WhatsApp’s recent spyware hack took advantage of a security vulnerability and allowed attackers to access private, digital communication. In this episode of TECH(feed), Juliet walks through the hack, who was affected and how you can secure your devices ASAP.
Extreme addresses networked-IoT security
Extreme Networks has taken the wraps off a new security application it says will use machine learning and artificial intelligence to help customers effectively monitor, detect and automatically remediate security issues with networked IoT devices. The application – ExtremeAI security—features machine-learning technology that can understand typical behavior of IoT devices and automatically trigger alerts when […]
How to set up a Microsoft Azure backup process
Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.
4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds
Four vulnerabilities were publicly disclosed related to Intel microprocessors. These vulnerabilities allow unprivileged attackers to bypass restrictions to gain read access to privileged memory. They include these common vulnerabilities and exposures (CVEs): CVE-2018-12126 – a flaw that could lead to information disclosure from the processor store buffer CVE-2018-12127 – an exploit of the microprocessor load […]
New options to enable remote access in the network
A2U: An EUC Discussion with Tech Gurus Dan Dillman and Cliff Miller – Podcast Episode 314
In episode 314, Douglas Brown interviews Dan Dillman, CEO and Cliff Miller, CTP at A2U! Together they discuss the EUC world today, cloud, VDI, SBC, Microsoft MVD, DaaS, Thin Clients and much more. About A2U Based in Cranberry Township, Pa. and founded in 2003 by current CEO Dan Dillman, A2U has positioned itself as a […]
Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Software-defined perimeter brings trusted access to multi-cloud applications, network resources
Many companies today have a hybrid approach to their networking and IT infrastructure. Some elements remain in an on-premise data center, while other portions have gone to the cloud and even to multi-cloud. As a result, the network perimeter is permeable and elastic. This complicates access requirements at a time when it’s more important than […]
VMware firewall takes aim at defending apps in data center, cloud
VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into […]
Citrix Falls Prey to Password-Spraying Attack
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.