Blog

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance.

Get Support Now

G2 News

July 03 2013

Fortinet to Announce Second Quarter 2013 Financial Results

Fortinet to Announce Second Quarter 2013 Financial Results …read more Via: Shareholder

July 02 2013

Nine HIPAA Network Considerations

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant changes […] …read more Via: Cisco Security Blog

July 01 2013

Chip Shot: Intel® System Studio Extended to Linux* Embedded App Developers

Intel is expanding its Intel

Industry News

April 28 2016

Research Spotlight: The Resurgence of Qbot

The post was authored by Ben Baker. Qbot, AKA Qakbot, has been around for since at least 2008, but it recently experienced a large surge in development and deployments. Qbot is being Qbot primarily targets sensitive information like banking credentials. Here we are unveiling recent changes to the malware that haven’t been made public yet. […]

April 28 2016

The Evolution of Scoring Security Vulnerabilities

The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vulnerability and identifies the privileges […]

April 27 2016

Microsoft and Funai deepen partnership with cross-licensing agreement

REDMOND, Wash., and OSAKA, Japan — April 27, 2016 — On Wednesday, Microsoft Corp. and Funai Electric Co. Ltd. (“Funai Electric”) announced they are strengthening their successful partnership with the renewal of a patent cross-licensing agreement covering a range of consumer audio-video products. “Microsoft and Funai Electric will continue to … Read more »

April 27 2016

The “Wizzards” of Adware

Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Attempts to detect sandboxes […]

April 27 2016

Vulnerability Spotlight: Further NTPD Vulnerabilities

As a member of the Linux Foundation Core Infrastructure Initiative, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. We previously identified a series of vulnerabilities in the Network Time Protocol daemon; through our continued research we have identified further vulnerabilities in the software. Read More>>