For Sale – BenQ ZOWIE XL2735 gaming monitor 1440p 144hz esports monitor

Hi, I have a monitor for sale.

I have had it for around 6 months.

With original box and all bits.

It has no dead pixel.

Only minor thing is that there are scratches on the frame (shown in pics)

Only selling due to moving to 4k monitor.

300

I think it is a good price but I am willing to listen to any offers.

will list for a week before ebay.

Thanks!

Will soon be listing a gaming pc aswell, so keep tuned.

will add pics asap

Price and currency: 300
Delivery: Delivery cost is included within my country
Payment method: paypal/bt
Location: birmingham
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Attending Black Hat USA 2018? Here’s what to expect from Microsoft.

Black Hat USA 2018 brings together professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. This is an exciting time as our Microsoft researchers, partners, and security experts will showcase the latest collaborations in defense strategies for cybersecurity, highlight solutions for security vulnerabilities in applications, and bring together an ecosystem of intelligent security solutions. Our objective is to arm business, government, and consumers with deeply integrated intelligence and threat protection capabilities across platforms and products.

Security researchers play an essential role in Microsoft’s security strategy and are key to community-based defense. To show our appreciation for their hard work and partnership, each year at Black Hat USA, the Microsoft Security Response Center (MSRC) highlights the contributions of these researchers through the list of “Top 100” security researchers reporting to Microsoft (either directly or through a third party) during the previous 12 months. While one criterion for the ranking is volume of fixed reports a researcher has made, the severity and impact of the reports is very important to the ranking also. Given the number of individuals reporting to Microsoft, anyone ranked among the Top 100 is among some of the top talent in the industry.

In addition to unveiling the Top 100 and showcasing Microsoft security solutions at Booth #652, there are a number of featured Microsoft speakers and sessions:

Join us at these sessions during the week of August 4-9, 2018 in Las Vegas and continue the discussion with us in Booth #652, where we will have product demonstrations, theatre presentations, and an opportunity to learn more about our Top 100 and meet with some of Microsoft’s security experts and partners.

Wanted – Mac Mini

Hi

Been looking around where to buy a used/looked after Mac Mini and these forums seems really well managed, so hopefully I’ll be able to source what I’m after

I’m looking for ideally a 2012 or 2014 Mac Mini, ideally an i7 but will consider an i5. 16GB RAM and with a 256GB minimum SSD or a 1TB fusion drive upwards (ideally the original 1TB HDD with a 120GB SSD or upwards)

Needs to be in full working order with no damage and running the latest OS

Preferably boxes with original power cable as well

I’m based in Bamber Bridge, near to Preston. Happy to collect within a sensible distance, or happy to have it sent via an insured courier (Royal Mail, Parcelforce, UPS etc)

Budget is c£500, but happy to pay more for the right Mini (within reason)

Thank you

Location: Bamber Bridge

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Gaming(Hackintosh compatible) PC

Hi Guys
I am selling my Gaming PC
I originally specced it out for both windows and Mac OS/Hackintosh.
All in great condition. It was mainly used for Hackintosh and didnt get used very much for gaming in the end.
The specs are as follows:
Intel i5 6600 Processor
Cryorig C7 Processor cooler
Gigabite H170N-WIFI Motherboard
Broadcom BCM94352Z DW1560 Wifi/Bluetooth mini PCI-E card(for Hackintosh functionality)
16gb Kingston HyperX DDR4 Ram
Gigabite GTX 1060 6gb G1 Gaming Graphics Card
Corsair CX550M Semi-Modular PSU
Bitfenix Prodigy M White Case
Bitfenix Prodigy M Windowed side panel
WD Black 1tb 2.5″ mechanical Hard drive
Corsair case fans
RGB LED Light Strip with remote control
No Operating System

I have the boxes for the case, Motherboard, Graphics card and Cooler
£590 including Express delivery to UK address

Price and currency: £590
Delivery: Delivery cost is included within my country
Payment method: Paypal Gift
Location: Ware, Hertfordshire
Advertised elsewhere?: advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Shadow IT channel outpaces traditional partners

The traditional channel is fading, while a new shadow IT channel consisting of cloud consultants, tech-oriented professional services firms and startups is on the rise.

