This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 27, 2019

Monday 9/23

Now Available – EC2 Instances (G4) with NVIDIA T4 Tensor Core GPUs

The instances are equipped with up to four NVIDIA T4 Tensor Core GPUs, each with 320 Turing Tensor cores, 2,560 CUDA cores, and 16 GB of memory. The T4 GPUs are ideal for machine learning inferencing, computer vision, video processing, and real-time speech & natural language processing.

https://amzn.to/2l12uCP

Pure Storage Named as a Leader in New Gartner Magic Quadrant for Primary Storage

Pure Storage is delivering a modern data experience that is simple, seamless and sustainable. Simple, delivering API-defined storage services, common management tools and actionable analytics.

http://bit.ly/2l1A5MY

HP Acquires Endpoint Security Firm Bromium

HP Inc. says it will bolster its endpoint security capabilities with the acquisition of Bromium, following a more than two-year partnership between the companies. Bromium's technology forms the basis for HP's Sure Click malware protection, which is a staple of HP commercial PCs.

http://bit.ly/2l1hvV6

Tuesday 9/24

Check Point SandBlast Endpoint Protection Recognized as a Leader by Independent Research Firm

Forrester’s assessment evaluated 15 endpoint security providers and their products, including Check Point’s SandBlast Agent Advanced Endpoint Protection. Vendors were evaluated over 25 weighted criteria, and Check Point received the highest possible scores in the malware prevention, exploit prevention, secure configuration management, data security, mobile and zero-trust framework alignment criteria.

http://bit.ly/2kRUp3m

More Hidden App Malware Found on Google Play with over 2.1 Million Downloads

A total of 25 Android Package Kits (APKs), mostly masquerading as a photo utility app and a fashion app, were published under 22 different developer accounts. These 25 malicious hidden apps share a similar code structure and app content, leading us to believe that the developers may be part of the same organizational group or, at the very least, are using the same source code base.

https://symc.ly/2kT6o0C

Wednesday 9/25

Skidmap malware buries into the kernel to hide illicit cryptocurrency mining

The Linux malware, dubbed Skidmap, is loaded with kernel-mode rootkits designed to obfuscate its presence on an infected system as well as provide attackers with limitless access to the machine's resources for the purpose of cryptocurrency mining.

https://zd.net/2mGND12

The 5 Pitfalls of Legacy Database Environments

Riddled with silos and complexity in every corner, legacy IT is neither efficient nor scalable enough to continue running these databases. Beyond the poor performance and inefficiency of running relational databases on legacy infrastructure, your IT team is likely struggling with one, two, or all of the following pitfalls.

http://bit.ly/2mzCzm9

Thursday 9/26

Symantec Endpoint Protection Mobile Earns FirstNet Listed Designation

Symantec Endpoint Protection (SEP) Mobile is now FirstNet Listed, making industry-leading mobile threat defense accessible to federal, state and local public safety professionals nationwide through the FirstNet App Catalog.

https://bwnews.pr/2mVLdvp

Microsoft sends another warning: Update Windows now to fix critical security issues

The Internet Explorer flaw, which affects versions 9, 10 and 11, could enable attackers to gain the same user rights as the current user and infect a computer. The Windows Defender bug makes it possible for a remote attacker to take over a target system and prevent legitimate users from using the software.

https://cnn.it/2mZ4Q5G

Friday 9/27

DoorDash data breach affects 4.9 million users

DoorDash said Thursday that the personal data of 4.9 million customers, workers and merchants was compromised earlier this year through an unnamed third-party service provider.

https://wapo.st/2ncm8wn

Simplify your control and visibility plane with Citrix ADM service

Citrix ADM service is a centralized network management, analytics, and orchestration solution for your Citrix ADC infrastructure. From a single platform, administrators can view, automate, and manage network services for scale-out application architectures.

http://bit.ly/2lF65qD

Microsoft: New Nodersok malware has infected thousands of PCs

The malware itself has multiple components, each with its own role. There's a PowerShell module that tries to disable Windows Defender and Windows Update, and there's a component for elevating the malware's permissions to SYSTEM level.

https://zd.net/2mhRhOM