tag:blogger.com,1999:blog-62487747733785171362024-03-06T00:02:07.670-05:00Scomage News<a href="http://www.scomage.com"><img src="http://www.scomage.com/images/bloglogo.png"></a><br><b>Technology News, Virus Warnings and General Information</b>Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.comBlogger10125tag:blogger.com,1999:blog-6248774773378517136.post-17739093737131867382015-10-29T17:20:00.003-04:002015-10-29T17:20:31.765-04:00Scomage introduces our newest service...<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD_TnUoc7PIZZuMqwN90Co5brgM2c5fl9fX5nTks_AQY1fsXJmZurEjxnveWTdUOL3qNWufHCBM1hFJReYjntpaNtM9YV1DqKdz8is4TDQow3gEhUUa6Mpwv75j3wEicmub1ByWsz4nSo/s1600/screenscapelogo.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="76" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD_TnUoc7PIZZuMqwN90Co5brgM2c5fl9fX5nTks_AQY1fsXJmZurEjxnveWTdUOL3qNWufHCBM1hFJReYjntpaNtM9YV1DqKdz8is4TDQow3gEhUUa6Mpwv75j3wEicmub1ByWsz4nSo/s320/screenscapelogo.PNG" width="320" /></a></div>
<div class="MsoNoSpacing">
<br /></div>
<div class="MsoNoSpacing">
<b><span style="color: #6895ba; font-family: "Arial Black",sans-serif; font-size: 18.0pt; mso-bidi-font-size: 11.0pt;">Digital Signage System</span></b><b><span style="font-size: 18.0pt; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQgoOEj5F7sY39JR78a2jTekp5Iwmu8gE94knP5N2-sJXexTwUzZgnU3PqQEEGawDp_sEPb8uHq1bVZNSKlm0HWG-Zi-5bOme1l1S2VMoeZBaFu8HCXDthsF60y3tGZbkmQbv0cnNNa0E/s1600/screenscape_connect.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQgoOEj5F7sY39JR78a2jTekp5Iwmu8gE94knP5N2-sJXexTwUzZgnU3PqQEEGawDp_sEPb8uHq1bVZNSKlm0HWG-Zi-5bOme1l1S2VMoeZBaFu8HCXDthsF60y3tGZbkmQbv0cnNNa0E/s320/screenscape_connect.jpg" width="320" /></a></div>
<div class="MsoNoSpacing">
<b><span style="color: #6895ba; font-family: "Arial Black",sans-serif; font-size: 18.0pt; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<br /><div class="MsoNormal" style="margin-bottom: 24.0pt; text-align: justify;">
Using the
power of the internet, turn any HDMI-compatible TV or device into a dynamic
information and advertising platform.
Simply plug in the small <b><span style="color: #6895ba;">ScreenScape Connect</span></b><span style="color: #6895ba;">
</span>device, attach to your local WiFi network and the TV will immediately
begin to display the content that you create and maintain online. Manage one screen or an entire network of
devices from your PC, Mac, laptop or tablet.</div>
<div class="MsoNormal" style="margin-bottom: 24.0pt; text-align: justify;">
<o:p></o:p></div>
<h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Plug & Play Digital Signage<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
If you’ve tried digital signage
before, you know it can be difficult and expensive. But it doesn’t have to be. <b><span style="color: #6895ba;">ScreenScape</span></b> offers a smarter way to turn any
TV into a dynamic digital sign.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
It starts with the <b><span style="color: #6895ba;">ScreenScape
Connect</span></b> device. This tiny
media player is backed by Dell and features a true plug and play design – no
brackets to mount, no screws to turn. It
draws power from most TVs and connects wirelessly to your network.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
There is no operating system to
configure and no software to download. Plug
it in, get it online and control it remotely from your <b><span style="color: #6895ba;">ScreenScape </span></b>internet account. <o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1UHAYyCnO_VJHUr7yIKKC2gowF6YWCcFECq4XwF1ND-1vEjb8igJzVTb_7SffIZC5Wo8IRuv_8udT8Umsjfv_cxFiImd_D8eqMc1ojg8KiNoQUCE6IIyrUPHXl4R9yZzGlqikXmyirJA/s1600/features_howitworks.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1UHAYyCnO_VJHUr7yIKKC2gowF6YWCcFECq4XwF1ND-1vEjb8igJzVTb_7SffIZC5Wo8IRuv_8udT8Umsjfv_cxFiImd_D8eqMc1ojg8KiNoQUCE6IIyrUPHXl4R9yZzGlqikXmyirJA/s320/features_howitworks.jpg" width="320" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Influence Buying Decisions<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
Digital signage is a proven,
effective way to engage customers and boost sales. Savvy marketers use it to influence buying
behavior where it matters most – in the storefront.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
Local digital signage informs
your customer’s buying decisions allowing you to serve them better with a wider