That’s the analysis of Jay McBain, principal analyst for global channels at Forrester Research. McBain, speaking at CompTIA’s ChannelCon 2018 conference, said this emerging shadow channel is adding thousands of new companies to the partner ecosystem, while conventional resellers of hardware, software and services are slowly dwindling in number.

“The traditional channel isn’t dead; it isn’t dying, but it is declining,” he said.

McBain said the population of traditional channel players has dropped 36% since the 2008 recession. He also noted that 40% of channel partner owners plan to retire by 2024, noting that the average age of an owner or principal is 58.

In contrast, shadow IT channel companies are rapidly growing in number. McBain cited several categories of such companies. He termed one group everything-as-a-service (XaaS) ecosystem consultants. Those companies help enterprises install, implement and secure software-as-a-service and infrastructure-as-a-service platforms.

According to McBain, XaaS ecosystem consultants are line-of-business experts who understand cloud-driven best practices and typically partner with a handful of vendors, such as Salesforce or Amazon Web Services.

McBain pointed to the surge in growth in the AWS ecosystem. AWS said it added 10,000 new AWS Partner Network companies in 2017. He said AWS could have a total of 100,000 companies in its partner ecosystem in the next 18 months.

“People are flooding into these ecosystems,” he said.

Industry-based professional services firms are another aspect of the shadow IT channel. Accounting firms, digital agencies, architectural companies and law offices are moving into IT services to support their clients in industries undergoing digital disruption.

“They’re technology companies,” McBain said, who noted that there are about as many certified public accountant (CPA) firms as there are value-added resellers.

The traditional channel isn’t dead; it isn’t dying, but it is declining.
Jay McBainprincipal analyst for global channels, Forrester Research

While the depth of the CPA-as-IT-provider shift may be a recent development, the largest accounting firms were rolling out IT strategy consulting and systems integration services 30 years ago.

Other participants in the shadow IT channel include ISVs, an area also seeing explosive growth. Bain estimated 100,000 ISVs exist today worldwide, compared with 10,000 software houses a decade ago. He predicted the number of ISVs will grow to 1 million by 2027, a rise driven by customers’ demand for increasing levels of specialization.

Large IT vendors such as Cisco help fuel the ISV trend. As Cisco pursues a software-led strategy, the company is encouraging its traditional channel partners to develop software and is cultivating expanded ties with ISVs.

In addition, McBain identified born-in-the-cloud firms that focus on back-end project-based services as another example of shadow channel companies. He also said he sees the potential of companies stemming from the startup community as channel disrupters.

The traditional partner response to the shadow IT channel trend could include partnering or merging with the new channel players, McBain suggested, noting that channel partners may be better at such things as business continuity than a digital marketing firm. Such skill set combinations are already coalescing in the emergence of digital consulting firms, which combine elements of traditional systems integration and digital marketing.

A deep dive on SamSam ransomware

New insights into the notorious SamSam ransomware revealed just how successful the campaign has been since it first appeared in 2016.

According to new research from cybersecurity vendor Sophos Ltd., the SamSam ransomware has generated nearly $6 million in ransom payments from more than 200 organizations. The Sophos report details how the campaign operates differently than most traditional ransomware efforts, and it argues that a single threat actor is likely behind SamSam rather than a group of cybercriminals.

Why does the SamSam ransomware work so well? Why does the threat actor behind the campaign take a more manual approach to targeting and infecting victims? Will other cybercriminals take a page from SamSam’s increasingly sophisticated and effective playbook? SearchSecurity editors Rob Wright and Peter Loshin discuss those questions and more in this episode of the Risk & Repeat podcast.

Black Hat 2018 survey: Cybersecurity staffing, budgets still lacking

Attendees for next week’s 2018 Black Hat USA conference said they are still facing significant challenges when it comes to cybersecurity staffing and budgets.

According to the 2018 Black Hat USA Attendee Survey, which was conducted in May with 315 infosec professionals, a majority of respondents said they don’t have “the staffing or budget to defend adequately against current and emerging threats.” Sixty-five percent of infosec professionals said they do not have enough qualified staff members to deal with potential threats; this is the fourth consecutive year, according to the study, that approximately two-thirds of respondents believed they had inadequate staff.

