Dell Technologies and Microsoft expand partnership to help customers accelerate their digital transformation – Stories

  • New Microsoft Azure VMware Solutions bring customers more choice and flexibility
  • Microsoft and VMware collaborate on digital workspace offerings and future cloud integrations

DELL TECHNOLOGIES WORLD, LAS VEGAS, NV — April 29, 2019 — Dell Technologies (NYSE: DELL) and Microsoft Corp. on Monday announced they are expanding their partnership to address a wider range of customer needs and help accelerate digital transformations. Through this collaboration, the companies will deliver a fully native, supported, and certified VMware cloud infrastructure on Microsoft Azure. Additionally, joint Microsoft 365 and VMware Workspace ONE customers will be able to manage Office 365 across devices via cloud-based integration with Microsoft Intune and Azure Active Directory. VMware (NYSE:VMW) will also extend the capabilities of Windows Virtual Desktop leveraging VMware Horizon Cloud on Microsoft Azure.

“At Microsoft, we’re focused on empowering customers in their digital transformation journey, through partnerships that enable them to take advantage of the Microsoft Cloud, using the technologies they already have,” said Satya Nadella, CEO, Microsoft. “Together with Dell Technologies and VMware, we are providing our mutual customers with an integrated cloud experience and digital workplace solutions to open up new opportunities and meet their evolving needs.”

“Customers are excited to see us expand our collaboration with Microsoft,” commented Pat Gelsinger, CEO, VMware. These innovative cloud and client offerings will deliver customers even more value, provide more flexibility to accelerate their hybrid-multi cloud and multi-device journey, and accelerate the digital transformation of their business.”

The cloud has become fundamental to enabling organizations to move faster toward their business goals. With the cloud’s scalability, enhanced security, productivity, cost savings and more, companies are capitalizing on the many benefits. These benefits are enabling organizations to better tap into the potential of technologies like artificial intelligence and Internet of Things. Through this collaboration, the companies aim to accelerate customer transformations with even more open, flexible and scalable solutions.

“We’re excited to expand our collaboration with Microsoft. These innovative cloud and client offerings will deliver customers even more value,” commented Pat Gelsinger, CEO, VMware. “These offerings will provide customers flexibility to accelerate their cloud journey and drive their business forward.”

New Azure VMware Solutions provide a seamless VMware experience on Microsoft Azure

Azure VMware Solutions are built on VMware Cloud Foundation – a comprehensive offering of software defined compute, storage, networking and management – deployed in Azure. With these solutions, customers can capitalize on VMware’s broadly deployed and trusted cloud infrastructure while experiencing the power of Microsoft Azure.

Azure VMware Solutions give customers the power to seamlessly migrate, extend and run existing VMware workloads from on-premises environments to Azure without the need to re-architect applications or retool operations. Customers will be able to build, run, manage, and secure new and existing applications across VMware environments and Microsoft Azure while extending a single model for operations based on established tools, skills and processes as part of a hybrid cloud strategy.  Some of the more popular customer scenarios Azure VMware Solutions will support are app migration and datacenter expansion, disaster recovery, and business continuity and modern application development.

Azure VMware Solutions enable organizations to tap into Azure’s scale, security, and fast provisioning cycles to innovate and modernize applications while also improving performance. By integrating with native Azure services, customers can easily infuse advanced capabilities like AI, machine learning, and IoT into their applications enabling new, intelligent experiences.

Azure VMware Solutions are first-party services from Microsoft developed in collaboration with VMware Cloud Verified partners CloudSimple and Virtustream (a Dell Technologies company).

“At Walmart, we’re focused on making it easy, fast, friendly and fun to shop with us no matter where you are – whether online, in our stores or through our pick up services. We’re excited about the role technology plays in this and how it can help us deliver new services faster. Cloud and Client innovations are an important part of this and a key enabler of our digital transformation,” commented Clay Johnson, executive vice president and enterprise chief information office, Walmart. “The partnership being announced today between Microsoft, Dell and VMware in Cloud and Client innovations will allow them to better bring their best solutions to customers like us. We look forward to continuing to work with Microsoft, Dell and VMware to accelerate our digital transformation.”

Helping customers advance their digital workspace strategy

With this agreement, mutual Microsoft 365 and VMware Workspace ONE customers will be able to get the most out of their digital workspace across device platforms while maximizing existing and future investments. Specifically, customers will be able to use Workspace ONE to manage and secure the powerful productivity features of Office 365 across devices via cloud-based integration with Microsoft Intune and Azure Active Directory.

