Blog

After Wannacry, Petya. And a key innovation.

After the Wannacry ransomware attack last month, a new ransomware attack is underway that goes by the name Petya (or NotPetya, depending on vendor). Key enablers for the success of this attack across hundreds of organizations worldwide: once executed on...

Wannacry? No need to, it’s not that bad

What is really new about the massive Wannacry ransomware attack? And how does it compare to previous attacks? On closer inspection, the media frenzy seems overrated. True, this is the first time after 2008 and the Conficker worm that we...

WannaCry / Wcry ransomware and Trend Micro

Large-scale ransomware campaign was launched late last week, sweeping computers across the world with identical or mostly similar malware variants. The difference from most attacks carried out in recent years is this ransomware’s ability to proactively spread via the SMB...

Skype for Business virtual room in Lifesize Cloud

One of the biggest challenges in the world of videoconferencing is how to unite so many different and yet similar protocols into one call? As users of such systems, we are only interested in establishing a call, having satisfactory video...

F5 Networks Wireshark Plugin

Wireshark is a free and open source software utility for analyzing network traffic. IT professionals consider Wireshark a very popular tool for analysis, software and communication protocol development, as well as education. This network utility can be used on various...

Polycom EagleEye Director 2

The successor to the popular Polycom system for automatic speaker-tracking was recently introduced offering following new features: People-tracking up to 10m Supports simultaneous video streaming with both cameras (active speaker and entire room) Supports EagleEye IV Series cameras Added option...

HPE HC380 UX GUI Interface Review

Hyper-converged infrastructure is slowly but increasingly being shaped into the standard for building specific server infrastructure. Main reasons for this include convenience, speed and ease of initialization of such systems as new systems in SMBs, as upgrades to existing systems...