be a decent arrow in your marketing quiver.  Here’s how.


Is Snapchat Really Right For Your Small Business?

Security updates belong in the limelight, not in the dustbin of history

Updates for your security solution are so 90s. You don’t even need them if you use a so-called “next-gen” solution that can protect and learn everything directly on your endpoint, right? Well, not exactly. The truth is that without regular updates your endpoint is left standing alone against an entire army of cybercriminals. And it will only be a matter of time before you are spotted as easy prey.
Emerging cybersecurity vendors criticize their established counterparts for depending on regular updates. As an alternative, they offer to protect business clients via a machine learning (ML) algorithm that acquires all the necessary data on their clients’ local machines and in their security environments, resulting in one “perk”: No updates necessary. But is that really an advantage?


Security updates belong in the limelight, not in the dustbin of history

Tuesday, May 16, 2017

7 Ways to Use Digital Coupons to Grow Your Retail Sales

Do you use coupons to attract customers to your retail store? Today’s deal-hungry consumers have come to expect coupons as a part of doing business, and if you want to keep up with your competitors, you’d better be offering deals on a regular basis.
Digital coupons are becoming a popular marketing tactic—especially for smaller stores. In fact, according to a recent report, 2017 State of Mobile Offers, smaller stores now surpass larger retailers in the speed with which they are adopting digital and mobile couponing.


7 Ways to Use Digital Coupons to Grow Your Retail Sales

Top 5 Tips to Avoid the next Ransomware Attack - Panda Security

Top 5 Tips to Avoid the next Ransomware Attack - Panda Security

No Tears for WannaCry: Five Steps Every CISO Should Consider for Protecting Your Organization from Ransomware

Over the past few days WannaCry malicious malware variants affected hundreds of organizations across the world. This cyberattack spread primarily by exploiting a vulnerability whose manufacturer had issued a critical security update over two months ago.



Fortinet Blog

What is Digital Transformation and What Opportunities Does it Offer Your Business?

Enterprise software may not sound exciting to the average person, but with the total annual revenue projected to reach $438 billion dollars in the next three years, it becomes apparent why it’s got so many founders and investors excited.
Looking at the types of software enterprise organizations are investing in, it’s largely still the same as it was 20 years ago with money flowing freely into categories like CRM and other database management systems. While these traditional categories of software will individually take in billions, there is a much larger opportunity at hand here. A multi-trillion dollar one.


What is Digital Transformation and What Opportunities Does it Offer Your Business?

Are You Taking Advantage of Facebook's Small Business Council?

There’s a good chance that your small business already uses Facebook (NASDAQ:FB) to promote your offerings and communicate with your audience. But did you know that the social media giant also provides assistance to small business users through the Facebook Small Business Council.



Are You Taking Advantage of Facebook's Small Business Council?

Microsoft Introduces Tools and Services for Small Developers at Build 2017 Event

As expected, Microsoft Build 2017 did not disappoint when it came to announcements and a few surprises. The event, Microsoft’s (NASDAQ:MSFT) annual developer conference, the tech company invited software developers to join them to learn about the latest new technologies and plans on the horizon.
The event held May 10 – 12 in downtown Seattle, WA introduced exciting new tools and service for developers to meet them where they are and help them be more successful.


Microsoft Introduces Tools and Services for Small Developers at Build 2017 Event

WannaCryptor aka WannaCry: Key questions answered

WannaCryptor, aka WannaCry, is one of the biggest cybersecurity stories of 2017. In fact, you could go as far as to suggest one of the biggest in years. Since news first broke on Friday, broadcasters, journalists, bloggers, commentators, experts and security vendors, to name but a few, have reported on, discussed and analysed this global threat with a level of attention unseen before.
While this all welcome, it can sometimes feel like information overload. Aware of this, we’ve put together this Q&A, bringing together some of the key points. There’s enough information to know all the salient points without getting too lost, but also plenty of links if you want more detail on certain areas related to the story.


WannaCryptor aka WannaCry: Key questions answered

From WannaCry to WannaSaveYou Thanks to Adaptive Defense’s Visibility

From WannaCry to WannaSaveYou Thanks to Adaptive Defense’s Visibility

Service Provider Security in the Age of Digital Transformation

Fortinet Blog

5 Ways to Keep the Cloud from Becoming Too Expensive

It’s a long established fact that moving to the Cloud can save your small business money.
However, there are costs associated with using Cloud services and, while they may seem small at first, they can add up to a lot if you’re not careful.