In addition, 66% of respondents said they do not possess enough skills and training to perform all of the job functions required of them by their organizations. The cybersecurity skills shortage was also the most frequently cited answer from respondents (34%) when asked for the primary reason for why enterprise security strategies fail.

“While the shortcomings of current security technology and potential vulnerabilities in emerging cloud services are new aspects of security’s current landscape, it is an old nemesis — staffing shortages — that continues to plague the data centers and minds of Black Hat Attendee Survey respondents,” the report states.

Another cybersecurity staffing issue reared its head in the survey: Nearly half the respondents (47%) said the lack of women and minority infosec professionals was a concern to them. The gender gap in the infosec industry has been cited as a major issue in recent research from other organizations such as ISACA.

While cybersecurity staffing continues to be a major obstacle, budgets are also a consistent pain point, according to the survey. Fifty-three percent of respondents said they do not have enough of a cybersecurity budget to defend their organizations against current threats. However, that number is an improvement from both 2016 and 2017, when 63% and 58% of respondents said they had inadequate budgets.

This year’s Black Hat conference has several Community track sessions that deal with cybersecurity staffing and related workforce issues, including a session on hiring and retaining female engineers. Other sessions will focus on negative influences on the cybersecurity workforce such as sexual harassment, addiction, depression, suicide and post-traumatic stress disorder.

Black Hat USA will take place Aug. 4-9 in Las Vegas.

Kontron heeds carrier demand for software, buys Inocybe

Kontron has acquired Inocybe Technologies, adding open source networking software to the German hardware maker’s portfolio of computing systems for the telco industry.

Kontron, which announced the acquisition this week, purchased Inocybe’s Open Networking Platform as telcos increasingly favor buying software separate from hardware. Kontron is a midsize supplier of white box systems to communications service providers (CSPs) and cable companies.

CSPs are replacing specialized hardware with more flexible software-centric networking, forcing companies like Kontron and Radisys, which recently sold itself to Reliance Industries, to reinvent themselves, said Lee Doyle, principal analyst at Doyle Research, based in Wellesley, Mass.

“This is part of Kontron’s efforts to move in a more software direction — Radisys has done this as well — and to a more service-oriented model, in this case, based on open source,” Doyle said.

Inocybe, on the other hand, is a small startup that could take advantage of the resources of a midsize telecom supplier, mainly since the market for open source software is still in its infancy within the telecom industry, Doyle said.

While Kontron did not release financial details, the price for Inocybe ranged from $5 million to $10 million, said John Zannos, previously the chief revenue officer of Inocybe and now a general manager of its technology within Kontron. The manufacturer plans to offer Inocybe’s Open Networking Platform as a stand-alone product while also providing hardware specially designed to run the platform.

Inocybe’s business

Inocybe’s business model is similar to that of Red Hat, which sells its version of open source Linux and generates revenue from support and services on the server operating system. Under Kontron, Inocybe plans to continue developing commercial versions of all the networking software built under the Linux Foundation.

Open source is free, but making it work isn’t.
Lee Doyleprincipal analyst, Doyle Research

The Open Networking Platform includes parts of the Open Network Automation Platform (ONAP), the OpenDaylight software-defined networking controller and the OpenSwitch network operating system. Service providers use Inocybe’s platform as a tool for traffic engineering, network automation and network functions virtualization.

Tools like Inocybe’s deliver open source software in a form that’s ready for testing and then deploying in a production environment. The more difficult alternative is downloading the code from a Linux Foundation site and then stitching it together into something useful.

“Open source is free, but making it work isn’t,” Doyle said.

Before the acquisition, Inocybe had a seat on the board of the open source networking initiative within the Linux Foundation and was active in the development of several technologies, including OpenDaylight and OpenSwitch. All that work would continue under Kontron, Zannos said.

For Sale – GTX 1080ti £500 + Aorus Gaming Box 1080 eGPU £540

GTX 1080Ti GameRock – £500 inc postage.