Through the new Dell Technologies Unified Workspace offerings, customers can further accelerate their Windows 10 digital transformation journey by leveraging the integration of Windows Autopilot and Dell Device Provisioning and Deployment Services, like Dell ProDeploy – all enabled by the integration of Microsoft 365, Workspace ONE, and Dell Provisioning Services.

In addition, Microsoft recently announced Windows Virtual Desktop, the only service that delivers a multi-session Windows 10 experience, optimizations for Office 365 ProPlus, and support for Windows Server Remote Desktop Services (RDS) desktops and apps. As a part of this agreement, VMware will extend the capabilities of Windows Virtual Desktop to enable customers to further accelerate their cloud initiatives, leveraging VMware Horizon Cloud on Microsoft Azure. Initial capabilities are expected to be available as a tech preview by the end of calendar year 2019.

Microsoft and VMware are also exploring initiatives to drive further integration between VMware infrastructure and Azure such as integration of VMware NSX with Azure Networking and integration of specific Azure services with VMware management solutions. They will also be exploring bringing specific Azure services to the VMware on-premise customers. Through this collaboration, the companies aim to give customers a more seamless experience across VMware and Azure environments.

About Dell Technologies
Dell Technologies (NYSE:DELL) is a unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live. The company provides customers with the industry’s broadest and most innovative technology and services portfolio spanning from edge to core to cloud. The Dell Technologies family includes Dell, Dell EMCPivotalRSASecureworksVirtustream and VMware.

About Microsoft
Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

About VMware
VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to over 500,000 customers globally, aided by an ecosystem of 75,000 partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact. For more information, please visit https://www.vmware.com/company.html.

For more information, press only:

Dell Technologies Media Relations, Media.Relations@Dell.com

Microsoft Media Relations, WE Communications for Microsoft, (425) 638-7777, rrt@we-worldwide.com

VMware Media Relations, Michael Thacker, (650) 427-4454, mthacker@vmware.com

VMware, VMware Cloud, Workspace ONE, Horizon, Horizon Cloud, Cloud Foundation, and NSX are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions.

Go to Original Article
Author: Microsoft News Center

Wanted – Cheap 1150 cpu and DDR3 laptop menory

Discussion in ‘Desktop Computer Classifieds‘ started by geordieboy25, Mar 13, 2019.

  1. geordieboy25

    geordieboy25

    Active Member

    Joined:
    Feb 2, 2008
    Messages:
    1,527
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Location:
    Newcastle
    Ratings:
    +42

    Hi guys.

    Just bought a 2nd user laptop and a Lenovo M93P sff.

    None of which came with memory and I’d like a few 4gb ddr3 sticks

    Also the M93P was a barebones kit so would like a cheap cpu. Just wanted to get it up and running, nothing fancy please.

    Thanks

    Location: Newcastle

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

  2. maddy

    maddy

    Well-known Member

    Joined:
    Jan 31, 2006
    Messages:
    1,468
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    83
    Ratings:
    +354

    CEX are cheap for 4GB DDR3 – £8, or £9.50 posted. They’re the cheapest I’ve found.

    Is your Lenovo one of the tiny range? If it is, make sure you buy an Intel from their “T” series as they tiny ones aren’t designed for the thermal load of a non-T CPU.

    Great little machines.

  3. Krooner

    Well-known Member

    Joined:
    Jun 14, 2007
    Messages:
    4,756
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    136
    Ratings:
    +514

    I have 2 stick of 4gb DDR3 at home, do you need low voltage ram in the SFF?

  4. geordieboy25

    geordieboy25

    Active Member

    Joined:
    Feb 2, 2008
    Messages:
    1,527
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Location:
    Newcastle
    Ratings:
    +42

    Not too sure, is it SODIMMS that you have?

  5. Krooner

    Well-known Member

    Joined:
    Jun 14, 2007
    Messages:
    4,756
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    136
    Ratings:
    +514

    Yes, I know the ultra small form factor units require PC3L is all, not sure about the SFF It was something I ran into on the m92p.

    I have Low voltage sticks, but if it will take standard PC3 then CEX will be 50p per stick cheaper than me.

  6. GIBSrUS

    GIBSrUS

    Active Member

    Joined:
    May 30, 2011
    Messages:
    520
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    28
    Ratings:
    +42

    Hiya. I have a pentium g3258 if that’s of interest?

