Bitdefender Received Best New Technology Award at Citrix Synergy 2017
Bitdefender Hypervisor Introspection Awarded Best New Technology at Citrix Synergy… Bitdefender Hypervisor Introspection has been awarded Best New Technology at Orlando’s Citrix Synergy 2017, a prize...
View ArticleWhy HYBRID Cloud is often the best solution
Why Hybrid Cloud is often the best solution…. Cloud technologies are not an all-or-nothing decision nor a one size fits all. We can assist you in formulated the best plan for your business. Options:...
View ArticleWhat is an Intel® Core™ vPro™ Processor?
Today’s rapidly changing business climate is creating an unprecedented opportunity for organizations to transform how they work. From safeguarding data and securing your identity to improving...
View ArticleSomething’s phishy: How to detect phishing attempts
Posted: June 26, 2017 by Wendy Zamora Last updated: June 23, 2017 Dear you, It appears you need to update your information. Click here to tell us all your secrets. No really, it’s totally safe....
View ArticleFortinet Activity Summary – Week Ending June 16, 2017
This week FortiGuard Labs discovered cybercriminals advertising Ransomware-as-a-Service (RaaS) on a TOR page targeted at MacOS. This is the first case of RaaS for Mac. Malware is usually created...
View ArticleWhen is the right time?
In today’s business environment, even small businesses can benefit from an in-house or cloud based server. Servers can be implemented with your budget in mind whether you are a shop of 4 employees...
View ArticleWhat is IP Surveillance all about?
Many business want to ensure that they can monitor suspicious activities as well as be protected from break-ins. In the case of a break-in, the police will require a high-resolution video of the...
View ArticleAre you prepared?
Simple mistakes can lead to a costly business disaster. How unlikely is it that an IT disaster will happen to your company? With a combination of natural disasters, hardware failures and human...
View ArticleMicrosoft Groups in Office 365
With over 85-million monthly Office 365 users, there’s no such thing as a typical customer. That’s why we built Office to embrace the diverse needs of the modern workplace by giving teams their choice...
View ArticleReport: Second quarter dominated by ransomware outbreaks
Malwarebytes news The second quarter of 2017 brought ransomware to unprecedented levels with worldwide outbreaks that went almost out of control. Read More The post Report: Second quarter dominated by...
View ArticleMicrosoft Changing How Outlook Connects To Office 365
Microsoft recently announced an upcoming change to their Office 365 (Exchange Online) service that could result in some Outlook users not being able to connect to their mailboxes. We want to make sure...
View ArticleActivity Summary – Week Ending October 27, 2017
This week the ransomware called “Bad-Rabbit” was spotted for the first time, initially attacking users in Russia and Ukraine, but has been spotted spreading from there. It had a much more contained...
View ArticleActivity Summary – Week Ending December 15, 2017
Cybercriminals are always looking for the easy route to exploit their targets. And why try too hard anyway when poor security hygiene and weak password management make it nearly effortless for them to...
View ArticleActivity Summary – Week Ending July 27, 2018
Experts have been warning consumers for years about vulnerabilities in home automation solutions, and Hide ‘N Seek (HNS) might be the first in-the-wild malware to actively target these...
View ArticleActivity Summary – Week Ending August 3, 2018
Once again, Fortinet’s membership in the Cyber Threat Alliance (CTA) continues to pay dividends. Sophos, also a CTA member, published their comprehensive research into the SamSam ransomware this week....
View ArticleActivity Summary – Week Ending August 10, 2018
Fortinet has a culture of innovation. It isn’t more evident than at the BlackHat conference held this week in Las Vegas, where FortiGuard Labs researcher Kai Lu presented his application behavior...
View ArticleUpdate on Buffer Overflow Vulnerability
Hikvision has become aware of a vulnerability involving its video surveillance products that could potentially present a cybersecurity risk. In the interest of protecting our customers from any...
View ArticleActivity Summary – Week Ending August 24, 2018
For years there have been tools developed for malware research with a primary focus on the Windows platform, whereas tools for alternative operating systems, such as Linux and macOS, were few and far...
View ArticleActivity Summary – Week Ending August 31, 2018
FortiGuard Labs researchers have been monitoring an invasion of GandCrab malware updates of late. You can read our full blog to get all the chronology details. Below is a synopsis of what we...
View ArticleActivity Summary – Week Ending September 7, 2018
A new banking Trojan has been identified targeting major Brazilian banking customers, as well as public sector organizations. This malware, code-named CamuBot, uses interesting new tactics with social...
View Article
More Pages to Explore .....