Comes with box etc. No invoice but comes with a 1 year warranty. Card in great condition. Ask for more pics if needed.

Timestamps Imgur

AORUS GTX 1080 8G Gaming Box External Graphics Card – £540 inc postage

Item in great condition but does not come with a UK powerplug. It just needs a standard 3-pin kettle plug. Comes with box, leads, carry bag etc. No invoice but 1 years warranty.

Timestamps Imgur

Items will be sent with a 1-2 day courier service.

Price and currency: 500
Delivery: Delivery cost is included within my country
Payment method: BT, PPG, PPGS
Location: Manchester
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

FIN7 members arrested after stealing 15 million credit card records

FBI indictments unsealed Wednesday detailed the alleged crimes of three members of the FIN7 cybercrime gang who have been arrested and are in custody in Seattle.

Ukrainian nationals Dmytro Fedorov, Fedir Hladyr and Andrii Kopakov were arrested by the FBI and are in custody. Each has been charged with 26 federal offenses, including conspiracy, wire fraud, computer hacking, access device fraud and aggravated identity theft.

The FBI described the three hackers as “high-ranking members” of the FIN7 cybercrime organization — also known as the Carbanak Group — in a press release. The FIN7 group has been connected with attacks on more than 100 businesses and data breaches across 47 states in which “more than 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations” were stolen.

The FBI admitted it didn’t expect FIN7 to disappear following these arrests, but framed the indictments as a major blow to the group.

“The naming of these FIN7 leaders marks a major step toward dismantling this sophisticated criminal enterprise,” Jay Tabb, special agent in charge of the FBI’s Seattle field office, said in a statement.  “As the lead federal agency for cyber-attack investigations, the FBI will continue to work with its law enforcement partners worldwide to pursue the members of this devious group, and hold them accountable for stealing from American businesses and individuals.”

However, security vendor FireEye wrote in a blog post that while FIN7 may pause activity for a short time, the group would continue in one form or another.

“Depending on the organizational and communication structure of the group, it is also plausible that multiple subgroups could form and carry out independent operations in the future. Recent campaigns, as well as those using tactics that were atypical for historical FIN7 campaigns, such as the SEC [Securities and Exchange Commission] campaigns with widespread targeting, may be representative of semi-autonomous groups pre-existing within, or cooperating with, the FIN7 criminal organization,” FireEye researchers wrote. “Certain malware families and techniques transcend strictly defined threat groups, and may be re-used by developers and operators as they transition between organizations and campaigns.”

FIN7 activity

According to the FBI announcement, FIN7 primarily targeted companies in the “restaurant, gaming and hospitality industries,” across the U.S., U.K., France and Australia. The FBI described FIN7’s methods as using spear phishing, adding that the group “accompanied emails with telephone calls intended to further legitimize the email” in order to trick users into installing Carbanak malware.

FireEye expanded on this based on its history of FIN7 activity, saying the group was connected to attacks across the U.S. and Europe in the hospitality, restaurant, travel, education, gaming, construction, energy, retail, finance, telecom, high-tech, government, software and business service industries.

Kimberly Goody, cybercrime analysis manager at FireEye, based in Milpitas, Calif., also clarified the distinction between Carbanak malware and the commonly used Carbanak Group name via Twitter.

The FBI noted that FIN7 even made attempts to appear legitimate.

“FIN7 used a front company, Combi Security, purportedly headquartered in Russia and Israel, to provide a guise of legitimacy and to recruit hackers to join the criminal enterprise,” the FBI wrote. “Combi Security’s website indicated that it provided a number of security services such as penetration testing. Ironically, the sham company’s website listed multiple U.S. victims among its purported clients.”

FireEye confirmed some of FIN7’s job postings through Combi Security.

“While the recruitment of unwitting individuals as puppets has been a common component of at least some criminal schemes — for example, reshipping mules who are recruited through postings on career sites advertising attractive work-from-home jobs — FIN7’s veiling of full-scale financial compromises as legitimate offensive security engagements is particularly notable,” FireEye researchers wrote. “The apparent success of Combi Security in recruiting unsuspecting individuals in this manner, may lead to more of this type of technical recruitment by cyber criminals in the future.”