  7. geordieboy25

    geordieboy25

    Active Member

    Joined:
    Feb 2, 2008
    Messages:
    1,527
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Location:
    Newcastle
    Ratings:
    +42

    Thanks but I think I need a “t” series cpu.

  8. Ozzyh

    Active Member

    Joined:
    Feb 20, 2018
    Messages:
    353
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    High Wycombe
    Ratings:
    +85

    @geordieboy25 Are you still after DDR3 laptop RAM? I have 2x 4GB matching sticks if that helps.

  9. geordieboy25

    geordieboy25

    Active Member

    Joined:
    Feb 2, 2008
    Messages:
    1,527
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Location:
    Newcastle
    Ratings:
    +42

    How much please?

  10. Ozzyh

    Active Member

    Joined:
    Feb 20, 2018
    Messages:
    353
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    High Wycombe
    Ratings:
    +85

    £18 delivered ok? I can send via 1st class recorded Monday morning and you should get Tuesday or Wednesday at the latest as I’m at work till 6pm today.

    Would like to avoid sending normal 1st class as just in case they get lost in the post.

  11. Ozzyh

    Active Member

    Joined:
    Feb 20, 2018
    Messages:
    353
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    High Wycombe
    Ratings:
    +85

    Sorry just to add that the modules are a matching pair of the below. They were inside a HP laptop which my 6yr old daughter was using for playing games to help her read. Moved her onto a PC now.

    Hynix 4GB PC3L – 12800S (part number: HMT351S6EFR8A)

    These are going for about £13 for 4GB on eBay so £18 inc delivery for 8GB is a steal

    Thanks.

  12. Ozzyh

    Active Member

    Joined:
    Feb 20, 2018
    Messages:
    353
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    High Wycombe
    Ratings:
    +85

    Not heard back so i’ll create a For Sale advert as it looks like you’re not interested.

    Thanks.

Share This Page

Loading…

Go to Original Article
Author:

Babylon.js 4.0 Is Here! – Windows Developer Blog

We cannot be more excited to share that Babylon.js 4.0 has officially been released. This version of Babylon.js is a major step forward in one of the world’s leading WebGL-based, graphics engines. Babylon.js 4.0 represents an incredible amount of hard work by a very passionate community of developers from around the world, and it is our honor to share it with all of you.

From a new visual scene inspector, best-in-class physically-based rendering, countless performance optimizations, and much more, Babylon.js 4.0 brings powerful, beautiful, simple, and open 3D to everyone on the web. Babylon.js has come a long way from its humble beginnings, and version 4.0 is our biggest update yet.

Along with new capabilities in the Babylon.js engine, we also want to improve the overall development experience with better debugging tools. Babylon.js 4.0 includes a new inspector tool which helps developers and artists setup or debug a scene. The inspector lets you configure and test all aspects of a Babylon.js scene like textures, materials, lighting, etc. For example, the properties panel in the inspector window can be used to configure all aspects of the updated physically-based material system.

You can learn more about the inspector and how to use it in our video tutorial series: Intro to Inspector.

The entire Babylon.js codebase has been moved to independent modules (ECMAScript 6). This will enable developers to create optimized payloads for the Babylon.js engine and reduce the overall download size. For simple 3D object viewing scenarios, we are seeing up to 80% smaller download payloads. The modularized engine is available as part of Babylon.js 4.0 and you can find out how to take full advantage of it here.

A common request around rendering real world objects is to improve the realism of certain materials like fabric, glassware and metallic paint. To enable more realistic rendering of these materials, Babylon.js 4.0 adds new capabilities to its physically-based materials such as clear coat, anisotropy, sheen and sub-surface scattering. You can learn more about these new rendering capabilities here.

Babylon.js already has a plugin system that enables developers to choose their own physics engine. Now Babylon.js 4.0 includes support for the ammo.js physics engine as a plugin. The ammo.js plugin brings new capabilities like soft-body physics where you can simulate interactions between objects like cloth or rope. This demo showcases the many physical interactions that can be simulated using the ammo.js plugin.

These are a few highlights of the new capabilities available in Babylon.js 4.0. There are many more capabilities for you to explore like Trail Mesh and Motion Blur. You can check out the full list here.

With such a major release, it seemed like a fantastic time to evolve our brand to help set the stage as we look to the future of Babylon.js. Alongside version 4.0, we’re also very happy to introduce you to the new look for Babylon.

