Search This Blog

Monday, August 31, 2015

Brocade Showcases New IP Solutions at VMworld 2015 (NASDAQ:BRCD)

COMPANY TO DELIVER EDUCATIONAL AND INTERACTIVE EXPERIENCES FOR CREATING AUTOMATED AND SIMPLIFIED SOFTWARE-DEFINED DATA CENTER ENVIRONMENTS



Brocade Showcases New IP Solutions at VMworld 2015 (NASDAQ:BRCD)

Defending the White Elephant

Myanmar is a country currently engaged in an important political process. A pro-democracy reform took place in 2011 which has helped the government create an atmopshere conducive to investor interest. The country is resource rich, with a variety of natural resources and a steady labor supply. Despite recent progress, the country is subject to ongoing conflict with ethnic rebels and an ongoing civil war. Analysts suggest that both China and the United States are vying for greater influence in Myanmar, with China in particular having geopolitical interest due to sea passages, port deals, and fuel pipelines that are important to its goals. Geopolitical analysts have suggested that the United States may have its own interests that involve thwarting Chinese ambitions in the region.
APT groups from multiple countries – including China – have been known to target organizations of strategic interest with aggressive malware-based espionage campaigns. One of the malware families used in such a scenario is the well-known Remote Access Trojan PlugX, also known as Korplug, that enables full access to the victim’s machine and network.


Defending the White Elephant

Friday, August 28, 2015

8 security tips for gamers: go play with no worries!

Do you remember the time when “video game” referred to a simple platform in which we could only move within the same screen? Everything was there, at our sight, and we couldn’t pass through the limits.
Nowadays, things are very different because video games are actual stories that we are part of. We get involved with their characters and make them alive. The limits of the screen aren’t a barrier anymore and, being such an important part of our lives, games started to be profitable not only for developing companies but (sadly) also for cybercriminals.


8 security tips for gamers: go play with no worries!

Alienware Brings Liquid Cooling and Dynamic Overclocking to Lineup | Dell

Alienware today announced its highly-anticipated new portfolio of products, featuring the next generation Alienware X51 gaming desktop, updated Alienware 13, 15 and 17 notebooks, and, back for a limited time, the Alienware 18 notebook. The updated desktop and notebooks come on the eve of PAX Prime, one of the largest gaming events in North America, taking place August 28-31 in Seattle, Washington. The event will highlight some of the new solutions including the first look at the new Dell 27 Gaming Monitor, launching in late October. 



Alienware Brings Liquid Cooling and Dynamic Overclocking to Lineup | Dell

iOS vulnerability Ins0mnia fixed by Apple

Apple has fixed a security vulnerability in its latest iOS update (8.4.1) that would allow attackers to run a malicious app in the background for “an unlimited amount of time”.
What was interesting about this particular defect in the operating system was the fact that the malicious app would remain embedded in iOS even after it had been deleted.


iOS vulnerability Ins0mnia fixed by Apple

LizardStresser: Six people arrested for using Lizard Squad's DDoS attack tool

British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – a national newspaper, a school and a number of online retailers.
The link between the attacks is that they all appear to have been conducted using the LizardStresser tool, a DDoS-on-demand service offered by the Lizard Squad hacking gang who managed to take down the XBox Live and PlayStation networks last Christmas.


LizardStresser: Six people arrested for using Lizard Squad's DDoS attack tool

If You're Not Being Audited and Pen Tested, You Should Be | Fortinet Blog

You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash? Not running it. Role-based security measures? Implemented three years ago...of course. And BYOD? Only with approved AV and signed acceptable use and access policies. Your IT staff actually sleeps at night because you don't just have a security plan - You actually follow it.



If You're Not Being Audited and Pen Tested, You Should Be | Fortinet Blog

Thursday, August 27, 2015

KLA-Tencor Announces Upcoming Investor Presentation (NASDAQ:KLAC)

KLA-Tencor Announces Upcoming Investor Presentation (NASDAQ:KLAC)

Sprint is Celebrating the Merger of DIRECTV and AT&T: DIRECTV Customers Get Free Service by Switching to Sprint | Sprint Newsroom

Sprint is Celebrating the Merger of DIRECTV and AT&T: DIRECTV Customers Get Free Service by Switching to Sprint | Sprint Newsroom

Ashley Madison: A timeline of events

It is one of the biggest data breaches in recent times and one of the most far-reaching, the full implications of which are yet to be understood. In fact, as the story continues to unfold, the Ashley Madison attack could become one of the most notable instances of cybercrime in 2015.
Here is a timeline of key events documenting the severity and seriousness of this event, which is now subject to a major, ongoing, multi-partner investigation.


