How FortiSIEM Works to Keep Schools Safe

Networks used by educational institutions benefit from being open and promoting a limitless flow of information and ideas. However, much like the student-teacher relationship, the user-network relationship is one that must be built on trust. The extent of personal information and intellectual data that is often housed on these networks Continue Reading

Thoughts from Black Hat on Threat Intelligence and Automation

The biggest trend in security today seems to be information sharing. Everyone agrees that sharing threat intelligence is key to detecting and stopping attacks. The challenge isn’t that there aren’t enough sources for threat intelligence, but that there is simply too much information being generated, and that includes far too Continue Reading

Evolving Towards Intent-Based Security

In this second installment, begun with ”The Evolution of the Firewall,” we will take a look at the direction security is headed. From its humble beginnings, the firewall has evolved through several stages of development. Its latest incarnation, built on the legacy of its first two generations, implements the strategic Continue Reading

NSS Labs NGFW Report: Fortinet Receives 4th Consecutive Recommended Rating

One of the biggest security challenges organizations face is sorting through solutions from literally hundreds of vendors in the IT market to find the one that is going to provide them with the best protection at a cost they can afford. Each of these vendors claims to solve critical security Continue Reading

Outlook Connector 4.5.1 is Now Available – Addresses Issues with Windows 10 Creators Update

  • in Blog Posts
  • by
  • July 29, 2017
  • Comments Off on Outlook Connector 4.5.1 is Now Available – Addresses Issues with Windows 10 Creators Update

The release of Microsoft Windows 10 Creators Update introduced various issues for Outlook users related to certain DLL files. Today, we’ve released Outlook Connector 4.5.1, which fixes these issues. Click here to download Outlook Connector 4.5.1. Remember – there are two components to Outlook Connector – one for the server, Continue Reading

Containing System Services in Red Hat Enterprise Linux – Part 2

In Part 1, we created a working BIND container with local data storage.  We can make changes on the local system that will get picked up in the running container.  In this part, we’ll explore how we can manage the service from the host with systemctl. In Part 1, we installed Continue Reading

Streaming Video to iOS-Based Devices

July 27, 2017 by Jamie Sherry Online video consumption on mobile devices continues to grow. While viewing habits are different on tablets and smartphones, this trend is boosting engagement and loyalty with content across the board. At the same time, Apple dominates in device sales and as an individual app store—despite Android Continue Reading

How 3 Companies Are Improving Employee Productivity with a Virtual LOB Application

LOB Application Employees no longer need to be at their desktop computer in order to access line-of-business (LOB) applications. In fact, employees who increasingly work from remote locations need to be able to use LOB application from anywhere, anytime, and from any device. Enabling employees to use LOB application from Continue Reading

In a State of Emergency: UCM Turns to 3CX to Replace Outdated System

LONDON, UK, 27 JULY 2017 –  3CX, developer of the next-generation software-based Unified Communications system, today announces that Uruguayan company UCM, has completed successful deployment of it’s VoIP PBX solution at its headquarters. A subsidiary of the global Falck Group based in Denmark, UCM specializes in delivering pre-hospital emergency systems and has over 35 Continue Reading

Joomla! 3.7.4 Release

Joomla! 3.7.4 is now available. This is a security release for the 3.x series of Joomla! which includes two security vulnerability fixes and over 50 bug fixes and improvements. We strongly recommend that you update your sites immediately. What’s in 3.7.4? Joomla! 3.7.4 is released to address security issues as Continue Reading

[20170704] – Core – Installer: Lack of Ownership Verification

Project: Joomla! SubProject: CMS Installer Severity: High Versions: 1.0.0 through 3.7.3 Exploit type: Lack of Ownership Verification Reported Date: 2017-Apr-06 Fixed Date: 2017-July-25 CVE Number: CVE-2017-11364 Description The CMS installer application lacked a process to verify the users ownership of a webspace, potentially allowing users to gain control. Please note: Already installed sites are not affected, Continue Reading

[20170705] – Core – XSS Vulnerability

Project: Joomla! SubProject: CMS Severity: Low Versions: 1.5.0 through 3.7.3 Exploit type: XSS Reported Date: 2017-April-26 Fixed Date: 2017-July-25 CVE Number: CVE-2017-11612 Description Inadequate filtering of potentially malicious HTML tags leads to XSS vulnerabilities in various components. Affected Installs Joomla! CMS versions 1.5.0 through 3.7.3 Solution Upgrade to version 3.7.4 Contact The JSST Continue Reading