5 Ways to Keep the Cloud from Becoming Too Expensive

Critical Update: WannaCry Ransomware

On May 12th, 2017 the ransomware WannaCry disrupted hundreds of organizations in dozens of countries. The ransomware encrypts personal and critical documents and files and demands approximately $300 USD in BitCoin currency for the victim to unlock their files.



Fortinet Blog

University of Waterloo Selects Mellanox InfiniBand Solutions to Enable Leading-Edge Research in a Variety of Academic Disciplines (NASDAQ:MLNX)

SUNNYVALE, Calif. & YOKNEAM, Israel--(BUSINESS WIRE)-- Mellanox Technologies, Ltd. (NASDAQ: MLNX), a leading supplier of high-performance, end-to-end smart interconnect solutions for data center servers and storage systems, today announced that the University of Waterloo selected Mellanox EDR 100G InfiniBand solutions to accelerate their new supercomputer. The new supercomputer will support a broad and diverse range of academic and scientific research in mathematics, astronomy, science, the environment and more.



University of Waterloo Selects Mellanox InfiniBand Solutions to Enable Leading-Edge Research in a Variety of Academic Disciplines (NASDAQ:MLNX)

Malicious registry keys: Reflective injection

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both by security solutions and the human eye.
In recent months, we have started to receive various reports about suspicious and malicious registry keys that had been created on users’ equipment. For this reason, we decided to explore the subject further and started gathering interesting data which is presented in this article.


Malicious registry keys: Reflective injection

20 Best Chrome Extensions for Small Business

The Chrome Extension Store is full of useful tools for your small business. In this list, we’ve compiled some of the most popular extensions with a variety of features.
Here you’ll find extensions for accounting, collaboration, password management, productivity, lead generation and more. What they all have in common is their 5-star rating and positive reviews.


20 Best Chrome Extensions for Small Business

Apple users advised to update their software now, as new security patches released

Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches in a timely fashion.
What’s that? You’re not so sure that folks have learnt the lesson, despite the round-the-clock coverage in the mainstream media on what must have been one of the highest profile malware attacks in years?


Apple users advised to update their software now, as new security patches released

Monday, May 15, 2017

Samsung Galaxy S8 vs Apple iPhone 7

Why the WannaCry cyberattack is so bad, and so avoidable

Ebay Motors Provides More Opportunities for Sellers -- and Local Service Businesses

eBay Inc. (NASDAQ: EBAY) is making some changes to its motors marketplace and platform that small businesses, especially local service providers, might want to take note of. The giant eCommerce company announced recently it is expanding the eBay Motors marketplace and adding new features and services to deliver a more personalized and innovative experience to automotive buyers.



Ebay Motors Provides More Opportunities for Sellers -- and Local Service Businesses

Were you a victim of WannaCry ransomware? (The 3:59, Ep. 227)





#CNET


Livestreaming Entrepreneurs, Here's How Virtual Assistants and Chatbots Boost Success

In 2016, Facebook opened up its Facebook Messenger app to third-party chatbots. Businesses are being encouraged to make chatbots work well with Messenger to serve 1.79 billion monthly active users on Facebook, one billion of whom are active on Messenger. The mass-market potential of chatbots is that its “technology will simply understand and do as the human asks,” reports Gartner.
Research cited by VentureBeat says 86 percent of millennials have a positive view of chatbots. And according to ChatbotsMagazine.com, chatbots in 2017 are like the web 20 years ago: “Everyone has a burning instinct that they need to be there, but no one’s sure what to do or how to do it right.”


Livestreaming Entrepreneurs, Here's How Virtual Assistants and Chatbots Boost Success

Saturday, May 13, 2017

WannaCry

Information regarding the WannaCry ransomware is spreading as quickly as the malware itself and is expected to do so throughout the weekend. This blog provides some information from our malware processing system that may, or may not be, available elsewhere.



WannaCry

Protecting Your Organization from the WCry Ransomware

Ransomware has become the fastest growing malware threat, targeting everyone from home users to healthcare systems to corporate networks. Tracking analysis shows that there has been an average of more than 4,000 ransomware attacks every day since January 1, 2016.



Fortinet Blog

Huge ransomware outbreak disrupts IT systems worldwide, WannaCryptor to blame

That escalated quickly! For those of you who did not read any news on Friday (or had your heads in the sand), you need to know that a massive tidal wave of malware just struck Planet Earth, creating gigantic waves in the information security sphere and even bigger waves for the victims. The culprit? A piece of ransomware, called WannaCryptor by ESET but also going by Wanna Cry and Wcrypt, has been spreading rapidly and it is utilizing leaked NSA files, namely the eternalblue SMB exploit.
Unlike most encrypting-type malware, this one has wormlike capabilities, allowing it to spread by itself. As a result, it has spread very quickly indeed. This is what victims of the English language version see:


Huge ransomware outbreak disrupts IT systems worldwide, WannaCryptor to blame

New WhatsApp scam: Netflix free for a year

The idea of watching a whole season of your favorite TV how or the latest movies online for free is extremely appealing. Fraudsters are all too aware of this, as we’ll show.
And it is obvious that cybercriminals are using Netflix – which has almost 100 million users – to spread their attacks, as it is one of the most popular ‘internet television networks” in the world today.