Ashley Madison: A timeline of events

New IBM Cloud Services Give Developers More Flexibility to Integrate Java-based Resources into Bluemix

From IBM:


New IBM Cloud Services Give Developers More Flexibility to Integrate Java-based Resources into Bluemix

ARMONK, N.Y. - 21 Aug 2015: IBM (NYSE: IBM) is announcing general availability and improvements to a set of services for IBM’s platform-as-a-service (PaaS), Bluemix, that enable developers to more seamlessly integrate Java-based resources into their cloud-based applications.
The new IBM Cloud tools are designed to help developers broaden the capabilities of their applications to give users a more robust cloud experience, by leveraging added security and flexibility to use a vast array of resources for their development. They include:
  • Liberty Buildpack updated the Liberty runtime to make available or preview the latest Java EE 7 Liberty features, and while IBM JRE 7.1 remains the default it is now possible to test and run applications in Bluemix with Java 8. Additionally, among other improvements, the jsp-2.3, el-3.0, and jdbc-4.1 Liberty features, previously in beta, are now available as production-ready.
  • IBM Eclipse Tools for Bluemix is launched with a new version that now includes JavaScript Debug, support for Node.js applications, Java 8 Liberty for Java integration, Eclipse Mars support for the latest Eclipse Mars version as well as an improved trust self-signed certificates capability. Additionally, incremental publish support for JEE applications has been expanded to support web fragment projects.
  • XPages on IBM Bluemix brings the power of Domino XPages to the cloud, allowing developers to create feature-rich, responsive, and secure applications that can be quickly brought to market on Bluemix.
Developers can access these new services here: https://console.ng.bluemix.net/
The developer-friendly, open-standards-based Bluemix catalog includes over 100 tools and services of the most prominent open-source technologies combined with IBM and third-party services that allow developers to build, run and manage cloud applications with more flexibility. IBM launched Bluemix via a $1 billion investment in 2014, rapidly becoming the largest Cloud Foundry deployment in the world, and was recently shown to be growing 10-times faster than the overall PaaS market by research firm ESG.
Combining Bluemix and IBM Design Thinking methodology, the Bluemix Garage network creates a bridge between the scale of enterprises and the culture of startups, by establishing physical collaboration spaces housed in the heart of thriving entrepreneurial communities around the world, including successful implementations in San Francisco, London and Toronto.

VMware and Rackspace: The Perfect Partnership

Published on Aug 26, 2015
Rackspace is one of VMware's largest global vCloud® Air Network™ partners and we have extensive experience managing VMware at scale.




Tribridge Joins NetSuite Solution Provider Program

Leading Technology Services Firm Adds NetSuite Cloud to ERP Portfolio



Tribridge Joins NetSuite Solution Provider Program

Could Razer's New 3D Camera Be Good for Online Presentations?

A new 3D camera technology from Razer might be able to remove background from a headshot — as if there were a green screen behind the speaker.
With this camera that’s being developed by the gaming company Razer, the user could overlay that captured video over another image on the screen, like for a webinar presentation or video tutorial.


Could Razer's New 3D Camera Be Good for Online Presentations?

Accenture Launches Advanced Analytics Applications for the Telecommunications Industry

From Accenture:


Accenture Launches Advanced Analytics Applications for the Telecommunications Industry
 
NEW YORK; August 20, 2015 – Accenture (NYSE: ACN) is launching five advanced analytics applications for the telecommunications industry, equipping users with customized analytics insights that can empower them to make smarter, data-driven decisions. Developed through the Accenture Analytics Applications Platform – a scalable platform that develops industry- and function-specific advanced analytics applications that are reusable, configurable and adaptable to meet the needs of each unique company and its individual users – the new analytics applications are designed to help telecommunications companies make more effective pricing, staffing, maintenance and planning decisions.
 

