Month: August 2018

ScadaICSSchneider

Digitizing your critical power system: simple, smart and stable

Credit to Author: Markus Hirschbold| Date: Tue, 28 Aug 2018 13:00:29 +0000

In my last post, I talked about the difficulties faced by facility teams in keeping critical power facilities running safety, reliably, efficiently, and compliant with regulations. We looked at the… Read more »

The post Digitizing your critical power system: simple, smart and stable appeared first on Schneider Electric Blog.

Read More
ComputerWorldIndependent

University-customized Alexa devices will answer students’ questions

Credit to Author: Matthew Finnegan| Date: Tue, 28 Aug 2018 08:17:00 -0700

Saint Louis University (SLU) has rolled out 2,300 Alexa-powered Echo Dot virtual assistants to all of its student living spaces to provide answers to university-related queries about events, speakers on campus and more.

The university also plans to extend use of the artificial intelligence assistant into classrooms and meeting rooms in future and aims to use the technology to support workplace productivity for its faculty staff, according to CIO, David Hakanson.

Students arriving at SLU this month can access a custom skill that answers questions relating to university services, such as “When does the library open?” or “Where is the registrar’s office?”

To read this article in full, please click here

Read More
MalwareBytesSecurity

Official Cardi B website plagued by spammers

Credit to Author: Christopher Boyd| Date: Tue, 28 Aug 2018 15:00:00 +0000

Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened.

Categories:

Tags:

(Read more…)

The post Official Cardi B website plagued by spammers appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

A new ransomware campaign in the wild,Ryuk!!

Credit to Author: Shriram Munde| Date: Tue, 28 Aug 2018 13:07:23 +0000

Recently, Quick Heal Security Labs observed a new destructive ransomware named ‘Ryuk. Ransomware’. This ransomware campaign has already affected many users worldwide and seems to be a spear phishing attack. The compelling thing, it encrypts victim files without appending any extension but making files unreadable. Ryuk uses robust military algorithms…

Read More
SecurityTrendMicro

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read More