cPanel & WHM version 54 EOL in 1 month

cPanel & WHM 54 is set to reach End of Life at the end of January, 2017. In accordance with our EOL policy (, 54 will continue functioning on servers where it is already installed. However, no further updates, such as security fixes and installations, will be provided for 54 Continue Reading

2017 and the Internet: our predictions

An abbreviated version of this post originally appeared on TechCrunch Looking back over 2016, we saw the good and bad that comes with widespread use and abuse of the Internet. In both Gabon and Gambia, Internet connectivity was disrupted during elections. The contested election in Gambia started with an Internet Continue Reading

Byline: Four Things To Look For When Choosing A Financial Services Cloud Security Provider

  • in Blog Posts
  • by
  • December 23, 2016
  • Comments Off on Byline: Four Things To Look For When Choosing A Financial Services Cloud Security Provider

From large banks to insurance companies, financial services organizations are leveraging the cloud to stay ahead of the competition and deliver the best customer experiences that they can. Bloomberg reports that 25 of the world’s 38 largest financial institutions and insurance companies have signed up with Microsoft’s cloud business and Continue Reading

Red Hat Reports Third Quarter Results for Fiscal Year 2017

RALEIGH, N.C. — December 21, 2016 — Third quarter total revenue of $615 million, up 18% year-over-year or 17% in constant currency Third quarter total subscription revenue of $543 million, up 19% year-over-year or 18% in constant currency Third quarter Application development-related and other emerging technology revenue of $112 million, Continue Reading

Byline: 4 Key Areas to Consider When Solving the Cybersecurity Talent Gap

Findings from the “2015 PwC US State of Cybercrime Survey” revealed that only 26 percent of those surveyed feel they have the expertise to address the cyber risks associated with the implementation of new technologies. This means that 74 percent of organizations — essentially three-quarters — don’t have the cybersecurity Continue Reading

PrestaShop 1.7: Help translate software

PrestaShop, the free and open-source software, owes a great deal to its community, which helps improve it every day. There are lots of ways to pitch in, from modifying the source code, or providing feedback on Forge, to creating modules or even participating in user tests. Although more discreet, the Continue Reading

Did You Know: Email Templates Zimlet

Welcome to Part 7 of Our Zimlet Showcase: Email Templates Zimlet For background information on Zimlets, refer to this post: Did You Know: Zimlets!For more information on Zimlets, visit This is my favorite Zimlet. It saves me at least an hour each week. I send regular training emails. Of Continue Reading

Making Smart Cities Safe

For years now, we’ve been hearing about “smart cities.” Cities with the ability to leverage innovative technology, and automation to optimize resources and improve services for their citizens, with the ultimate goal of making our lives better. These smart cities are no longer a distant dream of the future – Continue Reading

How to become the leader in your niche market, an interview with Skylantern

Oftentimes, developing your activity calls for fleshing out your offering in new markets or strategically positioning yourself in a niche outside of your market’s typical scope. The e-commerce site Skylantern opted for the latter! After thoroughly reworking their product offering and SEO, the company became the top online lantern seller Continue Reading

7 Keys To Successful Post-Holiday Marketing

One of the eCommerce businesses’ biggest challenges after the holidays is how to market to customers who are marketed out? After they’ve been bombarded with sales and discounts and offers from Black Friday on, how can marketers coax them out of the post-holiday slump? Offering your customers a fresh perspective Continue Reading

Research: Disassembling Linux/Mirai.B!worm

Recently, a variant of Mirai hit a German telco, forcing 900,000 customers off the Internet. Interestingly, the intent of the malware was not to crash these routers, but to enroll them in a botnet using a malicious TR-069 message, but a coding error in the malware caused some modems to fail rather than Continue Reading

Research: A New Christmas Decorated Cerber Ransomware Has Arrived

Introduction A new unversioned Cerber has surfaced! It appears that the author(s) of Cerber is working hard to make more money during Christmas season. This latest version has relatively more changes as compared to the previous versions. The version number has now been removed from the desktop wallpapers of the Continue Reading

