Blog

By Brian Wagner, Posted in Infrastructure, Virtualization

Traditionally, to take advantage of SmartAccess or VPN, along with the new RDP Proxy functionality, Citrix Access Gateway Universal licenses were required. Standard and Enterprise appliances included 5 CAG Universal licenses for testing. Otherwise, ICA Only licensing was included to allow remote access to Citrix but no SmartAccess functionality. The platinum appliances included 100 licenses. If you are a Citrix XA or XD Platinum customer, the CAG Universal licenses were included for as many XA/XD licenses t... read more.

  • October 11, 2016

By Nancy Rand, Posted in Security

October 6, SecurityWeek – (International) Mac malware can abuse legitimate apps to spy on users. A security researcher from Synack discovered that Apple Mac operating system (OS) X malware can monitor an infected system for legitimate user-initiated video sessions on applications such as FaceTime, Skype, and Google Hangouts, and piggyback on those legitimate sessions to record video and spy on users without their knowledge or authorization. Source October 5, Softpedia – (International) New back... read more.

  • October 07, 2016

By Nancy Rand, Posted in Security

October 4, SecurityWeek – (International) EMC patches critical flaws in VMAX storage products. Dell EMC released patches resolving six vulnerabilities in versions 8.0.x – 8.2.x of its VMAX Unisphere Web-based management console and vApp Manager configuration and support tool for VMware deployments after researchers from Digital Defense, Inc. (DDI) discovered a critical vulnerability that can be exploited to add new admin users and compromise the virtual appliance, as well as a flaw that can be e... read more.

  • October 05, 2016

By Nancy Rand, Posted in Security

October 3, SecurityWeek – (International) Over 400 vulnerabilities reported to ICS-CERT in 2015. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released its vulnerability coordination report for the fiscal year 2015, which revealed ICS-CERT published 197 advisories covering a total of 427 vulnerabilities during 2015, while only 245 issues were covered in 2014. The report also revealed that 43 percent of the vulnerabilities were rated as high severity, and the energy sector was... read more.

  • October 05, 2016

By Celeste Collins, Posted in Technology Week in Review

Here are some of the technology stories that caught our eye this week: September 26, 2016 Microsoft released a beta version of SharePoint for Android. SharePoint for Android provides quick access to team sites, organization portals, and resources. To use this application, your company must have an Office 365 subscription that includes SharePoint Online. VMware announced a new solution for customers to assess and implement their Windows 10 migrations. VMware’s SysTrack Desktop Assessment Service for... read more.

  • October 03, 2016

By Nancy Rand, Posted in Security

September 30, SecurityWeek – (International) Tofsee malware distribution switched from exploit kit to spam. Security researchers from Cisco Talos reported that attackers stopped distributing the Tofsee ransomware via the RIG exploit kit (EK), and began leveraging spam email campaigns to deliver the malware downloaders, which instruct victims to download and open the ZIP archive attached to the message that contains an obfuscated JavaScript file with a WScript downloader, which runs an executable from... read more.

  • October 03, 2016

By Nancy Rand, Posted in Security

September 29, SecurityWeek – (International) Syrian Electronic Army member pleads guilty to hacking, extortion. A member of the Syrian Electronic Army (SEA) hacker group pleaded guilty to Federal charges for his role in an extortion scheme where he and another SEA member breached the systems of various organizations in the U.S. and other countries and threatened to damage their computers and data unless a ransom was paid. The FBI is searching for two other suspects involved in the extortion scheme. So... read more.

  • September 30, 2016

By Nancy Rand, Posted in Security

September 28, SecurityWeek – (International) High severity DoS flaw patched in BIND. The Internet Systems Consortium released updates for the Domain Name System (DNS) software BIND addressing two vulnerabilities, including a high severity denial-of-service (DoS) flaw affecting all servers that can receive request packets from any source, which can be exploited using maliciously crafted DNS request packets. The updates also resolved a medium severity DoS flaw that can cause a targeted server to termina... read more.

  • September 29, 2016

By Nancy Rand, Posted in Security

September 27, SecurityWeek – (International) Russian cyberspies use “Komplex” trojan to target OS X systems. Palo Alto Networks discovered an Apple Mac operating system (OS) X trojan, dubbed Komplex establishes contact with its command and control (C&C) server after infecting a device in order to collect system information, and allows an attacker to execute arbitrary commands and download files to the affected machine. The researchers stated Komplex has reportedly been used by a Russia... read more.

  • September 28, 2016

By Nancy Rand, Posted in Security

September 23, SecurityWeek – (International) Locky ransomware fuels surge in .RAR JavaScript attachments. Trend Micro security researchers reported the Locky ransomware was responsible for an increase in certain methods of malware delivery after finding that during the first half of 2016, 58 percent of ransomware threats were delivered via email attachments including JavaScript, VBScript, and Microsoft Office files with macros. The researchers also reported that the malicious emails used to deliver th... read more.

  • September 28, 2016