“Countless companies are vying to be the next big digital disruptor in the highly competitive global telecommunications industry,” said Marco Vernocchi, senior managing director, Accenture Communications, Media and Technology – Global Digital Lead. “One way to have a strong foot in this race is by turning data into an asset and using it to make insight-driven decisions. When data is put to work through advanced analytics applications and smarter decisions, a company can unlock new opportunities for themselves and their customers.”
 
Accenture’s new advanced analytics applications for the telecommunications industry include:
  • Network Predictive Fault Management – Helps providers predict network incidents before they occur, allowing for pre-emptive maintenance and improved service assurance. Users receive insights detailing network vulnerabilities and recommendations for proactive maintenance of the network infrastructure.
  • Revenue Forecasting – Forecasts revenues in different areas – such as customer base, activations, cancellations, and traffic – to support revenue-generating business decisions.
  • Bundle Pricing – Supports the development of effective pricing strategies for offering bundles, such as bundling a handset and a connection. Insights on customer preferences enable pricing decisions that can support customer demands, optimize inventory management, achieve business objectives, and increase profitability.
  • Call Volume Forecaster – Improves the planning, staffing and management of contact centers by providing users with insights on forecasted call volumes and the right staffing resources needed to support the center. Through an analytics-driven management process, providers can improve customer service levels and increase customer satisfaction, loyalty and brand perception.
  • IT Governance – Helps providers to optimize and improve IT infrastructure efficiency, even when transitioning to virtualized environments. To support decision-making, users receive insights involving asset mapping, the impact of future application scenarios, and reporting that can validate decisions or inform new actions. 
Accenture currently has a total of 25 advanced analytics applications available for the telecommunications, retail, financial services, and utilities industries. In addition to these ready-made applications developed through the Accenture Analytics Applications Platform, custom applications can also be created to meet a company’s specific needs. For each application, Accenture’s platform can be used to fully configure the advanced analytics applications with a company’s exact operational workflow process and precise user requirements – for example, greater granularity for data scientists and less data granularity for business users. Depending on the amount of customization needed, applications can be ready for use in approximately one week to 60 days.
 
Accenture’s advanced analytics applications can be run on their own or through the Accenture Insights PlatformLaunched last month, the Accenture Insights Platform is a cloud-based, end-to-end analytics-as-a-service solution comprised of an integrated suite of leading technologies, consumption-based commercial arrangements, and enterprise support.  
 
Additional details on the Accenture Analytics Application Platform and existing advanced analytics applications can be found here and videos can be found here.
 
About Accenture
Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com.
 
Accenture Analytics, part of Accenture Digital, delivers insight-driven outcomes at scale to help organizations improve their performance. With deep industry, functional, business process and technical experience, Accenture Analytics develops innovative consulting and outsourcing services for clients to help ensure they receive returns on their analytics investments. For more information follow us @ISpeakAnalytics and visit www.accenture.com/analytics.
                                                                                    
# # #

Wednesday, August 26, 2015

Support Scams, Malware and Mindgames without Frontiers

It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance by claiming to represent them or that the victim needs his help because their product is inadequate or worse.)
Certainly if it was still all about scammers calling victims out of the blue to tell them they have a virus infection and wanting remote access to their PCs so that they can ‘fix it’, I wouldn’t have much to say about it all at this point. But it isn’t. And I’m not just talking about minor variations on the CLSID orEvent Viewer or Task Manager gambits, in which various legitimate utilities are misrepresented as ‘proving’ that your PC has a problem with malware. (Although we still see plenty of reports of such gambits in action: if you aren’t familiar with them, quite a few of them are described in articles and papers like this: My PC has 32,539 errors: how telephone support scams really work. (Is it really three years since we presented that paper? Apparently it is, and much longer since I first started writing about the topic.)


Support Scams, Malware and Mindgames without Frontiers

Dell Services Named a Leader in the 2015 Gartner Magic Quadrant for Data Center Outsourcing | Dell



Dell Services today announced it has been positioned by Gartner, Inc. in the "Leaders" quadrant of the Gartner Magic Quadrant for Data Center Outsourcing and Infrastructure Utility Services, North America report[i] This marks the fifth consecutive year that Dell has been in the Leaders quadrant of this report.