Group Replication: Prioritise member for the Primary Member Election

In initial Group Replication release,  5.7.17, we included the Single-Primary Mode with automatic membership and fail-over features. The MySQL Server 8.0.2 release has brought further enhancement to Group Replication Single-Primary Mode that will allow users to influence primary member election using integer member weight value. Introduction In the Single-Primary mode, before Continue Reading

cPanel & WHM version 66 to CURRENT

cPanel, Inc. has released cPanel & WHM version 66 to the CURRENT tier. Below are a few of the new features in this version. New Feature: Application Manager The Application Manger is a brand new interface for cPanel. In this first iteration you can add and manage your modern Ruby applications and define environment variables, Continue Reading

The Need for Threat Intelligence

These are challenging times for security leaders. Business pressures require faster processing of more data, and support for more devices than ever before. Critical data that used to be housed in a secured datacenter now moves across an increasingly complex ecosystem of networked environments, including IoT, cloud, mobile devices and Continue Reading

CIO Agenda: Facing Challenges in the Era of Digital Transformation

In the past years the role of IT professionals got shifted towards a more strategic dimension and often comes with the term of „transformation“. Especially CIOs are facing more and more challenges in an environment of digital disruption.  In the next five years, CIOs expect their companies’ digital revenues to Continue Reading

Univention and ownCloud: A Docker (Love) Story

This is a guest blog post by our partner Univention.  Docker has been one of the buzzwords in recent years. Containers in itself are nothing new in the Linux world, and anyone using a shared web space is almost certainly using some container implementation. Docker, however, provides management interfaces and Continue Reading

The Evolution of the Firewall

As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains Continue Reading

ISPConfig 3.1.6 Released

What’s new in ISPConfig 3.1.6 This release adds remote API functions to set values in the global and system configuration and fixes some minor bugs. Download The software can be downloaded here: http://www.ispconfig.org/downloads/ISPConfig-3.1.6.tar.gz Changelog https://git.ispconfig.org/ispconfig/ispconfig3/issues?assignee_id=&author_id=&label_name=&milestone_title=3.1.6&scope=all&sort=id_desc&state=closed Known Issues Please take a look at the bug tracker: https://git.ispconfig.org/ispconfig/ispconfig3/issues BUG Reporting Please report Continue Reading

Group Replication – Extending Group Replication performance_schema tables

In MySQL 8.0.2, users will see the additional columns in the existing Group Replication Performance Schema tables which will provide extended information about Group Replication. Now user can view role and MySQL version of each member of the group, which earlier required a complex set of query. The user can also see additional statistics of Continue Reading

Protecting your data! Fail-safe enhancements to Group Replication.

Group Replication has been around for some time now and the feedback from community is overwhelming. One of the suggestions (BUG#84795) received is related to deploying a mechanism to prevent a server from being updated after stopping group replication. Without this mechanism the server can continue to receive update transactions, Continue Reading

Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions

According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so when data was collected in Continue Reading

EasyApache 18 July 2017 Maintenance Release

SUMMARYcPanel, Inc. has released updated RPMs for EasyApache 4 on July 18, 2017, with Apache version 2.4.27. This release addresses vulnerabilities related to CVE-2017-7679, CVE-2017-7668, CVE-2017-7659, CVE-2017-3169, and CVE-2017-3167. We strongly encourage all Apache 2.4 users to upgrade to version 2.4.27. AFFECTED VERSIONSAll versions of Apache 2.4 through version 2.4.25 Continue Reading

cPanel TSR-2017-0004 Full Disclosure

cPanel TSR-2017-0004 Full Disclosure SEC-263 Summary Stored XSS during WHM cPAddons install. Security Rating cPanel has assigned this vulnerability a CVSSv3 score of 3.9 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N Description It was possible for an attacker to actively inject HTML into the WHM cPAddons screen during a moderated install. Credits This issue was discovered Continue Reading

Replication Features in MySQL 8.0.2

MySQL 8 is shaping up quite nicely. And we are having a blast in the MySQL replication team while this is happening. We are continuously improving all-things-replication by introducing new and interesting features. In addition, we have been listening to our community and addressing their feedback. As such, we would Continue Reading

