5 Unsettling cyberthreats

By William Tsing Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who's trying it. But what about the outliers? What about threats that impact you, but you can't remediate, or establish a policy to cover? Here are 5 cyberthreats that if you're not frightened by, you should be. VNC roulette. … [Read more...]

Update to Parallels Toolbox for Mac just released!

By Kurt Schmucker We have just released an update to Parallels® Toolbox for Mac®, with four additional tools and several new features requested by users. New Tools The four new tools are shown in Figure 1. They are: Download Audio – Similar to the Download Video tool but targeted toward downloading audio from the Internet, including multiple track [...] The post Update to Parallels Toolbox for … [Read more...]

Saving (your) Face

By Debra Littlejohn Shinder Biometrics are the future of authentication technology. That argument is all but over; now the question has moved on to “Which specific biometric technology is best in the business environment?” Source:: GFI TalkTechToMe-All … [Read more...]

Pt 2: Hackers now have your password

By RJ Gazarek So let's pick up where we left off. Explaining to the world that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top 3 reasons you were most likely hacked were: You had a different account that was already compromised You downloaded a malicious program on your computer without knowing it You … [Read more...]

WannaCry 2.0: Detect and Patch EternalRocks Vulnerabilities Now

By Mehul Revankar A new network worm dubbed EternalRocks is making the news this week as the successor to the WannaCry ransomware. EternalRocks leverages some of the same vulnerabilities and exploit tools as WannaCry but is potentially more dangerous because it exploits seven NSA tools that were released as part of the ShadowBrokers dump for infection instead of two used by WannaCry. So … [Read more...]

Druva Completes SOC-2 Type II Audit

By Swapna Jayachandran As the migration of business-critical workloads and corporate data to the cloud has accelerated to a frenzied pace, there are two fundamental operational imperatives that organizations must always have in place: security and trust. It's one thing for organizations to make bold security claims about their products, services, and internal controls; however, it's something … [Read more...]

Thycotic Introduces Privilege Ready Program to Further Protect Against Cyberattacks

By Jordan True WASHINGTON, May 23, 2017 /PRNewswire/ — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, today announced its Privileged Ready Program. This program highlights the breadth of Thycotic's integration capabilities with a number of leading security vendors around the world. “Our customers need the ability to manage all … [Read more...]

Do you really want to make me cry?

By Melanie Hart On Friday, May 12, the Internet was rocked by a zero-day ransomware attack now known as WannaCry. Here are some of the lessons learned and what you can do if your company has been targeted. Source:: GFI TalkTechToMe-All … [Read more...]

Stealing Windows credentials using Google Chrome

By Pieter Arntz Security researcher Bosko Stankovic recently published an article explaining how an attacker could use Chrome, the SMB file sharing protocol, and Windows Explorer Shell Command File to steal victims credentials. The basic elements Chrome Similar attacks have been demonstrated using Internet Explorer and Edge, but being able to do this with a (very popular) third party browser … [Read more...]

Why Expansion for Hyper-V’s Dynamic VHDX Doesn’t Matter

By Eric Siron There's rarely a valid excuse for not using dynamically expanding VHDX. Here's how fixed vs dynamically expanding VHDX compares in reality.Read the post here: Why Expansion for Hyper-V's Dynamic VHDX Doesn't Matter Source:: altaro … [Read more...]