NFPA 70E and NEC: Aging Equipment in the Era of Arc Flash

Credit to Author: Gabriel Arce| Date: Fri, 30 Jun 2017 12:46:46 +0000

The need to operate electrical equipment safely, without impacting facility operation, has been a priority for electrical engineers and maintenance personnel for many decades. Initially, much of the focus was… Read more »

The post NFPA 70E and NEC: Aging Equipment in the Era of Arc Flash appeared first on Schneider Electric Blog.

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 26, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 30 Jun 2017 12:00:57 +0000

The late 70s/early 80s American television show Three’s Company was one of my favorite shows growing up. The central theme of the show revolved around the lives of three roommates. Each episode usually involved a misunderstanding, then chaos would ensue. In the end, everything would turn out okay. Unfortunately, this week’s episode of “ransomware in…

Read more

Why IIoT in Refineries Now?

Credit to Author: Livia Wiley| Date: Fri, 30 Jun 2017 11:54:00 +0000

By: Rachel K. Carson, MarCom Intern for Process Industries Whether we are aware of it or not, data is driving the processes around us everywhere. Phones are smarter than ever,… Read more »

The post Why IIoT in Refineries Now? appeared first on Schneider Electric Blog.

Read more

The paranoid Mac traveler’s 10-point data protection checklist

Credit to Author: Richard Hoffman| Date: Fri, 30 Jun 2017 03:01:00 -0700

Here’s an increasingly common scenario: You’re on a business trip, either entering a foreign country or returning home. As you go through customs, a border-control agent asks you to turn on and hand over your iPhone, then starts poking around, looking at your text messages, call logs and apps. The agent then asks you to wake your MacBook, log into your social media accounts and open your email. After the agent reads your tweets and posts for a few minutes, your phone and laptop are taken “for further inspection” — and returned some time later.

Alternatively, the equivalent of the Transportation Security Administration (TSA) in a foreign country declares that all laptops on international flights must be put in checked baggage — a scenario only narrowly averted a few weeks ago. Your company laptop is properly checked in, but when you arrive at your destination, you discover that not only has your bag been searched, but your laptop appears to have been opened and powered on.

To read this article in full or to leave a comment, please click here

Read more

A technical analysis of the recent Petya ransomware attack

Credit to Author: Quick Heal Security Labs| Date: Fri, 30 Jun 2017 11:54:55 +0000

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks and also the power services were hit by the attack. It’s…

The post A technical analysis of the recent Petya ransomware attack appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Microsoft consolidates its mobile management tools under Azure

Credit to Author: Lucas Mearian| Date: Thu, 29 Jun 2017 13:31:00 -0700

Microsoft has consolidated its Enterprise Mobility + Security (EMS) suite of products under its Azure portal, combining its Intune mobile application management tools and its Azure Active Directory (AD) and Information Protection under a single console.

The move offers a unified admin experience aimed at bolstering enterprise mobility management efforts.

Microsoft introduced the EMS suite in March 2014, targeting businesses with strong mobile and cloud-first strategies.

To read this article in full or to leave a comment, please click here

Read more

In-Depth Analysis of A New Variant of .NET Malware AgentTesla

Credit to Author: Xiaopeng Zhang| Date: Wed, 28 Jun 2017 16:15:52 +0000

FortiGuard Labs recently captured some malware which was developed with the Microsoft .Net framework. I analyzed one of them, and in this blog, I’m going to show you how it is able to steal information from a victim’s machine. The malware was spread via a Microsoft Word document that contained an auto-executable malicious VBA Macro. Figure 1 below shows how it looks when it’s opened. Figure 1. When the malicious Word document is opened What the VBA code does Once you click the “Enable Content”…

Read more