New validated Windows Server Software Defined solutions from our partners

We are pleased to announce a new set of validated software-defined datacenter solutions are now available from our Windows Server partners, including DataON, Fujitsu, HPE, Lenovo, QCT, and Supermicro. These hyper-converged solutions make it faster and easier to deploy software-defined compute, storage, and networking in your datacenter. In addition to Continue Reading

cPanel TSR-2017-0004 Announcement

cPanel TSR-2017-0004 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv3 scores Continue Reading

Common Workflows for Wowza CDN Live Streaming

July 17, 2017 by James Jackson Whether you’re a producer streaming live events or a developer building SaaS (Software-as-a-Service) applications, there’s an effective way to reach your viewers where they are. Wowza Streaming EngineTM software and the Wowza CDN service deliver a highly integrated workflow—enabling you to scale delivery to Continue Reading

Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel

  • in Blog Posts
  • by
  • July 19, 2017
  • Comments Off on Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel

Many people will recognize the next few words as a gross understatement: The number of cyberthreats and cyberattacks targeting organizations won’t slow down anytime soon. In recent months, we’ve seen increasingly sophisticated attacks targeting specific organizations, compromised IoT devices used in DDoS attacks, and large-scale ransomware outbreaks spreading across the Continue Reading

Red Hat Enterprise Linux Brings Forth Performance and Scalability Features of New Intel Xeon Processor Family

  • in Blog Posts
  • by
  • July 18, 2017
  • Comments Off on Red Hat Enterprise Linux Brings Forth Performance and Scalability Features of New Intel Xeon Processor Family

Last week, Intel launched the new family of Intel® Xeon® scalable processors with new features such as Intel Advanced Vector Extensions 512 (Intel AVX-512), which boost performance of computationally intensive tasks, a new Intel Mesh Architecture for reduced system latency, Intel QuickAssist Technology for hardware acceleration of cryptography and data Continue Reading

Parallels RAS combines with HPE Hyper Converged 380

Parallels RAS combines with HPE Hyper Converged 380 to create a margin-friendly, turnkey virtualization solution HPE Hyper Converged 380 – Cloud computing has created a dramatic shift in the IT industry, changing the way organizations approach their computer networks. Hyperconvergence is a cloud-ready, consumption-based infrastructure innovation in enterprise IT that Continue Reading

How hosting companies can respond to customers expectations

This insight was brought to you by Perfect Dashboard, makers of the Perfect Dashboard Plesk extension. The high quality of server infrastructure became a commodity. The price race to the bottom is already at the finish line. That is why it is not surprising that many hosting companies look for Continue Reading

I.T. Provider Duka PC Upgrades their Communications with 3CX

LONDON, UK, 17 JULY 2017 –  3CX, developer of the next-generation software-based Unified Communications system, today announces that the Denmark Headquarters of I.T. solutions provider Duka PC has successfully deployed its VoIP PBX platform. Since 2009, Duka PC has been tailoring I.T. solutions to make them more accessible, customized and easier to use. The Continue Reading

Python 3.6.2 is now available

Python 3.6.2 is now available.   Python 3.6.2 is the second maintenance release of Python 3.6, which was initially released in 2016-12 to great interest.   With the release of 3.6.2, we are now providing the second set of bugfixes and documentation updates to 3.6.  Detailed information about the changes Continue Reading

Parallels RAS with HPE Hyper Converged 250

Parallels RAS with HPE Hyper Converged 250 Eliminates Virtualization Complexity HPE Hyper Converged 250 – The IT industry is undergoing tremendous change, with cloud technology innovations shifting the way the industry operates. One innovation that is increasingly popular in IT circles is hyperconvergence: a software-based approach to enterprise IT that Continue Reading

EasyApache 12 July 2017 Maintenance Release

SUMMARYcPanel, Inc. has released updated RPMs for EasyApache 4 on July 12, 2017, with PHP versions 5.6.31, 7.0.21, and 7.1.7. This release addresses vulnerabilities related to CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229, and CVE-2017-7890. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.31, all PHP 7.0 users to Continue Reading

