Because of malware, adware when downloading Google Chrome through Microsoft Edge
An investigation by How To Geek revealed that the fake website is actually marked as a “deceptive site” by Google Chrome, but it is not flagged as such by Microsoft Edge and Bing. The Bing search query was reproduced on some systems, not all, but it was only appearing on Microsoft Edge.
Nutanix Launches a New Channel Charter to Empower their Partners with Next-generation Technologies
Nutanix announced the launch of its new channel charter - Power to the Partner. This tool empowers Nutanix partners with the resources they need to support their customers in adopting the next-generation data center technologies.
Windows’ built-in antivirus tool can run in a secure sandbox
Microsoft is gradually rolling out a Windows Insider preview where Defender Antivirus has the option of running in a sandbox -- the first "complete" solution to do this, the company said. Should the worst happen and malware targets Defender Antivirus, any hostile actions will be limited to the antivirus tool's environment instead of running amok on your PC.
Crypto Price Tracker Poses Malware Threat for Macs: Report
A cryptocurrency ticker application called CoinTicker appears to be installing two backdoors on Apple Macs, cybersecurity firm Malwarebytes warned Monday. The app downloads and installs parts of two different pieces of malware – EvilOSX and EggShell – both of which are backdoor applications that can be used to log keystrokes, steal data or execute certain commands.
Hyperconverged Infrastructures Deliver on Virtualization’s Promise
Pre-integrated and pre-tested appliances that combine the core elements of an IT infrastructure into sophisticated, off-the-shelf platforms are emerging as an increasingly common hyperconverged infrastructure (HCI) installation.
New SamSam ransomware campaign aims at targets across the US
Unlike other ransomware attacks which are often just spammed out to potential victims via phishing emails, SamSam attacks begin with remote desktop protocol (RDP) compromise via either brute force attacks on networks or by using stolen credentials purchased on underground forums.
More Bandwidth, More Features: Cisco Unveils 400G Switching Done Right
The new 400G switches allow customers to create more powerful networks, more cost-effectively and in a fraction of the space. They provide four times the bandwidth and four times the scale of existing switches without using four times the power.
Radisson Hotel Group suffers data breach, customer info leaked
Information including names, physical addresses, countries of residence, email addresses, and some company names, telephone numbers, frequent flyer numbers, and Radisson Rewards member numbers were compromised.
Cisco zero-day exploited in the wild to crash and reload devices
Cisco says CVE-2018-15454 "could allow an unauthenticated, remote attacker to cause an affected device to reload or trigger high CPU, resulting in a denial of service (DoS) condition.
Intel CPUs impacted by new PortSmash side-channel vulnerability
The attack works by running a malicious process next to legitimate ones using SMT's parallel thread running capabilities. The malicious PortSmash process than leaks small amounts of data from the legitimate process, helping an attacker reconstruct the encrypted data processed inside the legitimate process.
Nutanix Extends Beam to the Enterprise Private Cloud
Beam will also now provide a global multi-cloud view so customers can visualize cloud spend patterns from a single dashboard, making it easier to make decisions which save their business money and ensure compliance with regulations.
British Airways data breach is bigger than first thought, admits BA