New WhatsApp scam: Netflix free for a year

Tablet security: Is it as good as your smartphone?

Naturally, when it comes mobile security, a lot of focus is directed towards smartphones. That’s not really all that surprising, as these wondrous, pocket-sized computers have quickly taken over most aspects of our personal and professional lives. Consequently, being safe and secure is of paramount importance here.
Similarly, tablets have become a key feature in many homes, as well as in many offices, places of work. However, it seems perhaps that our approach to cybersecurity with these devices isn’t as thorough as it might be with smartphones (which, at times, also could be better).


Tablet security: Is it as good as your smartphone?

Dowi Hosiery Mills implements NetSuite to modernize and streamline key business processes

Specialty Textile Manufacturer Increases Inventory Turnover, Expands Product Lines with NetSuite Cloud ERP



Dowi Hosiery Mills implements NetSuite to modernize and streamline key business processes

Deep Analysis of Esteemaudit

In this blog, the FortiGuard team takes a look at Esteemaudit, which is an exploit that was included in the set of cybertools leaked by the hacker group known as "Shadow Brokers." They claim that they collected this set of cybertools from the compromised data of "Equation Group," a threat actor alleged to be tied to the United States National Security Agency (NSA).



Fortinet Blog

BMC Names Márcia Nakahara as New Brazil Country Manager

Twenty-five year veteran takes over to drive company's digital business growth, customer satisfaction, and employee engagement



RSS Content - BMC Software

Hackers who stole information from law firms and made millions by insider trading, fined $9 million

Three Chinese citizens have been ordered to pay $8.8 million, after hacking into two prominent New York-based law firms, stealing sensitive plans for upcoming corporate mergers and acquisitions, and trading shares using non-public inside information.
26-year-old Iat Hong, 30-year-old Bo Zheng, and Hung Chin, 50, have been fined $8,895,561.12 after allegedly racking up almost $3 million in illegal profits through their insider trading scheme.


Hackers who stole information from law firms and made millions by insider trading, fined $9 million

7 Concrete Ways the Cloud is Cheaper - With Examples

By now, it’s likely you’ve heard that using Cloud services is a cheaper option than setting-up and maintaining your own on-premises data center.
One of the reasons behind this claim is the fact that your Cloud service provider spreads the costs of their own data center operations across many clients. That’s a much less expensive option than paying the full cost of your own.


7 Concrete Ways the Cloud is Cheaper - With Examples

Byline: Security Platform vs. Security Fabric

One of the challenges many organizations face when considering upgrading or expanding their security infrastructure is simply wading through the sometimes-confusing language and nomenclature being invented by security vendors and manufacturers to describe new technologies and strategies.



Fortinet Blog

Anti-trust, EU complaints and the anti-malware industry

Last week Eugene Kaspersky posted a blog about his company’s – and more importantly the entire industry’s – struggle to ensure consumers have a simple and unhindered method to choose a security product.
As someone who’s been very close to the issues highlighted in Eugene’s blog I agree in principle with the majority of the points mentioned. In fact I could probably add my own list of examples, changes and concerns.


Anti-trust, EU complaints and the anti-malware industry

What is Content Curation and How Can You Use it For Your Small Business?

When it comes to marketing, the general consensus is content is king. Every business under the sun is facing increasing competition, and it’s getting harder and harder to stand out. However, by publishing and sharing added value content, companies are able to get a leg up on the competition and provide marketing leads with far more than a ham-fisted, hard sell.
But coming up with truly original and useful content that adds value can often be pretty tricky, and some business owners understandably struggle. That’s why more and more companies are now focusing their efforts on content curation rather than creation for their content marketing efforts.


What is Content Curation and How Can You Use it For Your Small Business?

Simple Ways To Make Your Twitter Safer - Panda Security

Simple Ways To Make Your Twitter Safer - Panda Security

Friday, May 12, 2017

Security Research News in Brief - April 2017 Edition

Fortinet Blog

Holidaymakers warned against increased threat from online fraudsters

The number of holidaymakers being targeted by cybercriminals has risen by nearly 20% compared to last year, with online fraudsters stealing some £7.2 million from nearly 6,000 unsuspecting travellers over the last 12 months.