Dell Services Named a Leader in the 2015 Gartner Magic Quadrant for Data Center Outsourcing | Dell

Wix Now Has CRM for Small Business, Too

You might be familiar with Wix, a company known as a maker of drag-and-drop Web design tools for small businesses. But the company has expanded its services to also include CRM (Customer Relationship Management) tools.
Called MyAccount CRM solution, this service offers small business owners tools for collecting and managing contacts, managing email marketing campaigns, and more.


Wix Now Has CRM for Small Business, Too

How to Sync Your Website and Social Media Efforts

Marketing through social media is all the rage. And you know websites are important to business. But should you be tackling both for your business? If so, how do you do it so it makes sense? Read below for some tips on how to make both, or one, work for you.



How to Sync Your Website and Social Media Efforts

Facebook and Twitter suspend suspected shooter's accounts - Aug. 26, 2015

Facebook and Twitter suspended the accounts of the shooter in Wednesday's deaths of two Virginia TV journalists.



A user by the name of Bryce Williams filmed himself shooting reporter Allison Parker and photographer Adam Ward in Moneta, Virginia.



Facebook and Twitter suspend suspected shooter's accounts - Aug. 26, 2015

Dolphin and Mercury Android browsers have major vulnerabilities

Major vulnerabilities have been detected in Dolphin and Mercury Android browsers that could have provided cybercriminals with the opportunity to launch zero-day attacks.
This is considered to be a notable discovery. With both browsers growing in popularity – it is estimated that over 100 million downloads have been made between the two browsers – the fallout of a potential attack could be huge. 


Dolphin and Mercury Android browsers have major vulnerabilities

Top 5 Findings: Sprint Consumer Survey | Sprint Newsroom

Top 5 Findings: Sprint Consumer Survey | Sprint Newsroom

99 Killer Online Marketing Tools to Streamline Your Efforts

To say that digital marketers have to be jacks-of-all-trades is a considerable understatement. Marketers don’t often get the recognition they deserve for having to master so many different software tools, but if there’s one profession that requires knowledge of more tools than a Swiss army knife, online marketing is it.



99 Killer Online Marketing Tools to Streamline Your Efforts

CryptoGirl on StageFright: A Detailed Explanation | Fortinet Blog

CryptoGirl on StageFright: A Detailed Explanation | Fortinet Blog

Tuesday, August 25, 2015

Gym and Fitness Bulks Up Business Operations with NetSuite OneWorld

Australia's Leading Gym Equipment Supplier Manages Head Office, Warehouse and Eight Subsidiaries with a Single Instance of NetSuite OneWorld



Gym and Fitness Bulks Up Business Operations with NetSuite OneWorld

AVT-PR-Avnet and EMC partner to deliver industry-leading solutions in Australia

Sydney, Australia – Avnet, Inc. (NYSE: AVT), a leading global technology distributor, today announced that it has signed a distribution agreement with EMC, the global leader in enabling businesses and service providers to transform their operations and deliver information technology as a service (ITaaS). Avnet was selected as a global distributor to bring EMC’s VSPEX BLUE to market in early 2015. The new agreement will see Avnet deliver the entire EMC portfolio to its network of resellers across Australia.



AVT-PR-Avnet and EMC partner to deliver industry-leading solutions in Australia

An Ashley Madison response plan: does your company have one?

Whatever your views on the AshleyMadison.com website, the data breach it suffered earlier this year has increased the cybersecurity threat level for all organizations. That’s because a large amount of information stolen from the site was published on the Internet last week, all of which can be assumed to be sensitive, given the site’s infamous slogan: “Life is short. Have an affair.” In terms of IT security you should be taking action on several fronts. In this article I suggest four action items every organization should consider, but first I explain why a response plan is needed.



An Ashley Madison response plan: does your company have one?

How do I find out who's on my network? | Fortinet Blog

This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions.
Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon.


How do I find out who's on my network? | Fortinet Blog

13 Small Business Alternatives to WordPress for Websites

Though many believe that WordPress is the best solution to use when building your small business website, it’s not a panacea that fits ever company’s needs.
A sharp learning curve combined with the ongoing burden of constant upgradesand the need for frequent backups often leads to a search for other website building solutions.


