Blog

By Russell D. Vines, Posted in Security

It was a happy new years’ for the cyber gang that made off with 42 million South African Rand (about $6.7 million) during the first three days of the year from Postbank, which is part of the South African Post Office and a government agency. The alleged Nigerian syndicate that carried out the theft had previously attempted to pull off the same crime on other, bigger banks in SA, but were unable to penetrate the systems until they found Postbank: http://bit.ly/xIVygH The exploit took months to plan... read more.

  • February 07, 2012

By Hank Smith, Posted in Virtualization

As many more companies start to adopt Virtual Desktop Infrastructure (VDI) as a solution for various user classifications, the question that typically comes up is “Should we use our existing physical workstation image?" In many cases this isn’t even a question; the customer assumes that the physical image will be used in their VDI environment. This article reviews reasons why it is common to utilize an existing image along with the reasons why not to use a physical image. Why use an existing physical wor... read more.

  • February 06, 2012

By Russell D. Vines, Posted in Security

Symantec researchers have published a whitepaper analyzing last year’s Nitro attacks on the U.S. chemical industry. It’s interesting because it’s a detailed example of how Chinese cyber attacks are often focused on a particular area of intellectual property, as opposed to, say Eastern European attacks on financial institutions designed for immediate economic gain: http://bit.ly/y1BF4p The purpose of this attack is similar to other attacks on the car industry and other manufacturing and research organizat... read more.

  • February 03, 2012

By Russell D. Vines, Posted in Security

The City College of San Francisco knew it had a serious virus infection last November when it noticed missing log data from a server in one of its computer labs. What it didn’t realize at first was that the virus had been cranking through the college’s databases since 1999: http://bit.ly/zYW4xo It appears that the malware had been lifting bank and personal info stolen from students and faculty for years and disseminating the info overseas. The college is re-configuring firewalls and segmenting the networ... read more.

  • February 02, 2012

By Gotham, Posted in Virtualization

For businesses of all sizes, going green is a smart move not only for the environment, but also for your bottom line. Reducing your carbon footprint and conserving energy results in significant savings and a corporate image of responsibility and eco-consciousness—a win-win for both accounting and PR. To realize these benefits, begin with IT. According to Symantec’s 2009 Green Report, 86% of companies surveyed felt that “it is somewhat/significantly important that their IT organization implement Green IT... read more.

  • February 02, 2012