Holidaymakers warned against increased threat from online fraudsters

IDC: 1 in 4 companies have no clue GDPR is coming their way

New consent rules, broadened European privacy rights, fines going up to millions of euros, as well as stricter procedures and public disclosure in cases of a data breach – these are just some of the changes that will come into force as part of the General Data Protection Regulation (GDPR) in May 2018.



IDC: 1 in 4 companies have no clue GDPR is coming their way

White House Announces New Cybersecurity Executive Order

President Trump just signed a new cybersecurity Executive Order that has important implications, not only for federal agencies, but for Critical Infrastructures as well. In addition to noting that it is “the policy of the United States to manage cybersecurity risk as an executive branch enterprise”, the order states that, “Free and secure use of cyberspace is essential to advancing U.S. national interests. The Internet is a vital national resource. Cyberspace must be an environment that fosters efficiency, innovation, communication, and economic prosperity without disruption, fraud, theft, or invasion of privacy.”



Fortinet Blog

Thursday, May 11, 2017

Solutions - 15dB Gain Differential Amplifier Delivers up to +50dBm OIP3 Linearity and Low Noise from 100kHz to 1.4GHz

MILPITAS, CA and NORWOOD, MA – May 10, 2017 – Analog Devices, Inc., which recently acquired Linear Technology Corporation, announces the LTC6432-15, a wideband fully differential amplifier with 15dB gain, offering linearity of up to +50.3dBm OIP3 (output third-order intercept), very high OP1dB (output 1dB compression point) of +22.7dBm, and 3.2dB noise figure at 150MHz. In addition to its outstanding signal-to-noise at high frequencies, it maintains its dynamic range performance even at lower frequencies. That is because the LTC6432-15’s advanced SiGe bipolar design exhibits significantly lower 1/f noise frequency corner than that of GaAs or pHEMT FET based amplifiers. Hence its noise figure rises to only 6.6dB at 100kHz, compared to more than 20dB for other amplifiers. The LTC6432-15 effectively extends the useful bandwidth and dynamic range performance for many applications that process low frequency signals. Moreover, the LTC6432-15 achieves superior stability over temperature, power supply ranges and from device to device compared to GaAs and pHEMT amplifiers.



Solutions - 15dB Gain Differential Amplifier Delivers up to +50dBm OIP3 Linearity and Low Noise from 100kHz to 1.4GHz

Tuesday, May 9, 2017

BMC Hosts Private Briefing for Eligible Investors

RSS Content - BMC Software

A massive hacking attack hit Emmanuel Macron's Presidential campaign

A massive hacking attack hit Emmanuel Macron's Presidential campaign

Software, Software all Around but Not a Tool to Use

Fortinet Blog

Jackware hits the big screen in #Fast8: Fate of the Furious

Car hacking takes center stage in the recently released eighth episode of the enormously popular Fast and Furious film franchise: Fate of the Furious (or #Fast8 if you’re into the whole brevity thing). Having coined the term “jackware” for malicious code used to hijack vehicles, I was excited when a Twitter friend tipped me to the film’s depiction of vehicular hacking mayhem and went to the cinema to see for myself. Fortunately, for those who don’t like watching movies in cinemas, you can watch scenes of “jackware at scale” on YouTube in the Fast and Furious 8 Official Trailer #2:



Jackware hits the big screen in #Fast8: Fate of the Furious

False positives can be more costly than a malware infection

Poor business decisions can be very costly, especially in cybersecurity, where labeling clean items as malicious – so-called false positives – can have very damaging consequences.



False positives can be more costly than a malware infection

BMC Survey: 92% of IT Pros Declare Digital Business Automation Required Across Enterprise in Order to Keep Pace with Speed of Innovation

New Adaptive Approach to IT Automation to Simplify the Management of Hybrid Multi-Cloud Businesses



RSS Content - BMC Software

IBM News room - 2017-05-08 IBM and ventureLAB Team with Ontario Government and Ontario Centres of Excellence to Drive Innovation and Economic Growth in York Region - United States

IBM News room - 2017-05-08 IBM and ventureLAB Team with Ontario Government and Ontario Centres of Excellence to Drive Innovation and Economic Growth in York Region - United States

IBM News room - 2017-05-08 Logiety Launches New App built with Watson on IBM Cloud to Speed Export-Import Processes in Latin America - United States

IBM News room - 2017-05-08 Logiety Launches New App built with Watson on IBM Cloud to Speed Export-Import Processes in Latin America - United States