13 Small Business Alternatives to WordPress for Websites

Revolutionary Windows 95 turns 20

Hard to believe it but Windows 95 turned 20 this month. Not only was the launch of this operating system a landmark moment for Microsoft, but also, arguably, for the human species. As the theTelegraph reflected, it “redefined home computing and began a golden age for Bill Gates’ company”.
Here are some interesting facts about this seminal piece of software that has been so instrumental in shaping the modern, digital and internet-connected world that has come to characterise the opening decades of the 21st century.


Revolutionary Windows 95 turns 20

KTH Royal Institute of Technology Selects Mellanox End-to-End EDR 100Gb/s InfiniBand Solutions (NASDAQ:MLNX)

Latest Deployment Extends Global Adoption of InfiniBand Technology



KTH Royal Institute of Technology Selects Mellanox End-to-End EDR 100Gb/s InfiniBand Solutions (NASDAQ:MLNX)

Brocade Analytics Monitoring Platform Enables Organizations to Achieve Greater ROI for Mission-Critical Applications (NASDAQ:BRCD)

NEW PRODUCT LINE EXTENDS BROCADE INNOVATION AND LEADERSHIP IN STORAGE NETWORKING



Brocade Analytics Monitoring Platform Enables Organizations to Achieve Greater ROI for Mission-Critical Applications (NASDAQ:BRCD)

FTC can punish organisations with poor cybersecurity

The Federal Trade Commission (FTC) has the power to punish organizations that fail to invest in and deliver robust online security measures, according to ruling by the US Court of Appeals for the Third Circuit. Responding to the ruling, Edith Ramirez, chairwoman of the FTC, said that the decision “reaffirmed” the commission’s view on the matter. She went on to say: “It is not only appropriate, but critical, that the FTC has the ability to take action on behalf of consumers when companies fail to take reasonable steps to secure sensitive consumer information.”



FTC can punish organisations with poor cybersecurity

9 Smart Widgets for a Better Customer Experience

Customer experience is the number one concern when creating your website.
You might not get it down the first time. Revisiting your design and features is a regular part of maintaining that site.


9 Smart Widgets for a Better Customer Experience

Make password into a story and more parental hacks

It might still feel like summer, but school season is right around the corner. Young people are easy targets for both digital and physical theft, so it’s important to ensure your data and devices are secure at school and at home.



Make password into a story and more parental hacks

The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna | Fortinet Blog

Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack.
We start our correlation with the analysis of the exploit payload - a remote administration tool (RAT) with MD5 6bde5462f45a230edc7e7641dd711505 (detected as MSIL/Agent.QOO!tr). This RAT looks new to us; hence we suspected that it may either be a new RAT family or a custom RAT that was developed for a specific attacker (hacker). It is compiled with Microsoft Visual Basic .NET with the following backdoor commands listed in its code:


The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna | Fortinet Blog

Monday, August 24, 2015

LG Promises Large Screen and Long Battery Life with G Pad II 10.1

LG announced on Monday the next G Pad tablet model, the G Pad II 10.1. The company plans to give its newest tablet an official unveiling at IFA 2015 in Berlin next month. But for now LG is giving a peek at some of the G Pad II’s specs and features.
You won’t likely get the highest specs or super clear display out of the G Pad II. But what the tablet is promising is a large screen with long battery life at a decent price.


LG Promises Large Screen and Long Battery Life with G Pad II 10.1

Dell introduces Datacenter Scalable Solutions (DSS) | Dell

Dell today introduced Datacenter Scalable Solutions (DSS), a new line of business within Dell’s Enterprise Solutions organization designed to meet the specific needs of web tech, telecommunications service providers, hosting companies, oil and gas, and research organizations. These businesses often have high-volume technology needs and supply chain requirements in order to deliver business innovation. With a new operating model built on agile, scalable, and repeatable processes, Dell can now uniquely provide this set of customers with the technology they need, purposefully designed to their specifications, and delivered when they want it.



Dell introduces Datacenter Scalable Solutions (DSS) | Dell

Sprint Direct 2 You Launches in Minneapolis/St. Paul, Orlando, Phoenix, St. Louis, San Antonio and Seattle Metro Areas | Sprint Newsroom

Starting today, Direct 2 You customers receive a thank you gift and a chance to win $250,000
Direct 2 You will launch next month in Las Vegas, New Orleans and Charlotte, N.C.