Starting today, Babylon.js has a bold new identity and a freshly designed website that reflects a “future of dimensionality.” We see a future where 3D web experiences are as accessible as photos and video are today. By unlocking the power of 3D for developers and artists across the web, we see a more open, entertaining, and interactive online world…and it was important to us, that our brand boldly represent that vision.

Whether you are just starting your journey with web-based 3D or you are a seasoned professional, we sincerely hope that you’ll find something unique and delightful with Babylon.js 4.0. It’s built by people like you for people like you.
https://www.babylonjs.com 

How to save and reuse a Windows container image

Windows containers are lightweight and easy to deploy. Considering the nature of Windows containers, you might want to deploy multiple containers running the same set of components or applications. The best way to do this is to save a Windows container image and spin up another container using that image.

Before familiarizing yourself with the process of saving and reusing a Windows container image, you should figure out when it makes sense to do so. Containers are designed to be disposable, meaning you can quickly create a container to run a specific task and kill it once that task is complete. Because containers don’t have a data drive attached to them and are lightweight in design, it would make sense to use the save-and-reuse process for stateless applications, such as web servers and applications that don’t require data to be stored in memory.

Reusing a Windows container image also makes sense when you must deploy a service quickly, because reusing the image doesn’t require you to create the container from scratch first, which saves on time.

Steps for creating a container and saving an image

First, you must create a Windows container, install Internet Information Services (IIS) in the container and save the image. You’ll deploy the container with an IIS web server instance.

Step 1: Create a Windows Container by running the command below:

Docker run –it –name winserver16 –p 80:80 –p 443:443 –v C:MyDatadockervolumesdata1:E: Microsoft/windowsservercore cmd

The command above creates a container by the name of winserver16 and saves the image for the container in the E: directory.

Step 2: Inside the container, open a PowerShell window, and install an IIS web server instance. Run the following PowerShell command to install an IIS web server:

Add-WindowsFeature Web-Server

Once the IIS web server installs, exit and stop the container. This is required to make sure the changes are committed to the image. To exit the container, use the Ctrl+P+Q shortcut, and to stop the container, issue the command below:

Docker stop winserver16

Step 3: Next, get the container ID by running the following command:

Docker ps –a

Make a note of the container ID, as you’ll be required to use it in the next step.

Step 4: Commit the changes to the container, and create an image. The command below creates a Windows container image by the name of image.v3 and stores it in the container image library:

Docker commit e747474cef4fa windowsiis/image.v3

If you run the docker images command, you’ll be able to see all of the container images, along with the one you just created by using the docker commit command.

Step 5: Once you see your image in the list, you can start a new container with the same image by using the command below:

docker run -it newimages/myimage.v4 cmd

If your container starts with the new Windows container image without any issues, the image was saved successfully and can be reused multiple times when creating new containers.

Go to Original Article
Author:

Santander partners with Microsoft as a preferred strategic cloud provider to enable the bank’s digital transformation

29/04/2019

Santander partners with Microsoft as a preferred strategic cloud provider to enable the bank’s digital transformation

Madrid (Spain) and Redmond (USA), April 29, 2019 – Banco Santander has partnered with Microsoft Corp. as a preferred strategic cloud provider to enable the bank’s digital transformation. Both companies announced today a multi-year global partnership that will help the bank drive its digital innovation and increase operational efficiency using a wide range of cloud solutions, including Microsoft Azure, Data, Artificial Intelligence and Cognitive Services.

Santander is transitioning its IT infrastructure towards a multi-cloud environment, with global platforms supported by agile methodologies, helping to accelerate the Group’s technological transformation.

Dirk Marzluf, head of Technology & Operations at Banco Santander, said: “We firmly believe that through successful, customer focused innovation we can earn greater loyalty by improving and personalising customers experiences, while also becoming more agile and efficient. Technology is a key enabler to the success of our business and Microsoft is a strong partner who will help us achieve our vision.”

Tom Keane, corporate vice president of Azure Global at Microsoft, said: “Our partnership with Santander comes at a transformative time for financial services, which is pivoting to digital quickly in response to industry-wide changes. We are looking forward to deepening our cloud engagement with Santander as the company continues to drive digital innovation across its global operations.”

Cloud as the lever to accelerate innovation
As part of the partnership, Microsoft will work with Santander to extend the bank’s cloud capabilities across its markets, driving the creation of cloud native applications and developing new and innovative banking solutions, while extending current applications with new intelligent capabilities. In addition, Microsoft will support the delivery of Azure training and certification programs to employees.