Incomplete Patch: More Joomla! Core XSS Vulnerabilities Are Found

Joomla! is one of the world’s most popular content management systems (CMS). It enables users to build Web sites and powerful online applications. More than 3 percent of Web sites are running Joomla!, and it accounts for more than 9 percent of CMS market share. As of July 2017, Joomla! Continue Reading

Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews

Last year, Gartner launched a new website and service called Peer Insights. Its goal is to provide organizations looking at adopting new technologies or solutions with access to the collective knowledge and experience of IT professionals that have already evaluated and adopted similar technology. Their posted reviews offer detailed perspectives Continue Reading

Information Governance for Healthcare Institutions

Information governance is nothing new, but for it to be effective, it requires understanding, flexibility, and collaboration between a variety of teams and departments. Fortinet’s Susan Biddle offers her insights into the role of information governance in organizational security and how healthcare organizations can adapt. Can solid information governance boost Continue Reading

Securing the Digital World, Part I

Today’s digital economy is driving a technology revolution. Networks now include on-demand infrastructure, cloud-based services, software defined perimeters, and the growth of smart devices and IoT. Networks and infrastructures are also increasingly hyperconnected. What’s been missing is a security strategy to protect these new environments. The Internet was first begun Continue Reading

BPM Meets Mobile: Low-code Development

As the wave of digital transformation disrupts businesses, each day the landscape of almost every industry is looking increasingly different than the one we were all familiar with. Companies are continuously looking at ways to improve their operations and logistics to give them a jump on their competitors. Change is Continue Reading

WooCommerce 3.1.1 fix release notes

WooCommerce 3.1.1 fix release notes — July 11, 2017 WooCommerce 3.1.1 fix release notes July 11, 2017/Mike Jolley The WooCommerce 3.1.1 fix release is now available. You can download it from WordPress.org or as an automatic update in your administration panel. ~50 commits made it into this fix release. The full changelog is Continue Reading

Parallels RAS WorldWide Team Celebrates Parallels RAS v16 Launch 

After months of hard work, the Parallels team is proud to announce the launch of Parallels Remote Application Server (RAS) version 16! Led by the Moscow team, celebrations for the Parallels RAS v 16 launch started in EMEA at the offices in Malta, Tallin, Moscow, Singapore, Munich and more. Now, Continue Reading

How to install PHP 7.x as PHP-FPM & FastCGI for ISPConfig 3.1 with apt on Debian 8 and 9

  • in Blog Posts
  • by
  • July 13, 2017
  • Comments Off on How to install PHP 7.x as PHP-FPM & FastCGI for ISPConfig 3.1 with apt on Debian 8 and 9

This tutorial shows how to install PHP 7.x as a PHP-FPM and a FastCGI version on a Debian Jessie or Stretch server from the Debian PHP Package maintainers site directly. Read more: How to install PHP 7.x as PHP-FPM & FastCGI for ISPConfig 3.1 with apt on Debian 8 and Continue Reading

FortiGate Moves to the Leader’s Quadrant

Fortinet’s FortiGate solution has just shifted into the leader’s quadrant in the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls report. This report acknowledges the ‘completeness’ of our Security Fabric vision, along with our ability to execute, as factors for our advanced placement. We believe the Magic Quadrant results provide Continue Reading

ownCloud Marketplace Now Contains Full Enterprise Trial Version

ownCloud is bringing its full set of Enterprise functionalities to the ownCloud Marketplace. This is another big step towards making ownCloud more modular and flexible. In the future you will be able to choose from a variety of apps directly from the ownCloud Marketplace – that means its now easier Continue Reading

Outsmarting the Next Ransomware with Advanced Threat Protections

Ransomware has recently reasserted itself into the public eye in a big way. The May cyberattack carried out by the malware WannaCry was one of the worst ransomware attacks ever, affecting over 300,000 computers operating MS Windows around the world. Unfortunately, the attack has once again demonstrated that far too Continue Reading

What’s NEW in Parallels RAS v16

Parallels RAS v16 – Version 16 of Parallels® Remote Application Server (RAS) continues to offer the best value among application and desktop delivery solutions, with several improvements that affect the performance and ease of use of the software. These across-the-board improvements especially affect virtual desktop infrastructure (VDI) deployment, offering application Continue Reading