Sprint Direct 2 You Launches in Minneapolis/St. Paul, Orlando, Phoenix, St. Louis, San Antonio and Seattle Metro Areas | Sprint Newsroom

Is the Lowest Priced Internet Really the Best Way to Go?

In business, going for the lowest price is not always the best move. In fact, sometimes it’s counterproductive. When choosing Internet service, as with any product or service, price is important, but it’s far from the only thing to consider.
There are a number of factors to look at when choosing an Internet service for your small business. You need to make sure you can meet the requirements for up-time, speed, bandwidth and more.


Is the Lowest Priced Internet Really the Best Way to Go?

Sprint News - Week in Review: August 17 - 23 | Sprint Newsroom

Sprint News - Week in Review: August 17 - 23 | Sprint Newsroom

How does facial recognition technology work?

In this new age of wearable tech, biometrics and multi-factor authentication, your face is increasingly becoming your digital ID for authenticating who you are online. But how does facial recognition software work and what are the caveats?



How does facial recognition technology work?

Should You Raise Money Through Non-Accredited Investor Equity Crowdfunding?

U.S. startups can now raise money from non-accredited investors through online platforms. But just because this type of fundraising is possible doesn’t mean you should use it.
Non-accredited investor equity crowdfunding makes sense for certain types of startups, but not for others.


Should You Raise Money Through Non-Accredited Investor Equity Crowdfunding?

Ashley Madison members ‘easy target for extortion’

Less than a week after the Impact Team dumped data on the dark web that taken from the infidelity website Ashley Madison, the fallout from this major data breach continues to widen.
One of the key concerns for members – former and current – is the possibility that their unfaithfulness will be made public, impacting on their professional and personal lives.


Ashley Madison members ‘easy target for extortion’

Saturday, August 22, 2015

2020 Vision: Applying Million-Dollar Business Insights To An Uncertain Future

A lot of business magazines celebrate the past exploits of billionaire businessmen, like Mark Zuckerberg and Bill Gates.
The stories of how they acquired and built their businesses becomes the stuff of entrepreneurial legend. Yet, with all of this information, only a little information goes into how these leaders prepare for a complicated future.


2020 Vision: Applying Million-Dollar Business Insights To An Uncertain Future

Density Device: Mobile Employees Find Empty Spots to Work

Counting the number of people in a room seems like a pretty simple task, and not one with a whole lot of practical value.
But that’s not the case for Density. The San Francisco-based company is actually completely based around that concept.


Density Device: Mobile Employees Find Empty Spots to Work

Dell to Announce Fiscal 2016 Q2 Financial Results Sept. 3 | Dell

Dell will release its Fiscal 2016 Q2 financial results to current holders of Dell’s debt securities and prospective qualified institutional debt investors Sept. 3, 2015. The company reports results to this group confidentially on a quarterly basis. 

Dell also will conduct a confidential conference call for debt investors Sept. 3 at 11 a.m. CDT to provide management’s perspective and respond to questions regarding the results.



Dell to Announce Fiscal 2016 Q2 Financial Results Sept. 3 | Dell

The Curious Case Of The Document Exploiting An Unknown Vulnerability – Part 1 | Fortinet Blog

Recently, we came across an unknown document exploit which was mentioned in a blogpost by the researcher @ropchain. As part of our daily routines, we decided to take a look to see if there was something interesting about the document exploit. The sample’s SHA1 used in the analysis is FB434BA4F1EAF9F7F20FE6F49C4375E90FA98069. The file we’re investigating is a Word document called amendment.doc.





The Curious Case Of The Document Exploiting An Unknown Vulnerability – Part 1 | Fortinet Blog

How to nurture your child’s security genius

Is your child an internet security genius? If cybersecurity is their thing and you think it could be their future livelihood, here’s what you can do to harness that potential for a career that is exciting and financially lucrative.



How to nurture your child’s security genius

Ambiguous new Windows 10 update ‘improves functionality’

Since launching Windows 10 across the globe last month, Microsoft has issued two cumulative updates. The most recent, issued on 14th August, offers users little by way of detail as to what impact this will have.
This ambiguity has been questioned by commentators and news providers, with The Register, for example, querying the tech giant’s silence on the matter.


Ambiguous new Windows 10 update ‘improves functionality’

Is Your Website Bounce Rate Related to Content Marketing?