IBM News room - 2017-05-08 The Weather Company, an IBM Business, to Empower Jeppesen and Boeing Flight Operations Solutions Through Weather Services and Insights - United States

IBM News room - 2017-05-08 The Weather Company, an IBM Business, to Empower Jeppesen and Boeing Flight Operations Solutions Through Weather Services and Insights - United States

IBM News room - 2017-05-08 NVIDIA Tesla Accelerators on IBM Cloud Demonstrate Advanced Performance for Training Deep Learning Models - United States

IBM News room - 2017-05-08 NVIDIA Tesla Accelerators on IBM Cloud Demonstrate Advanced Performance for Training Deep Learning Models - United States

IBM News room - 2017-05-07 IBM Supports New Faster Protocols for Flash Storage - United States

IBM News room - 2017-05-07 IBM Supports New Faster Protocols for Flash Storage - United States

Amazon's new Echo hitting this week? Comcast to offer mesh products





#CNET


How the military hopes to stop future cyberattacks





#CNET


IBM News room - 2017-05-07 Zanroo Taps IBM Cloud for Global Expansion Plans - United States

IBM News room - 2017-05-07 Zanroo Taps IBM Cloud for Global Expansion Plans - United States

IBM News room - 2017-05-06 IBM Security Executives to Present at KuppingerCole European Identity & Cloud Conference - United States

IBM News room - 2017-05-06 IBM Security Executives to Present at KuppingerCole European Identity & Cloud Conference - United States

IBM News room - 2017-05-06 IBM Vice President Supply Chain Joanne Wright Chosen to Keynote Supply Chain Summit in Chicago - United States

IBM News room - 2017-05-06 IBM Vice President Supply Chain Joanne Wright Chosen to Keynote Supply Chain Summit in Chicago - United States

Forty Ounce Wines Story Shows, When You Go Viral, Be Ready!

Think going viral is all fun and games for a small business? Think again.



Forty Ounce Wines Story Shows, When You Go Viral, Be Ready!

Will Net Neutrality be undone? (The 3:59, Ep. 223)





#CNET




Monday, May 8, 2017

The Open Security Requirement in the Age of the Cloud

Fortinet Blog

Dell EMC Software-Defined Storage Paves Way for Data Center Modernization

Dell EMC Software-Defined Storage Paves Way for Data Center Modernization

Dell EMC Launches Integrated Data Protection Appliance and Expands Cloud Data Protection Portfolio

Dell EMC Launches Integrated Data Protection Appliance and Expands Cloud Data Protection Portfolio

New Dell EMC Hyper-Converged Infrastructure Advancements and Cloud-Like Consumption Model Ease Adoption

New Dell EMC Hyper-Converged Infrastructure Advancements and Cloud-Like Consumption Model Ease Adoption

Dell EMC Introduces New All-Flash Storage Systems to Help Customers Modernize Their Data Centers and Transform IT

Dell EMC Introduces New All-Flash Storage Systems to Help Customers Modernize Their Data Centers and Transform IT

Dell EMC Delivers Wave of Innovations to Help Customers Realize Digital Transformation Goals

Dell EMC Delivers Wave of Innovations to Help Customers Realize Digital Transformation Goals

Dell Technologies Rolls Out Flexible Consumption Models for IT from the Desktop to the Data Center

Dell Technologies Rolls Out Flexible Consumption Models for IT from the Desktop to the Data Center

Dell EMC Drives IT Transformation with the New 14th Generation of PowerEdge Servers

Dell EMC Drives IT Transformation with the New 14th Generation of PowerEdge Servers

Dell EMC Powers IT Transformation with New Open Networking Products

Dell EMC Powers IT Transformation with New Open Networking Products

Dell Technologies Unveils Venture Arm Formerly in Stealth — Dell Technologies Capital

Dell Technologies Unveils Venture Arm Formerly in Stealth — Dell Technologies Capital

Brocade Delivers Modern Storage Networks for New Dell EMC All-Flash Arrays (NASDAQ:BRCD)

Brocade Delivers Modern Storage Networks for New Dell EMC All-Flash Arrays (NASDAQ:BRCD)

Ransomware Cyber-Insurance: a Rising Trend in Businesses

Ransomware Cyber-Insurance: a Rising Trend in Businesses

Mellanox Technologies, Ltd. to Present at Upcoming Investor Conferences (NASDAQ:MLNX)

Mellanox Technologies, Ltd. to Present at Upcoming Investor Conferences (NASDAQ:MLNX)

Big changes in the infosec landscape: Time to take note and take action

Recent events are changing the topography of the threat model and attack methodologies across the board and at record speeds – to say that the impact of the past few weeks in information security news has been small would be a complete understatement.



