Industry 4.0 and Application Virtualization

  • in Blog Posts
  • by
  • September 27, 2017
  • Comments Off on Industry 4.0 and Application Virtualization

What Is Industry 4.0 Industry 4.0 – The first industrial revolution was powered by steam—the second, by electricity and the assembly lines that led to mass production. Automation led the third revolution from the 1960s onward. For instance, General Motors installed robotic arms to assist their assembly lines in 1961.     Today, we are entering the fourth industrial revolution, or as many prefer to call it, Industry 4.0. In this technological paradigm, computers and automation will come together in a new and innovative way. Artificial Intelligence Continue Reading

3CX Partners: Claim your customers now – Get points and margin

  • in Blog Posts
  • by
  • September 27, 2017
  • Comments Off on 3CX Partners: Claim your customers now – Get points and margin

3CX Partners: Claim your customers now – Get points and margin in Blog Posts, Productivity, VoIP by admin September 26, 2017 Comments Off on 3CX Partners: Claim your customers now – Get points and margin Tags: customers, existing, have, Link, made, possible, potential, reseller, with, your With V15, we have Continue Reading

ISPConfig 3.1.7 Released

  • in Blog Posts
  • by
  • September 26, 2017
  • Comments Off on ISPConfig 3.1.7 Released

ISPConfig 3.1.7 Released in Blog Posts, System Admin by admin September 25, 2017 Comments Off on ISPConfig 3.1.7 Released Tags: 317 This, adds, encrypt, ISPConfig, latest, Let’s, path, release, search, What’s What’s new in ISPConfig 3.1.7 This release adds a new search path for the latest Let’s Encrypt certbot program Continue Reading

Evasive Malware Campaign Abuses Free Cloud Service, Targets Korean Speakers

  • in Blog Posts
  • by
  • September 24, 2017
  • Comments Off on Evasive Malware Campaign Abuses Free Cloud Service, Targets Korean Speakers

Earlier this month, FortiGuard Labs researchers published findings about a malware campaign exploiting a PowerPoint vulnerability. Cybercriminals, however, are equal opportunity exploiters, so just recently an interesting targeted malware campaign was found to be using another document vulnerability. Only this time, it’s a Hangul Word Processor (HWP) document leveraging the Continue Reading

For Cybercriminals, IoT Devices are Big Business, Part Two

  • in Blog Posts
  • by
  • September 24, 2017
  • Comments Off on For Cybercriminals, IoT Devices are Big Business, Part Two

In part one of this article, Anthony Giandomenico described how cybercrime has become not only a business, but a big business, designed to generate revenue with predesigned attacks focused on attack vectors that are easy to exploit: IoT devices. Opportunity is also the land of innovation Because cybercriminals are focusing more Continue Reading

Fortinet Partner Insider

  • in Blog Posts
  • by
  • September 23, 2017
  • Comments Off on Fortinet Partner Insider

Network security is a complex subject that requires those in charge to stay on the lookout for the latest industry news and events. Here, you, our channel partners, will find all of the information you need to answer your current and prospective customers’ questions moving into the fall. Channel partners can Continue Reading

Five Cyber Threats Every Security Leader Must Know About

  • in Blog Posts
  • by
  • September 23, 2017
  • Comments Off on Five Cyber Threats Every Security Leader Must Know About

Networks are evolving at an unprecedented rate. Physical and virtual environments, private and public clouds, and a growing array of IoT and endpoint devices are all dramatically expanding the potential attack surface. Protecting highly elastic network environments present cybersecurity leaders with a complex array of security challenges. In part, this Continue Reading

Rewriting IDAPython Script objc2_xrefs_helper.py for Hopper

  • in Blog Posts
  • by
  • September 23, 2017
  • Comments Off on Rewriting IDAPython Script objc2_xrefs_helper.py for Hopper

Security researchers have identified more and more Mac OS malware attacks over the past two years. In June 2017, Rommel Joven and Wayne Chin Yick Low from Fortinet’s Fortiguard Labs found and analyzed a new ransomware targeted at Mac OS.  Most malware for Mac OS was developed in the Objective-C Continue Reading

BlueBorne: Technical Insight

  • in Blog Posts
  • by
  • September 23, 2017
  • Comments Off on BlueBorne: Technical Insight

(BlueBorne background: read our previous post from Aamir Lakhani here) I have watched the BlueBorne demos and read the technical paper – it was tough! I am amazed at how the researchers managed to exploit several vulnerabilities to turn them into a PoC attack. My comments below. BlueBorne does not “spread” (as such) BlueBorne affects devices Continue Reading

A Look Into The New Strain Of BankBot

  • in Blog Posts
  • by
  • September 23, 2017
  • Comments Off on A Look Into The New Strain Of BankBot

BankBot is a family of Trojan malware targeting Android devices that surfaced in the second half of 2016. The main goal of this malware is to steal banking credentials from the victim’s device. It usually impersonates flash player updaters, android system tools, or other legitimate applications. Once installed, it hides Continue Reading