Microsoft Azure provides Santander with the agility, scale and intelligent technology required to bring new products to market quicker and address customer needs with higher flexibility through distribution channels and optimized internal operations.

Santander can leverage Microsoft’s ongoing commitment to security, compliance, privacy and transparency. Further, Microsoft’s Financial Services Compliance program – which allows banking firms and regulators to examine Microsoft cloud systems, services and processes – provides reassurance of Microsoft’s cloud operations compliance with regulatory requirements to enable Santander to gain the required flexibility to compete while preserving its customers’ privacy and trust.

About Santander
Banco Santander (SAN SM, STD US, BNC LN) is a leading retail and commercial bank, founded in 1857 and headquartered in Spain. It has a meaningful presence in 10 core markets in Europe and the Americas, and is the largest bank in the euro zone by market capitalization. At the end of 2018, Banco Santander had EUR 981 billion in customer funds (deposits and mutual funds), 144 million customers, 13,000 branches and 200,000 employees. Banco Santander made attributable profit of EUR 7,810 million in 2018, an increase of 18% compared to the previous year.

About Microsoft
Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

Download PDF 556 Kb
 

Go to Original Article
Author: Microsoft News Center

‘Master134’ malvertising campaign raises questions for online ad firms

Why were several major online advertising firms selling traffic from compromised WordPress sites to threat actors operating some of the most dangerous exploit kits around?

That was the question at the heart of a 2018 report from Check Point Research detailing the inner workings of an extensive malvertising campaign it calls “Master134,” which implicated several online advertising companies. According to the report, titled “A Malvertising Campaign of Secrets and Lies,” a threat actor or group had compromised more than 10,000 vulnerable WordPress sites through a remote code execution vulnerability that existed on an older version of the content management system.

Malvertising is a common, persistent problem for the information security industry, thanks to the pervasiveness of digital ads on the internet. Threat actors have become adept at exploiting vulnerable technology and lax oversight in the online ad ecosystem, which allows them to use ads as a delivery mechanism for malware. As a result, many security experts recommend using ad blockers to protect endpoints from malvertising threats.

But Master134 was not a typical malvertising campaign.

A tangled web of redirects

Rather than using banner ads as a vector for malware infection, threat actors relied on a different component of the digital advertising ecosystem: web traffic redirection. In addition to serving digital ads, many ad networks buy and sell traffic, which is then redirected and used to generate impressions on publishers’ ads. These traffic purchases are made through what’s known as real-time bidding (RTB) platforms, and they are ostensibly marketed as legitimate or “real” users, though experts say a number of nefarious techniques are used to artificially boost impressions and commit ad fraud. These techniques include the use of bots, traffic hijacking and malicious redirection codes.

Threat actors never cease to look for new techniques to spread their attack campaigns, and do not hesitate to utilize legitimate means to do so.
Check Point Research’s report, ‘A Malvertising Campaign of Secrets and Lies’

According to Check Point Research, part of Check Point Software Technologies, Master134 was an unusually complex operation involving multiple ad networks, RTB platforms and traffic redirection stages. Instead of routing the hijacked WordPress traffic to malicious ads, the threat actors redirected the traffic intended for those sites to a remote server located in Ukraine with the IP address “134.249.116.78,” hence the name Master134. (Check Point said a second, smaller source of traffic to the Master134 server was a PUP that redirected traffic intended for victims’ homepages.)

Then, the Master134 campaign redirected the WordPress traffic to domains owned by a company known as Adsterra, a Cyprus-based online ad network. Acting as a legitimate publisher, Master134 sold the WordPress traffic to Adsterra’s network to other online ad companies, namely ExoClick, EvoLeads, AdventureFeeds and AdKernel.

From there, the redirected WordPress traffic was resold a second time to threat actors operating some of the most well-known malicious sites and campaigns in recent memory, including HookAds, Seamless and Fobos. The traffic was redirected a third and final time to “some of the exploit kit land’s biggest players,” according to Check Point’s report, including the RIG and Magnitude EKs.

The researchers further noted that all of the Master134 traffic ended up in the hands of threat actors and was never purchased by legitimate advertisers. That, according to Check Point, indicated “an extensive collaboration between several malicious parties” and a “manipulation of the entire online advertising supply chain,” rather than a series of coincidences.

Master134 malvertising operation
The redirection/infection chain of the Master134 campaign.