Big changes in the infosec landscape: Time to take note and take action

Indian Tech Firm Pledges to Hire More Americans Pending H-1B Scrutiny

Indian technology company Infosys Ltd. plans to hire more American workers instead of foreign labor in response to the Trump administration’s increased scrutiny of the controversial H-1B visa program.



Indian Tech Firm Pledges to Hire More Americans Pending H-1B Scrutiny

Retailers Gymshark, This Works and Cox & Cox fuel growth with NetSuite and Patchworks

Retailers Gymshark, This Works and Cox & Cox fuel growth with NetSuite and Patchworks

Malware warning for Mac users, after HandBrake mirror download server hacked

Malware warning for Mac users, after HandBrake mirror download server hacked

Cybercriminals are saying it with flowers from Debenhams

Criminal hackers have struck again and stolen the personal data of 26,000 Debenhams Flowers customers, according to a company statement widely reported in the media.
Debenhams, one of the largest retailers in the UK, has taken the responsible step of alerting customers of Debenhams Flowers that they have suffered a cyberattack. Despite the name, Debenhams Flowers is a service and website run by Debenhams’ e-commerce partner Ecomnova.


Cybercriminals are saying it with flowers from Debenhams

Apple Cuts App Store Affiliate Commissions, WhatsApp Experiences Worldwide Outage

Mobile apps have had a huge impact on how businesses operate. And the App Store is one of the most popular ways for people to find those apps. But this week, Apple announced that its cutting commissions for members of its affiliate program.
In addition, popular mobile app WhatsApp experienced a worldwide outage this week that had plenty of users upset. Read about these headlines and more in this week’s Small Business Trends news and information roundup.


Apple Cuts App Store Affiliate Commissions, WhatsApp Experiences Worldwide Outage

Microsoft Twitter Chat Explores Transforming Business with Cloud #MSBizTips

The cloud something much more than just a means to help you store data or access your information on multiple devices. There’s an ever-growing list of tools and applications for the technology that can actually transform your business.
For some small business owners though, the cloud is still an underutilized resource. And for many of them, it’s just a matter of their lack of knowledge holding them back.


Microsoft Twitter Chat Explores Transforming Business with Cloud #MSBizTips

Why Today’s Financial Organizations Should Deploy Internal Segmentation Firewalls

Fortinet Blog

Friday, May 5, 2017

New features in Windows 10





#CNET


LaCie 12big Thunderbolt 3





#CNET


iPhone legal battle may take new, dramatic turn





#CNET


SpaceX's satellite internet, Whirlpool buys Yummly



#CNET

Surveillance, cybersecurity, and the future of privacy in The Circle

If surveillance, cybersecurity, and privacy are things you think about a lot, you should find The Circle, a new movie based on Dave Eggers’ 2013 novel of the same name, interesting viewing. This is one of two recent films that reflect how central these issues have become to modern life and popular culture (the other is Fate of the Furious, which I will be writing about soon).



Surveillance, cybersecurity, and the future of privacy in The Circle

Is CIA the only agency in the world that can penetrate your iPhone and Mac laptop?

Is CIA the only agency in the world that can penetrate your iPhone and Mac laptop?

Multiple Joomla! Core XSS Vulnerabilities Are Discovered

Joomla! is one of the world's most popular content management system (CMS) solutions. It enables users to build custom Web sites and powerful online applications. More than 3 percent of Web sites are running Joomla!, and it accounts for more than 9 percent of CMS market share.



Fortinet Blog

Tim Cook says the Apple Watch helped him lose 30 pounds, but he still lo...





#CNET


Tim Cook blames iPhone 8 rumors for iPhone sales slowdown. Duh! (Apple B...





#CNET


How to enable the new 'dark theme' on YouTube

Thursday, May 4, 2017

KLA-Tencor Declares Regular Cash Dividend for the Second Quarter of Calendar Year 2017 (NASDAQ:KLAC)

KLA-Tencor Declares Regular Cash Dividend for the Second Quarter of Calendar Year 2017 (NASDAQ:KLAC)

Augmented Reality: It's Not Just About Pokemon Go Anymore

Augmented reality broke onto the public consciousness with the release of Pokemon Go. But if you think the technology doesn’t have business applications beyond catching cartoon characters in parks around your home, you’d be wrong.