Whenever small businesses see their website bounce rate, it’s always a source of panic.
Maybe you’ve heard that website bounce rate doesn’t matter, or maybe you’ve heard that it matters for some things and not for others, or maybe you’ve been taught to believe that your bounce rate is one of the most important metrics for a website.


Is Your Website Bounce Rate Related to Content Marketing?

Bundestag computer system goes offline

The computer system in the Bundestag in Germany has gone completely offline as of today (20th August), to allow it to carry out essential and important maintenance work.
This comes on the back of a recent cyberattack on the German parliament’s IT system – criminals, still unidentified, were able to breach its defences in May and install a trojan to its network.


Bundestag computer system goes offline

Brocade Announces Third Fiscal Quarter 2015 Results (NASDAQ:BRCD)

Brocade Announces Third Fiscal Quarter 2015 Results (NASDAQ:BRCD)

Friday, August 21, 2015

Web.com experiences data breach

Web.com has revealed that one of its systems was attacked earlier this month, resulting in a major security breach.
The US-based company, which delivers internet services specifically to small businesses, said that up to 93,000 of its 3.3 million customers have been affected.


data breach

Nine out of ten parents worry about kids online − yet few act

The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it does have its bad parts too. And this is making life difficult for parents struggling to keep up with their child’s technology obsession.
In bygone eras, parents’ concerns over their children were relatively simple: they worried if they were healthy, happy and socially adept at school and other challenging environments. As they got older, they considered too the challenges of new relationships, new careers and living quarters.


Nine out of ten parents worry about kids online − yet few act

Fast and Secure: MSSPs Highlighted In Sydney and Melbourne | Fortinet Blog

More than 120 Partners, Distributors and Fortinet Staff came together last week in Sydney and Melbourne at Fortinet’s first ever "Fast and Secure" event in ANZ. With a full-day of speakers, attendees heard about the latest Fortinet offerings that embed security capabilities in every aspect of Managed Services Provision. The message is clear: we have moved on from Managed Security Service Provision (MSSP) because, simply put, security is an integral component of every "As a Service" offering from managed email and firewalls to full-blown cloud-based enterprise computing.



Fast and Secure: MSSPs Highlighted In Sydney and Melbourne | Fortinet Blog

Back to university: cybersecurity now a major concern in higher education

Last month I attended my first Campus Technology conference, in Boston. I think it’s fair to say that while computer security was not the focus, it certainly was prevalent and appreciated by attendees. In fact, CIO ranked the cybersecurity topics and panels as one of the “6 Best Things” at Campus Tech. To demonstrate this further, the closing Keynote was from William Perry on “The How, Why and What of Cyber Security,” which presented just about as comprehensive a high-level view as possible in a 50-minute slot.



Back to university: cybersecurity now a major concern in higher education

Thursday, August 20, 2015

AVT-PR-Avnet’s Mike Buseman to Present at SCOPE Supply Chain Operations Conference

Buseman to discuss the evolution of distribution and logistics within the global supply chain



AVT-PR-Avnet’s Mike Buseman to Present at SCOPE Supply Chain Operations Conference

Impact Team releases stolen Ashley Madison data online

Cybercriminals have reportedly released personal information belonging to Ashley Madison users on the dark web, a month after it was first revealed that its system had been compromised.
Various reputable media outlets, including Wired, the Guardian and the BBC, note that sensitive details of up to 37 million users of the self-confessed “most famous name in infidelity and married dating” are now available online.


Impact Team releases stolen Ashley Madison data online

Tuesday, August 18, 2015

Adobe Gets Its Patch On | Fortinet Blog

Researchers at FortiGuard Labs recently discovered another heap overflow vulnerability in the Adobe Flash Player. The vulnerability, CVE-2015-5129, is similar to a larger group of security issues found in Flash Player, all of which could be exploited to allow remote code execution on the host system.
Although FortiGuard has not observed active exploits for this particular vulnerability in the wild, we did find multiple products that incorporate Flash with the vulnerability. This includes the Google Chrome browser. Additionally, the vulnerability could affect mobile developers on both Android and Apple iOS if Adobe AIR SDK & Compiler18.0.0.180 has been used. Perhaps more importantly, many active exploits have been developed for similar vulnerabilities, making future exploit development more straightforward.


Adobe Gets Its Patch On | Fortinet Blog