Reading Your Tracker's Battery Level With a Standard Bluetooth 4.0 USB Dongle

Quite strangely, there is no easy way to check the battery level of your Fitbit tracker. You can configure your profile to send you notifications when the battery is low, but that’s about all. As I was researching Bluetooth Low Energy (BLE), I noticed however that Fitbit trackers do offer the standard Battery Continue Reading

GitLab 8.14.4, 8.13.9, and 8.12.12 Released

Today we are releasing versions 8.14.4, 8.13.9, and 8.12.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important security fixes, and we strongly recommend that all affected GitLab installations be upgraded to one of these versions immediately. Please read on for more details. Security fixes in Continue Reading

Fortifying the Smart Cities

San Francisco’s muni fare system was recently hacked, and it turns out that intruders installed ransomware on the system, and demanded money to undo the hack. Some might ask why, despite being located amid a hub of the best brains in cyberspace, didn’t San Francisco muni foresee this coming? But Continue Reading

Red Hat Launches OpenShift Dedicated on Google Cloud Platform

RALEIGH, N.C. — December 8, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the general availability of OpenShift Dedicated on Google Cloud Platform. The new offering brings Red Hat’s award-winning container platform as a managed service offering to enterprise customers who Continue Reading

Research: Furtive Malware Rises Again

Shamoon Timeline The Shamoon virus, also known as Disttrack, surfaced for the first time back in 2012 targeting Middle East Oil companies. It leveraged stolen credentials to gain access, and then exhibited worm-like behavior to spread throughout the entire targeted network. All Shamoon attacks were clearly very carefully planned beforehand, Continue Reading

Q&A on Using a Real Time Sandbox to Thwart Packed Malware

There have been numerous cases recently where advanced malware has been linked to significant data breaches. Malware authors employ a variety of techniques to hide their malicious intent, including the use of packing utilities to create “packed malware.” Ladi Adefala, Senior Security Strategist at Fortinet, explains how a real time Continue Reading

Debugging war story: the mystery of NXDOMAIN

The following blog post describes a debugging adventure on Cloudflare’s Mesos-based cluster. This internal cluster is primarily used to process log file information so that Cloudflare customers have analytics, and for our systems that detect and respond to attacks. The problem encountered didn’t have any effect on our customers, but Continue Reading

GitLab Major Security Update for CVE-2016-9469

On Monday, December 5th, 2016 at 3:59pm PST (23:59 UTC), we will publish a major GitLab security update to address CVE-2016-9469, a denial-of-service and data corruption vulnerability. More details will be forthcoming on our blog, including which versions of GitLab are affected. We recommend installations running affected versions to upgrade Continue Reading

ownCloud and GÉANT offers Education Customers Special Pricing for Collabora

by ownCloud GmbH posted on Thursday, December 1st, 2016 posted in Community ownCloud, GÉANT, and Collabora have teamed up to offer our users Collabora Online with in the ownCloud service suite. Collabora Online provides educational and research institutions with a scalable, commercially supported version with long term support, signed security Continue Reading

Cerber 5.0.1 Arrives with New Multithreading Method

Introduction A new update of Cerber Ransomware, Cerber 5.0.1, has just arrived, appearing shortly after Cerber 5.0.0. had been released. Cerber 5.0.1 handles multithreading differently when it comes to encrypting files, probably aiming for better performance. It also changes the instruction file name from “README.hta” to “_README_.hta”.  The intention of Continue Reading

3 Ways Recent DDoS and Ransomware Attacks Have Put Healthcare Institutions on Alert

  • in Blog Posts
  • by
  • December 3, 2016
  • Comments Off on 3 Ways Recent DDoS and Ransomware Attacks Have Put Healthcare Institutions on Alert

Healthcare organizations understand that network uptime is a critical (if not the most critical) component to organizational success in today’s digital age. Networks allow for electronic health records (EHR) to be accessed, life-critical applications to be run, and research to be conducted. Cybercriminals also understand that all of these things Continue Reading