Augmented Reality: It's Not Just About Pokemon Go Anymore

Dell EMC Unveils New Cloud Platform for Microsoft Azure Stack

Dell EMC Unveils New Cloud Platform for Microsoft Azure Stack

Salesforce Expands Relationship with Dell, Signs Multi-Year Commitment to Use Dell EMC Infrastructure and Dell Laptops

Salesforce Expands Relationship with Dell, Signs Multi-Year Commitment to Use Dell EMC Infrastructure and Dell Laptops

Video Gallery: Fortinet Employees Spotlight SIEM and Secure Access at HIMSS17

This past February, thousands of healthcare IT professionals gathered in Orlando for the 2017 HIMSS conference to get an expansive view of the current healthcare landscape. Fortinet was also in attendance, presenting as well as walking the floors of the conference to connect with other vendors and discuss how their solutions can help clinicians and IT professionals keep their organization’s network secure.



Fortinet Blog

Gannett Co data breach: 18,000 employees reportedly affected

US newspaper and media giant Gannett Co has been targeted by a phishing attack that may have compromised the accounts of as many as 18,000 current and former employees.
The group has already stressed that there is currently no indication that any sensitive personal data has been accessed as part of the phishing attack, although it will be offering credit monitoring to those affected.


Gannett Co data breach: 18,000 employees reportedly affected

BMC Software Honored With Two Bronze Stevie® Awards in 2017 American Business Awards ℠

Stevie winners will be presented with their awards on June 20 in New York



RSS Content - BMC Software

Security education and social responsibility

There is a scam that has dwelt amongst us for many years and 2016 marked the second decade of its spread via email. Millions upon millions of online users have encountered it, but despite many being able to recognize it, the reality is that there are still people who are deceived by it. For some it’s down to naivety and ignorance; for others simple curiosity. In the end, they all end up as victims.



Security education and social responsibility

A short history of the computer password

The password is nothing new. In fact, it has been around for centuries. Way before Hotmail, Skype and Netflix were prompting you to create a secure code with a funky username, the Romans reportedly used passwords as a way to convey important military messages between troops.
Essentially, it was a simple way to protect information. Fast forward a few thousand years and enter Fernando Corbató.


A short history of the computer password

Brocade to Announce Second Quarter 2017 Results on May 25, 2017 (NASDAQ:BRCD)

Brocade to Announce Second Quarter 2017 Results on May 25, 2017 (NASDAQ:BRCD)

What Size Companies Do Hackers Target? - Panda Security

What Size Companies Do Hackers Target? - Panda Security

Fingerprint security: Three myths busted

Fingerprints have long been viewed as the ultimate identifier, unique only to you and impossible to steal, which is why fingerprint readers have become integral to smartphone and mobile device security.
So, it seems, these gadgets must now be at their most secure. Well, not quite. We debunk three myths in this short feature to bring some clarity to the subject of fingerprint security.


Fingerprint security: Three myths busted

AV-Comparatives awards the highest certification to Panda Security in protection against malware

AV-Comparatives awards the highest certification to Panda Security in protection against malware

Google shuts down a big security problem





#CNET


Can the Google Pixel catch up to the Galaxy S8? (The 3:59, Ep. 222)





#CNET


You've got a cooking teacher in the Google Home





#CNET


Tour the new Hulu, now streaming 50 live TV channels





#CNET


HBO to pull shows off Amazon, the UPS hydrogen truck





#CNET


Facebook hiring more staff to review graphic content





#CNET


Make GIFs easily on the Galaxy S8





#CNET


Deep Analysis of New Emotet Variant

Fortinet Blog

Why Instagram May be Better Than Twitter for Reaching Your Customers

Instagram recently hit the 700 million user mark. That’s twice the size of Twitter.
It only took four months to gain another 100 million users. And at this rate, Instagram will be at the billion user mark in no time.


Why Instagram May be Better Than Twitter for Reaching Your Customers

A DDoS attack could cost businesses as much as $2.5 million

Businesses that fall victim to a DDoS attack could lose, on average, as much as $2.5 million in revenue, new research has suggested.  
study published by Neustar Research, which analyzed over a thousand CISOs, CSOs, CTOs, security directors and managers, found that around 43% of organizations affected by a DDoS attack saw an average revenue loss of at least $250,000 per hour.


A DDoS attack could cost businesses as much as $2.5 million

Monash University Transforms Employee Experience with the BMC Digital Workplace Solution

Consumer-like experiences improving efficiencies and collaboration



RSS Content - BMC Software

Wednesday, May 3, 2017

BMC Introduces New Cloud-based SecOps Response Service

Award-Winning Security and Compliance Solution simplifies, enforces and ensures security for multi-cloud and on-premise environments



RSS Content - BMC Software

Facebook adding 3,000 reviewers to combat violent videos - May. 3, 2017

Facebook is planning to hire thousands of people to help review user content following multiple high-profile incidents of people sharing videos of suicide and murder.