Considering the Cloud? Five Questions to Ask

The cloud is an increasingly attractive prospect for federal agencies, but many still have unanswered questions about how public cloud security stacks up. With the president’s recent cybersecurity executive order emphasizing the shift to the cloud, agencies will have to move quickly to comply. Below are five questions that federal Continue Reading

Petya’s Master Boot Record Infection

Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:WindowsPetya). If it exists, it terminates by Continue Reading

Key Differences Between Petya and NotPetya

There have already been a lot of write-ups for the NotPetya malware. This article is just a supplement for what is already out there. Our focus is to highlight some key differences between a previous strain of the Petya ransomware and the malware that scared everyone a few weeks ago, Continue Reading

Python 3.6.2rc2 is now available for testing

Python 3.6.2rc2 is now available.   Python 3.6.2rc2 is the second release candidate for the next maintenance release of Python 3.6.  See the change log for Python 3.6.2rc2 for the changes included in this release and see the What’s New In Python 3.6 document for more information about features included in the 3.6 series. Continue Reading

Bulletin Messenger Facebook Integration

From this week Bulletin customers will be able to access Facebook as a channel for customers, contacts and staff in their Messenger communications. Bruce Herbert, Managing Director at Bulletin.net, commented:  “In the same month as Facebook announced reaching 2 billion customers Bulletin announced its Messenger platform integration into Facebook.  We Continue Reading

WannaCry and Petya: The Circus Comes to Town

By now, you will have all heard about the rampant spread of ransomware through countless press pieces, blog articles, and far too often, the outrageous claims of some security vendors.  But let’s stop and think for a minute or two. How did these attacks happen? Are companies focusing on valid Continue Reading

Flexible Container Images with OpenShift

This post will describe proposed behaviors of a class of container I’ll call “flexible containers.” I’ll describe a few aspects of the container image, but also the behavior of the running container. The flexible container concept focuses on building container images in such a way that customization and configuration of Continue Reading

MiniShift as a Development Environment for Node.js on OpenShift

On a recent client project, our team was tasked with setting-up local development environments for a new Node.js-based microservices system that would eventually be deployed on Red Hat’s OpenShift platform. We’ve found a good approach using the MiniShift project and we’ve put together a demo with some accompanying documentation about Continue Reading

Wildcard Certificates Coming January 2018

Let’s Encrypt will begin issuing wildcard certificates in January of 2018. Wildcard certificates are a commonly requested feature and we understand that there are some use cases where they make HTTPS deployment easier. Our hope is that offering wildcards will help to accelerate the Web’s progress towards 100% HTTPS. Let’s Continue Reading

Amman-based United Insurance Boosts Business Growth with 3CX PBX

LONDON, UK 07 JULY 2017 –  3CX, developer of the next-generation software-based Unified Communications system, is pleased to announce that Amman-based United Insurance company has successfully completed deployment of its IP PBX solution. Established in 1972, United Insurance has gone on to become one of the leading insurance companies in Jordan and specializes Continue Reading

ownCloud Combats WannaCry, Petya & Co: Announcement of More Ransomware Protection

After the current waves of attack of ransomware WannaCry in May and its successor Petya a few days ago, agitation prevails in many IT departments: How can you protect your company against these attacks, which have the potential to destroy all files? The economic damage is now already in the Continue Reading

Outlook Problems Caused By Creators Update for Microsoft Windows 10

The Creators Update for Microsoft Windows 10 has introduced various technical issues. One of the issues is that it may cause Outlook to become unstable when Outlook Connector is used. The issues with Outlook are not isolated to Alt-N products. Our technical team is working to find a solution to Continue Reading

Fortinet in ETSI Security Week

Fortinet participated as a sponsor and panellist at the NFV (Network Function Virtualization) tracks at ETSI Security Week, held on June 14th at ETSI’s headquarters in Sophia Antipolis, in the South of France. Fortinet is a participant in the ETSI NFV ISG group, focusing on NFV security, and earlier this Continue Reading

Report: Low Latency Streaming Media Impacts UX

July 5, 2017 by Holly Regan Today’s consumer has a shorter average attention span than a goldfish. When you also consider the increasing oversaturation of the app market, that means streaming media content providers have to work harder than ever to win customers. In this competitive landscape, one factor most Continue Reading

With today’s massive ransomware outbreak, here are a few reminders of how to avoid becoming a victim.