Why would threat actors and ad networks engage in such a complex scheme? Lotem Finkelsteen, Check Point’s threat intelligence analysis team leader and one of the contributors to the Master134 report, said the malvertising campaign was a mutually beneficial arrangement. The ad companies generate revenue off the hijacked WordPress traffic by reselling it. The Master134 threat actors, knowing the ad companies have little to no incentive to inspect the traffic, use the ad network platforms as a distribution system to match potential victims with different exploit kits and malicious domains.

“In short, it seems threat actors seeking traffic for their campaigns simply buy ad space from Master134 via several ad-networks and, in turn, Master134 indirectly sells traffic/victims to these campaigns via malvertising,” Check Point researchers wrote.

Check Point’s report was also a damning indictment of the online ad industry. “Indeed, threat actors never cease to look for new techniques to spread their attack campaigns, and do not hesitate to utilize legitimate means to do so,” the report stated. “However, when legitimate online advertising companies are found at the heart of a scheme, connecting threat actors and enabling the distribution of malicious content worldwide, we can’t help but wonder — is the online advertising industry responsible for the public’s safety?”

Other security vendors have noted that malvertising and adware schemes are evolving and becoming increasingly concerning for enterprises. Malwarebytes’ “Cybercrime Tactics and Techniques” report for Q3 2018, for example, noted that adware detections increased 15% for businesses while dropping 19% for consumers. In addition, the report noted a rise in new techniques such as adware masquerading as legitimate applications and browser extensions for ad blockers and privacy tools, among other things.

The malvertising Catch-22

The situation has left both online ad networks and security vendors in a never-ending game of whack-a-mole. Ad companies frequently find themselves scrutinized by security vendors such as Check Point in reports on malvertising campaigns. The ad companies typically deny any knowledge or direct involvement in the malicious activity while removing the offending advertisements and publishers from their networks. However, many of those same ad networks inevitably end up in later vendor reports with different threat actors and malware, issuing familiar denials and assurances.

Meanwhile, security vendors are left in a bind: If they ban the ad networks’ servers and domains in their antimalware or network security products, they effectively block all ads coming from repeat offenders, not just the malicious ones, which hurts legitimate publishers as well as the entire digital advertising ecosystem. But if vendors don’t institute such bans, they’re left smacking down each new campaign and issuing sternly worded criticisms to the ad networks.

That familiar cycle was on display with Master134; following Check Point’s publication of the report on July 30, three of the online ad companies — Adsterra, ExoClick and AdKernel — pushed back on the Check Point report and adamantly denied they were involved in the Master134 scheme (EvoLeads and AdventureFeeds did not comment publicly on the Master134 report). The companies claimed they are leading online advertising and traffic generation companies and were not directly involved in any illegitimate or malicious activity.

Master134 Adsterra AdKernel ExoClick
How the Master134 campaign worked.

Check Point revised the report on August 1 and removed all references to one of the companies, New York-based AdKernel LLC, which had argued the report contained false information. Check Point’s original report incorrectly attributed two key redirection domains — xml.bikinisgroup.com and xml.junnify.com — to the online ad company. As a result, several media outlets, including SearchSecurity, revised or updated their articles on Master134 to clarify or completely remove references to AdKernel.

But questions about the Master134 campaign remained. Who was behind the bikinisgroup and junnify domains? What was AdKernel’s role in the matter? And most importantly: How were threat actors able to coordinate substantial amounts of hijacked WordPress traffic through several different networks and layers of the online ad ecosystem and ensure that it always ended up on a select group of exploit kit sites?

A seven-month investigation into the campaign revealed patterns of suspicious activity and questionable conduct among several ad networks, including AdKernel. SearchSecurity also found information that implicates other online advertising companies, demonstrating how persistent and pervasive malvertising threats are in the internet ecosystem.

Read part two of our six-part series on the Master134 campaign and malvertising threats.

Go to Original Article
Author:

Wanted – WFH SFF or Chromebox (budget)

Discussion in ‘Desktop Computer Classifieds‘ started by IceAx, Apr 17, 2019.

  1. IceAx

    Active Member

    Joined:
    Jan 19, 2006
    Messages:
    2,384
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Location:
    Warrington
    Ratings:
    +155

    Morning all

    Does anyone have a cheapie SFF or chromebox they are looking to shift for working from home.

    just needs to be able to run a browser with tabs open etc – would probably run linux on SFF.

    Thanks
    A

    Location: Warrington

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Share This Page

Loading…

Go to Original Article
Author: