ACCOUNT LOGIN
Back in June 2016, a botnet army comprised of 25,000 CCTV cameras crashed an online jeweler's website. The notion that internet-connected cameras could be hijacked and used for DDoS was frightening, but not necessarily unique. Internet of Things DDoS attacks took place prior to and after the incident. Another point of contention with internet-connected cameras was the ...
Organizations in a variety of industries and sectors have spared no effort to reduce the operational expenses associated with information technology (i.e. cloud migration, work from home and BYOD). One method that has recently achieved a level of prominence is green computing, or green IT. The concept of green IT or the 'Green Computing' movement was conceived with the ...
January was quite the month for IT security news and announcements. For those who may have been a bit preoccupied with U.S. president Donald Trump's inauguration and news of his first few weeks in office, here's the rundown for the month that was: 1. Gmail Restricts .JS Attachments Google announced in January that it will start restricting JavaScript attachme...
Of the many tactics hackers have employed to bypass perimeter defenses, none are as devastating as social engineering schemes. Phishing ploys in particular manipulate millions of people into downloading malicious attachments, clicking on links to malware or inadvertently compromising their own login credentials to business systems. The situation is dire, according to a ...

Sign Up For A 30-Day Trial

BOXAE

Deep Freeze Enterprise

Centralized deployment and management as well as a host of configuration options for the Enterprise.

  • This field is for validation purposes and should be left unchanged.

Ready to find out more about Faronics? Let us know how to reach you.

We're here to help you in any way possible.