  • in Blog Posts
  • by
  • July 5, 2017
  • Comments Off on With today’s massive ransomware outbreak, here are a few reminders of how to avoid becoming a victim.

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year’s Petya Continue Reading

Easy Migration from Microsoft Exchange or any ActiveSync Supported Email Server

For many small-to-medium businesses, hosting an in-house Microsoft Exchange Server requires dedicated staff and deep pockets. In the mid-90’s, MDaemon was created as an affordable alternative to Exchange that wouldn’t break your IT budget &  required no dedicated staff to administer it. With every installation of MDaemon comes the free Continue Reading

Is spam being sent out from a local machine on your network? Follow these steps to track down a spambot.

  • in Blog Posts
  • by
  • July 5, 2017
  • Comments Off on Is spam being sent out from a local machine on your network? Follow these steps to track down a spambot.

Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the Continue Reading

If you’re not archiving your email, you should be!

When disaster strikes, is your business able to recover from data loss with minimal downtime? How does your business handle legal requests for discovery and compliance audits? Are you protected against data loss when employees leave the company? Businesses of all sizes worldwide rely on email for their day-to-day communication Continue Reading

New MDaemon Collaboration Feature: Send & Receive DropBox Files with WorldClient

In MDaemon 17, we added support for DropBox integration for WorldClient, MDaemon’s web-based email client. Now, users can easily save attachments in inbound messages to their DropBox account, or insert links to their DropBox files in outbound attachments. Because files are stored in DropBox and not on the mail server, Continue Reading

Announcing Sync 2.5

We are excited to announce the release of Sync 2.5. Our team has been cooking up some awesome new features that we know you’ll love. Sync is the leading peer-to-peer file sharing tool empowering start-ups, organizations, and individuals with high speed secure file transfers. Sync continues to outperform traditional cloud-based Continue Reading

What is Bidirectional File Sync?

Bidirectional File Syncing: The Basics How Does Bidirectional File Syncing Work? When you store files on the cloud, you make them easily accessible no matter where you are or what device you are using. This can make it easier to handle group projects, allow for seamless data access during travel, Continue Reading

Overview of Enterprise File Sync and Share Solutions

The Basics of Enterprise File Syncing and Sharing Enterprise File Syncing and Sharing: Getting Started When you own a business, you need the proper solutions for seamless data sharing and communication. Not only do your files need to be accessible by appropriate parties, they need to be kept up-to-date at Continue Reading

Data Security Best Practices

With the big data explosion still a thing of the present, the heightened risk of a data breach is top of mind for all individuals. While in a perfect world, there wouldn’t be hackers and cyber criminals looking to wreak havoc for personal gain or just plain enjoyment from being Continue Reading

Byline: Petya, Wannacry, and Mirai – Is This the New Normal?

This past year, cybercriminals have upped the stakes once again with the high profile, global attacks of Mirai, Wannacry, and Petya, launched one after the other. Of course, large-scale attacks aren’t new. Attacks like the ILOVEYOU worm and Code Red and Nimda were massive attacks, some of which affected exponentially Continue Reading

[20170701] – Core – Information Disclosure

Project: Joomla! SubProject: CMS Severity: High Versions: 1.7.3 – 3.7.2 Exploit type: Information Disclosure Reported Date: 2016-Feb-05 Fixed Date: 2017-July-04 CVE Number: CVE-2017-9933 Description Improper cache invalidation leads to disclosure of form contents. Affected Installs Joomla! CMS versions 1.7.3-3.7.2 Solution Upgrade to version 3.7.3 Contact The JSST at the Joomla! Security Centre. Reported Continue Reading

[20170702] – Core – XSS Vulnerability

Project: Joomla! SubProject: CMS Severity: High Versions: 1.7.3 – 3.7.2 Exploit type: XSS Reported Date: 2017-June-04 Fixed Date: 2017-July-04 CVE Number: CVE-2017-9934 Description Missing CSRF token checks and improper input validation lead to an XSS vulnerability. Affected Installs Joomla! CMS versions 1.7.3-3.7.2 Solution Upgrade to version 3.7.3 Contact The JSST at the Joomla! Continue Reading

[20170703] – Core – XSS Vulnerability

Project: Joomla! SubProject: CMS Severity: Low Versions: 1.5.0 through 3.6.5 Exploit type: XSS Reported Date: 2017-June-22 Fixed Date: 2017-July-04 CVE Number: CVE-2017-7985 Description Inadequate filtering of multibyte characters leads to XSS vulnerabilities in various components. Affected Installs Joomla! CMS versions 1.5.0 through 3.6.5 Solution Upgrade to version 3.7.3 Contact The JSST at the Continue Reading

Joomla! 3.7.3 Release

Joomla! 3.7.3 is now available. This is a security release for the 3.x series of Joomla! which includes security vulnerabilities and over 230 bug fixes and improvements. We strongly recommend that you update your sites immediately. What’s in 3.7.3? Joomla! 3.7.3 is released to address security issues as well as Continue Reading

AbanteCart has a new version 1.2.10

New AbanteCart v1.2.10 is now ready. With new version 1.2.10 we bring CSRF enforced security, NGINX web server support, Storefront CSS and template improvements and many other updates requested by users. Below are the release notes for version 1.2.10: Core: Update to Bootstrap v3.3.7 Upgrade to Fontawesome 4.7.0 Added support Continue Reading

AbanteCart has a new version 1.2.9

New AbanteCart v1.2.9 is now ready for use. In this new version 1.2.9 we focused on overall core platform improvements based on users’ feedbacks, security updates, small new features and bug fixes. Below are the release notes for version 1.2.9: Core: improvement of ACart library. Added inventory quantity to products Continue Reading

New AbanteCart v1.2.8 had been released

New AbanteCart v1.2.8 is now available for download.We continued to put more efforts to improve AbanteCart user’s and customer’s experience and make AbanteCart stand out in the performance compare to other ecommerce platforms.As of version 1.2.8, AbanteCart is partnering up with NeoWize to provide Analytics and Insights to stores on Continue Reading

New AbanteCart v1.2.7 is now faster than ever

New AbanteCart v1.2.7 is now available for download.We have put substantial efforts to improve performance of AbanteCart and make it stand out in the performance compare to other ecommerce platforms. AbanteCart 1.2.7 core code, database queries and cache are well optimized to deliver maximum performance. In addition we introduce HTML Continue Reading

AbanteCart has a new version 1.2.6

New AbanteCart v1.2.6 is finally out. In this new version 1.2.6 we introduce administrators’ and customers’ notifications with SMS integration to Textmarketer and Twilio along with better resource library management, better text and HTML editor and more improvements. New Features and improvements highlight: IM (SMS) Notifications for administrators and customers Continue Reading

AbanteCart has a new version 1.2.5

New AbanteCart v1.2.5 is now ready for use. In this new version 1.2.5 we focused on improving core platform stability and performance along with adding some new features. We have added features for shoppers to have better experience; new easy to use reCapture v2 from Google and now there is Continue Reading

Ecommerce and traditional marketing: a combined approach for your business

Ecommerce and traditional marketing: a combined approach for your business The use of the internet and the impact that this has had on consumer habits has grown rapidly over the past decade. It has also had an effect on the marketing approaches of businesses to feature a more ecommerce style. Even Continue Reading

AbanteCart 1.2.4 is now released

New version 1.2.4 of AbanteCart is now ready for use. In this new version 1.2.4 we focused on overall improvements for admin usability, such as template management, settings wizard, global search and quick commands. Additionally, AbanteCart 1.2.4 now include system condition check functionality, this is to improve stability of site Continue Reading

Questions to Ask When Navigating the E-Rate Program

As reliance on technology continues to grow, and students inevitably require greater access to web assets, schools have been keeping up by incorporating programs that allow for more devices and a more web-focused curriculum. While it’s important to provide these services, between paying for internet access and securing the network, Continue Reading

Recommended update for dirmngr 1082

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for xorg-x11-server 13186

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for xen 1087

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for unrar 1085

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Recommended update for OpenIPMI 1083

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for libxml2 1086

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for bind 13185

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

Security update for bind 1078

SUSE Linux Enterprise Server Increase availability, efficiency, & innovation Virtual Machine Driver Pack Paravirtualized disk, network, & balloon drivers SUSE Linux Enterprise Desktop Office tools that work with Windows, Mac & UNIX SUSE Linux Enterprise Workstation Extension Use your enterprise server as a workstation SUSE Embedded For stable and secure Continue Reading

>
WhatsApp chat WhatsApp us