Mark Zuckerberg, Facebook's CEO and cofounder, said Wednesday the company will add 3,000 people to its global community operations team to help "review the millions of reports we get every week." That is in addition to the 4,500 people already on the team.



Facebook adding 3,000 reviewers to combat violent videos - May. 3, 2017

No more pointless password requirements

You know the struggle – you’re staring at yet another sign-up form, on yet another website, after being asked to create an account in order to proceed.
You give it your best to come up with a password you aren’t already using across your most crucial online accounts and hit submit. Not so fast! “Password must contain at least one uppercase letter.” Okay then, there you go, submit. “Password must contain at least one special character.” Now the password can’t contain the very character you’ve chosen. Sorry, now the “password is too long”.


No more pointless password requirements

What motivates some young people to become cybercriminals?

We know that cybercriminals are almost always seeking financial gain, but it seems that this is not usually what young cybercriminals have in mind when they take their first steps over to the “dark side”.
For example, an interesting report by the UK’s National Crime Agency (NCA) found that many are not necessarily motivated by financial reward. In fact, recognition from their peers, popularity in the forums they belong to, and a sense of success, are bigger influencing factors.


What motivates some young people to become cybercriminals?

Bricker Bot – A Silver Lining to Force Accountability for IoT Security?

The Bricker bot made the news a couple of weeks ago as being responsible for knocking unsecured IoT devices offline, rather than hijacking them into other botnets and using them for a DDoS attack like the massive event we saw last year against DYN. This is the third botnet that targets insecure IoT devices, but the only one that is destructive. The second, dubbed Hajime, breaks the into IoT devices, but instead of bricking them, it makes them more secure by disabling remote access to the device from the internet. Of course, Mirai was the first, but it has the same purpose as other botnets, which is to enslave IoT devices and use the computing power of its collection of bots for whatever might please the threat actor behind it.



Fortinet Blog

Apple iPhone sales fall again - May. 2, 2017

Apple's iPhone sales declined again.



On Tuesday, Apple (AAPL, Tech30) reported that it sold 50.8 million iPhones in the most recent quarter, down from 51.2 million units sold in the same quarter a year earlier.



Apple iPhone sales fall again - May. 2, 2017

How Can Your Business Use PayPal's Business in a Box?

Setting up an online business is not for the faint of heart, and PayPal (NASDAQ:PYPL) is looking to make that process a bit easier with the launch of its new toolkit, Business in a Box.



How Can Your Business Use PayPal's Business in a Box?

Apple iPhone sales fall, maybe because of iPhone 8





#CNET


25 Tips for Creating Great Marketing Videos

In recent years, videos have been making inroads in digital marketing, emerging as a powerful promotional tool for businesses to promote their wares in an exciting and engaging way. Though when it comes to video marketing, there’s some pretty definitive ‘rules’ businesses should stick to in order to get their videos right. Get them wrong and marketing videos can be more hindering to a company than profiting.
Fortunately, if you’re a business looking to embark on an effective video marketing strategy, you’re in the right place, as Small Business Trends explores 25 tips for creating marketing videos.


25 Tips for Creating Great Marketing Videos

How Should You Go About Adopting the Cloud?

After hearing how the Cloud can make your small business more productive, and even contribute to your bottom line, you’ve decided it’s time to take action..
First off, congratulations! Whether you offer products or services, moving your small business operations to the Cloud can be a game-changer, offering capabilities and benefits that will help you succeed.


How Should You Go About Adopting the Cloud?

School's almost out … Don’t let cybercriminals in

When it comes to security, schools have unique challenges. It’s difficult to think of another type of organization that combines the functions of education, healthcare, finance, retail, and research, among the other usual administrative departments like human resources and accounting.



School's almost out … Don’t let cybercriminals in

New Galaxy Note 8 renders will make you want to wait (Googlicious)



#CNET

#technology #Google #Android #Samsung #GalaxyS8 #Note8 #smartphone



Microsoft's new Windows 10 S Surface is a surprisingly traditional laptop





#CNET


Will you buy the $999 Surface Laptop? (The 3:59, Ep. 220)





#CNET


Tuesday, May 2, 2017

A single protective technology means a single point of failure

How would you protect your own home? Would you invest in either a strong fence, a set of security cameras, a very loud alarm, or motion detectors to monitor dark corners? Or would you rather use all of these to improve protection? Keeping your business network safe requires similar questioning. Using a security system based on a single type of technology is a good start, but what will stop cybercriminals from stealing valuable information if they find a way to bypass that?



A single protective technology means a single point of failure

Microsoft doubles down on 'Mixed Realty'





#CNET