Digitally Advanced Traditional Enterprises Are Eight Times More Likely to Grow Share by Committing to Advanced Technologies But Still Lag Behind Digital Natives

  • in Blog Posts
  • by
  • December 2, 2016
  • Comments Off on Digitally Advanced Traditional Enterprises Are Eight Times More Likely to Grow Share by Committing to Advanced Technologies But Still Lag Behind Digital Natives

NEW YORK and RALEIGH, N.C. — December 1, 2016 — Bain & Company and Red Hat (NYSE: RHT), the world’s leading provider of open source solutions, today released the results of joint research aimed at determining how deeply enterprises are committed to digital transformation and the benefits these enterprises are Continue Reading

The Daily DDoS: Ten Days of Massive Attacks

Back in March my colleague Marek wrote about a Winter of Whopping Weekend DDoS Attacks where we were seeing 400Gbps attacks occurring mostly at the weekends. We speculated that attackers were busy with something else during the week. This winter we’ve seen a new pattern, and attackers aren’t taking the Continue Reading

Manage Your Reputation – Ensure Data Security in Financial Services

It’s widely understood across industries that a business’ most fragile and valuable asset is its reputation. This statement is especially true within the financial services industry, as individuals from around the globe trust institutions with their money and personal information on a daily basis. As a result, the protection of Continue Reading

Why PrestaShop 1.7 helps theme designers “create easier”

“It seems that perfection is attained, not when there is nothing more to add, but when there is nothing more to take away.”Antoine de Saint-Exupéry There is probably no better quote to depict how we’ve achieved one of the most important improvement of PrestaShop 1.7: its new Theme structure. In Continue Reading

[SingCERT] Advisory on Gooligan Malware

On 30 November 2016, security company Check Point reported that an Android malware, Gooligan, has affected Android phone users, compromising over a million Google accounts. Android phone users can perform a self-check at to find out if they are infected with Gooligan.

Increasing the size limit of Sitemaps file to address evolving webmaster needs

For years, the sitemaps protocol defined at stated that each sitemap file (or each sitemap index file) may contain no more than 50,000 URLs and must not be larger than 10MB (10,485,760 bytes). While most sitemaps are under this 10 MB file limit, these days, our systems occasionally encounter Continue Reading

Did You Know: Email Sticky Notes Zimlet

Welcome to Part 4 of Our Zimlet Showcase: Email Sticky Notes Zimlet For background information on Zimlets, refer to this post: Did You Know: Zimlets!For more information on Zimlets, visit How often do you have thoughts like these while reading an email or checking your calendar:– Remember to confirm Continue Reading

Not one, not two, but three undersea cables cut in Jersey

Sometime before midnight Monday (UK local time) a ship dropped its anchor and broke, not one, not two, but three undersea cables serving the island of Jersey in the English Channel. Jersey is part of the Channel Islands along with Guernsey and some smaller islands. Image courtesy TeleGeography Submarine Cable Continue Reading

Hackathon Sophia Antipolis 2016

Last Saturday evening I had the honour to chair the selection committee for a Hackathon on Security…and many connected objects. While the meaning of “security” here was very broad (it included physical security for women and for elderly people, health, computer security, etc), it was a captivating experience. The participants came Continue Reading

Prepare for the new MCSA: Windows Server 2016 certification

We’ve got great news for IT Pros who’ve been waiting for the MCSA: Windows Server 2016 certification! It will be available soon, and we have some practical instructor-led courses to help you get ready for the exams: 20740: Installation, Storage, and Compute with Windows Server 2016 This course is designed Continue Reading

Saying goodbye to Content Keywords

In the early days – back when Search Console was still called Webmaster Tools – the content keywords feature was the only way to see what Googlebot found when it crawled a website. It was useful to see that Google was able to crawl your pages at all, or if Continue Reading

WhatsApp WhatsApp us