On Email’s Birthday, Here’s a Look at How to Keep it Safe

On the anniversary of the first email transmission, we look at how email has evolved over the years, and how to keep it as an essential tool going forward, despite the growing and increasingly sophisticated dangers of e-mail-based malware and other email-borne threats. What some consider to be the first Continue Reading

ISPConfig 3.1.1 Patch 1 released

What’s new in ISPConfig 3.1.1p1 This release patches an issue in the Nginx vhost master template /usr/local/ispconfig/server/conf/nginx_vhost.conf.master which caused a wrong path for Let’s Encrpyt certificates to be set in the vhost. The issue affects ISPConfig 3.1.1 installations with Nginx only. Systems with Apache are not affected and do not Continue Reading

Webuzo System Application Added : MySQL (5.6.34)

Click install MySQL from the Webuzo Library. MySQL is an open source relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. Review , Rate and View Demo of MySQL here:http://www.webuzo.com/sysapps/databases/MySQL56

Webuzo System Application Updated : MySQL (5.5.53)

Click install MySQL from the Webuzo Library. MySQL is an open source relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. Review , Rate and View Demo of MySQL here:http://www.webuzo.com/sysapps/databases/MySQL

Webuzo System Application Updated : Nginx (1.10.2)

Click install Nginx from the Webuzo Library. Nginx does mot rely on threads to handle requests. Instead it uses a much more scalable event-driven (asynchronous) architecture. This architecture uses small, but more importantly, predictable amounts of memory under load. We have also updated OpenSSL to 1.0.1u and its related libraries. Continue Reading

WordPress 4.7 Beta 1

WordPress 4.7 Beta 1 is now available! This software is still in development, so we don’t recommend you run it on a production site. Consider setting up a test site just to play with the new version. To test WordPress 4.7, try the WordPress Beta Tester plugin (you’ll want “bleeding Continue Reading

Joomla – From No One to the Highest Privilege

Joomla, a popular free and open-source content management system, just released version 3.6.4 that fixed two critical vulnerabilities: [CVE-2016-8870] – Core – Account Creation: attackers can exploit this vulnerability to create any account in a Joomla system regardless of whether its registration has been disabled. [CVE-2016-8869] – Core – Elevated Continue Reading

[20161003] – Core – Account Modifications

Project: Joomla! SubProject: CMS Severity: High Versions: 3.4.4 through 3.6.3 Exploit type: Account Modifications Reported Date: 2016-October-26 Fixed Date: 2016-October-25 CVE Number: CVE-2016-9081 Description Incorrect use of unfiltered data allows for existing user accounts to be modified; to include resetting their username, password, and user group assignments. Affected Installs Joomla! CMS versions 3.4.4 Continue Reading

Driverless Cars: A New Way of Life Brings a New Cybersecurity Challenge

Cars are an essential part of our everyday life, and are crucial for transporting millions of commuters through towns and cities, and even from one country to another, on a daily basis. With “smart” vehicles increasingly playing a major role in our day-to-day lives, it’s no surprise that semi- and Continue Reading

[SingCERT] Enhancing the Security of Internet-Connected Devices

Distributed Denial of Service (DDoS) attacks happen when vulnerable internet-connected devices are compromised by malware and used as bots in a DDoS attack. This advisory provides information on DDoS attacks, and how members of public can protect themselves from inadvertently aiding such an attack. On October 21, 2016, there was Continue Reading

Le Slip Français Explains Its Phenomenal Success

“If you want to change the world, start by changing your briefs”.The slogan says a lot about the identity and reputation of Le Slip Français, known for their made-in-France briefs — but not just that! Le Slip Français was launched through PrestaShop by Guillaume Gibault five years ago, and has Continue Reading

MailEnable Version 9.51 Release

RSS: MailEnable Version 9.51 Release MailEnable version 9.51 for Standard, Professional, Enterprise and Premium Editions is available for download from the MailEnable Web Site. The following change list outlines changes in version 9.51: RECENT CHANGES ADD: Migration Centre now allows importing of Contacts and Appointments via CalDAV and CardDAV ADD: Continue Reading

Produban Chooses Red Hat as Technology Partner to Deliver Modern Cloud Services with Kubernetes and Containers on OpenStack

  • in Blog Posts
  • by
  • October 25, 2016
  • Comments Off on Produban Chooses Red Hat as Technology Partner to Deliver Modern Cloud Services with Kubernetes and Containers on OpenStack

BARCELONA — October 25, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that Produban, the IT services arm of the Spanish banking leader Grupo Santander, has picked Red Hat as its technology partner to create a modern cloud infrastructure with Red Continue Reading

Mirai Botnet ­: Protect Your Infrastructure with FortiDDoS

As further details become available for the massive distributed denial of service attack against Dyn on Oct 21 2016, here are some things FortiDDoS customers can do to protect themselves from a potential Internet of Things (IoT) botnet-based DDoS attack like Mirai. Mirai spreads by compromising vulnerable IoT devices such Continue Reading

Information-stealing Malware Is Spread Via Word Document

Recently we received a SPAM with an attachment, which is a password-protected Word document. Its MD5 is 6619356e9e0c9d2445bf777a8bea5d6a, which is detected as “WM/Agent.60F9!tr” by the Fortinet AntiVirus service. When the document is opened, the attached malicious VB script code is executed and additional malware is created and executed. Based on Continue Reading

The Perfect Server – Ubuntu 16.10 (Yakkety Yak) with Apache, PHP, MySQL, PureFTPD, BIND, Postfix, Dovecot and ISPConfig 3.1

  • in Blog Posts
  • by
  • October 25, 2016
  • Comments Off on The Perfect Server – Ubuntu 16.10 (Yakkety Yak) with Apache, PHP, MySQL, PureFTPD, BIND, Postfix, Dovecot and ISPConfig 3.1

This tutorial shows the installation of an Ubuntu 16.10 (Yakkety Yak) web hosting server with Apache2, Postfix, Dovecot, Bind and PureFTPD to prepare it for the installation of ISPConfig 3.1. The resulting system will provide a Web, Mail, Mailinglist, DNS and FTP Server. https://www.howtoforge.com/tutorial/ubuntu-perfect-server-with-apache-php-myqsl-pureftpd-bind-postfix-doveot-and-ispconfig/

CubeCart 6.1.0 Released

We are excited to announce the release of CubeCart 6.1.0 which comes with a number of great new features.  What’s New? Dashboard notifications for extension updates (see upgrade notes). Font Awesome replaced with SVG in Foundation skin for optimisation with smaller page loads (up to 107KB smaller). SVG support for logo. Redis cache support. Continue Reading

When Half the Internet Goes Down Due to a Cyber-Assault on DNS Infrastructure

On Oct 21, 2016, yet another cyber assault happened on a large DNS provider’s infrastructure, bringing down websites and services on the east coast of the United States. While it is easy to launch these attacks, the solutions available in the market have not kept pace. FortiDDoS is the only hardware Continue Reading

cPanel Security Team: Dirty COW (CVE-2016-5195)

Dirty COW (CVE-2016-5195) Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access Continue Reading

Fortinet Researchers Discover Two Critical Vulnerabilities in Adobe Acrobat and Reader 

  • in Blog Posts
  • by
  • October 25, 2016
  • Comments Off on Fortinet Researchers Discover Two Critical Vulnerabilities in Adobe Acrobat and Reader 

Fortinet researchers recently discovered two critical zero-day vulnerabilities in Adobe Acrobat and Reader. They are identified as CVE-2016-6939 and CVE-2016-6948. Adobe released a patch to fix these vulnerabilities on October 6, 2016. CVE-2016-6939 This vulnerability was discovered by Kai Lu. CVE-2016-6939 is a heap overflow vulnerability. The vulnerability is caused by Continue Reading

Joomla! 3.6.4 – Important Security Announcement – Patch Available Soon

A Joomla! 3.6.4 release containing a security fix will be published on Tuesday 25th October at approximately 14:00 UTC. The Joomla! Security Strike Team (JSST) has been informed of a critical security issue in the Joomla! core. Since this is a very important security fix, please be prepared to update your Joomla! Continue Reading

GitLab 8.13 Released with Multiple Issue Boards and Merge Conflict Editor

We’re traveling around the world and having the pleasure of meeting so many of you. This month we’re proud to present many changes that have been highly requested both in person and on our issue tracker. You’re now able to create multiple issue boards and quickly create issues from them. Continue Reading

EasyApache 19 October 2016 Maintenance Release

SUMMARYcPanel, Inc. has released updated RPMs for EasyApache 4 on October 19, 2016, with PHP versions 5.6.27 and 7.0.12. This release addresses vulnerabilities related to CVE-2016-7568. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.27 and all PHP 7.0 users to upgrade to version 7.0.12. AFFECTED VERSIONSAll Continue Reading

TheMoon – A P2P botnet targeting Home Routers

In the post “Home Routers – New Favorite of Cybercriminals in 2016”, we discussed the active detection of vulnerability CVE-2014-9583 in ASUS routers since June of this year.  In this post we will dissect a bot installed on the affected ASUS routers. The following figure shows attack traffic captured through Continue Reading

ownCloud Security Event at the it-sa 2016

by ownCloud GmbH posted on Thursday, October 20th, 2016 posted in General As in 2015, ownCloud was also present at this year’s it-sa 2016 in Nuremberg, Germany. The it-sa is an annual IT-Security exhibition featuring important organizations from the industry and a highly targeted IT security audience. ownCloud was not Continue Reading

Christmas 2016: PrestaShop is here to help you prepare for the online shopping season!

  • in Blog Posts
  • by
  • October 20, 2016
  • Comments Off on Christmas 2016: PrestaShop is here to help you prepare for the online shopping season!

Do you hear the sound of jingle bells? Yes… the countdown to the 2016 holiday season has started and so have PrestaShop #JingleDays ! From November through January, we’re here to help you during the busiest online shopping season of the year! We know the next few weeks will be very busy for Continue Reading

"JapanLocker": An Excavation to its Indonesian Roots

Fortinet has discovered a new open-source PHP ransom malware that has been targeting web sites using a simple encryption algorithm that is effective enough to really frighten web server owners. What is more interesting, however, is the information we have uncovered regarding the possible roots of the attacks/attackers. Basing only Continue Reading

The Killer App For Cloud: Accelerating the Deployment of NFV Solutions

“The cloud,” a word that used to cause network folks to roll their eyes, is now a reality. Public cloud architectures are quickly becoming the backbone, no pun intended, of the corporate IT infrastructure. There are some compelling reasons for this. The first that comes to most people’s minds is Continue Reading

Webuzo 2.4.9 Launched

Hi, The Webuzo Team has released Webuzo 2.4.9. This version introduces a domain addition fix.The following is a list of all changes : 1) [Feature] You can now view and edit Exim configuration file from the panel itself. 2) [Feature] Mail client details can be now viewed on Email accounts Continue Reading

Red Hat and Ericsson Announce Broad Alliance to Enable Pervasive Adoption of Open Source Solutions

  • in Blog Posts
  • by
  • October 19, 2016
  • Comments Off on Red Hat and Ericsson Announce Broad Alliance to Enable Pervasive Adoption of Open Source Solutions

RALEIGH, N.C. AND STOCKHOLM — October 19, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions and Ericsson (NASDAQ: ERIC) share a common belief in the power of open source to transform the ICT (information and communications technology) market. Today, they announce a broad Continue Reading

Red Hat Expands Mobile Vision to Support Containerized Mobile App Development Based on Modern Application Technologies

  • in Blog Posts
  • by
  • October 15, 2016
  • Comments Off on Red Hat Expands Mobile Vision to Support Containerized Mobile App Development Based on Modern Application Technologies

RALEIGH, N.C. — October 13, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the release of Red Hat Mobile Application Platform as a fully containerized offering designed to run in any public cloud, private cloud or on-premise infrastructure that supports Red Continue Reading

A Brazilian Trojan Using A Jar File, VB Scripts And A DLL For Its Multi-Stage Infection

  • in Blog Posts
  • by
  • October 15, 2016
  • Comments Off on A Brazilian Trojan Using A Jar File, VB Scripts And A DLL For Its Multi-Stage Infection

As part of Fortinet’s continued efforts to protect its customers, we carry out a variety of tests to improve the detection of malicious content, whether it’s file or network related. While checking out some HTTPS phishing websites last month, one URL stood out. It wasn’t a phishing site, but it Continue Reading

Fortinet Fabric-Ready Partner Spotlight: Q&A with Pamela Cyr, Senior Vice President of Business Development at Tufin

  • in Blog Posts
  • by
  • October 15, 2016
  • Comments Off on Fortinet Fabric-Ready Partner Spotlight: Q&A with Pamela Cyr, Senior Vice President of Business Development at Tufin

Fortinet recently sat down with Fabric-Ready Partner Tufin to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Tufin’s approach to integrated security is helping drive business and customer success. Tell us a bit about Tufin’s business and the types of customers Continue Reading

Using AMP? Try our new webpage tester

Accelerated Mobile Pages (AMP) is a great way to make content on your website accessible in an extremely fast way. To help ensure that your AMP implementation is working as expected , Search Console now has an enhanced AMP testing tool. This testing tool is mobile-friendly and uses Google’s live Continue Reading

NSS Labs 2016 NGIPS Group Testing

Fortinet is highly committed to the public testing of its products and solutions because it helps us to continuously improve our products and provide the best technology to our customers. We participate in dozens of tests across a spectrum of labs and approaches.  In the most recent NSS Labs Next-Generation Continue Reading

ISRG Legal Transparency Report, January 2016 – June 2016

The trust of our users is ISRG’s most critical asset. Transparency regarding legal requests is an important part of making sure our users can trust us, and to that end we will be publishing reports twice annually. Reports will be published three months after the period covered in order to Continue Reading

What It Costs to Run Let's Encrypt

Today we’d like to explain what it costs to run Let’s Encrypt. We’re doing this because we strive to be a transparent organization, we want people to have some context for their contributions to the project, and because it’s interesting. Let’s Encrypt will require about $2.9M USD to operate in Continue Reading

Full Support for IPv6

Let’s Encrypt is happy to announce full support for IPv6. As IPv4 address space is exhausted, more and more people are deploying services that are only reachable via IPv6. Adding full support for IPv6 allows us to serve more people and organizations, which is important if we’re going to encrypt Continue Reading

GitLab 8.12 Release Webcast: Cycle Analytics & Global Code Search

In the GitLab Master Plan, we promised to ship the entire development lifecycle before the end of the year. GitLab 8.12 is exciting because it brings us one step closer to realizing our vision to be an integrated set of tools for the software development lifecycle. In this release, we Continue Reading

Security’s Reactive Response to the Cycle of Threats

We’re into the final quarter of the year, and the cyberthreat landscape continues to be interesting. This week in the Fortinet Threat Intelligence Brief we looked at a number of interesting trends around IoT botnets, continued ransomware problems – both through directed attacks and infected websites, and the spoofing of Continue Reading

Network Security Trifecta: 3 Positive Impacts Integrated Security Solutions Can Have on Healthcare Institutions

  • in Blog Posts
  • by
  • October 7, 2016
  • Comments Off on Network Security Trifecta: 3 Positive Impacts Integrated Security Solutions Can Have on Healthcare Institutions

There was a time in the healthcare industry when the pulse oximeter was considered by many to be the most technologically-advanced product on the market. This device was designed to measure the oxygen saturation of blood and was not connected to wireless networks. Times have changed. Fast-forward to today, and Continue Reading

Updated CentOS Vagrant Images Available (v1609.01)

Updated CentOS Vagrant Images Available (v1609.01) Thursday , 6, October 2016 Laurențiu Păncescu announcement Official Vagrant images for CentOS Linux 6 and CentOS Linux 7 for x86_64 are now available for download, featuring updated packages to 30 September 2016, as well as the following user-visible changes: the centos/7 image now uses Continue Reading

Connection Management in Database Jones

How does an application configure its database connection?  I find this to be a pretty interesting question. As the application moves from a developer’s workstation to a test harness, then to staging, and on to production, the database connection properties can change each time.  What’s more, a separation of responsibilities usually Continue Reading

Announcing New Features To Help Hosting Providers Run Their Own Reliable DNS Infrastructure

  • in Blog Posts
  • by
  • October 7, 2016
  • Comments Off on Announcing New Features To Help Hosting Providers Run Their Own Reliable DNS Infrastructure

Over the last six years, we’ve built the tooling, infrastructure and expertise to run a DNS network that handles our scale – we’ve answered a few million DNS queries in the few seconds since you started reading this. DNS is the backbone of the internet. Every email, website visit, and Continue Reading

Zooming-in on Group Replication performance

A previous blog post exposed the main factors affecting Group Replication performance, which was followed by another that showed the scalability of both single-master and multi-master throughput. In this post we return with more “inside information” that may be useful for optimizing the performance of Group Replication deployments. 1. End-to-end Continue Reading

>
WhatsApp chat WhatsApp us