range of options.<o:p></o:p></div>
<h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Manage Content, Deploy Anywhere<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
All of your content is stored on
secure, cloud-based servers. This allows
you to manage one or even hundreds of screens from a single <b><span style="color: #6895ba;">ScreenScape </span></b>internet
account. <o:p></o:p></div>
<br /><div class="MsoNormal" style="text-align: justify;">
Corporate managers can create and
deploy consistent content to all screens while still allowing for local content
that is managed at the local level.<o:p></o:p></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW1lnVDtL4aksFxHuYUW4qW1UQLQWvQIPTIZA64vgvJwDkAyPyuu-5vO7Zif2KKkbMewUAhSdLZIPsxpDQYmVK97YEmOySbfuHXVqHOUeMuedYrhZyN5RXVIwWdr4zwdoXD1R_N7_Ns0k/s1600/features_publishing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW1lnVDtL4aksFxHuYUW4qW1UQLQWvQIPTIZA64vgvJwDkAyPyuu-5vO7Zif2KKkbMewUAhSdLZIPsxpDQYmVK97YEmOySbfuHXVqHOUeMuedYrhZyN5RXVIwWdr4zwdoXD1R_N7_Ns0k/s320/features_publishing.jpg" width="320" /></a></div>
<h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Simple Content Creation<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
We’ve taken the difficulty out of
digital signage so you can spend your time managing your business. You get access to industry leading content
management software and graphic design services from Cox Printers that makes
publishing easy. <o:p></o:p></div>
<h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Boost Advertising Revenue<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
In addition, to your own in-house
content and promotions, <b><span style="color: #6895ba;">ScreenScape </span></b>allows you to create a
revenue-generating advertising stream. Get paid by your vendors, distributors
or other local businesses to run their promotions on your screens. With a free content-provider account, other
business can create the content and you can manage the times and locations that the content is displayed. <o:p></o:p></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtAOoVTmzGjpJUFspiHBIEnwKmRsZyjjY4FrCttq90nxFTcfzxpf6qeirEvRpJqQFChZ6W2rSjcO3hWobDYd-_9eHmLGM23llxbrcrdkPIF9cSSuyJy50vCRi1fIrHbdTr1Q9DwZimAGA/s1600/demo_photo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtAOoVTmzGjpJUFspiHBIEnwKmRsZyjjY4FrCttq90nxFTcfzxpf6qeirEvRpJqQFChZ6W2rSjcO3hWobDYd-_9eHmLGM23llxbrcrdkPIF9cSSuyJy50vCRi1fIrHbdTr1Q9DwZimAGA/s320/demo_photo.jpg" width="320" /></a></div>
<div>
<br /></div>
<br /><h1 style="margin-bottom: 6.0pt;">
<b><span style="color: #6895ba;">Great Product, Free Perks<o:p></o:p></span></b></h1>
<div class="MsoNormal" style="text-align: justify;">
Not only is <b><span style="color: #6895ba;">ScreenScape</span></b> the quickest and
easiest digital signage system to install, but all of these services are
included:<o:p></o:p></div>
<div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]-->Free Device (with a 3-year contract)<o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]-->Free Content Management<o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]-->Unlimited Ads/Content<o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]-->Free Training<o:p></o:p></div>
<div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; font-stretch: normal;">
</span></span><!--[endif]-->Free Support<o:p></o:p></div>
<br />
<div class="MsoNormal" style="text-align: justify;">
Find out if <b><span style="color: #6895ba;">ScreenScape</span></b> is right for
you. Call us today for a no obligation
demo at: <b><span style="color: #6895ba;">844-726-6243</span></b><o:p></o:p></div>
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-90299557430970794752015-07-28T16:14:00.002-04:002015-07-28T16:14:44.020-04:00Be Mindful of Which E-mails You Open<br />
Dyre -- a dangerous financial trojan -- has been infecting thousands of banking customers worldwide. The virus is hidden in an e-mail usually disguised as business documents, voicemail or fax messages. Recipients are invited to click on an attachment which directs the user to a malicious website and downloads the virus. <br /><br />The attacks began one year ago and have been continuing to grow in numbers. Symantec Security Response posted a graph this past June showing the numbers of virus detentions over time.<div style="margin: 0in 0in 10pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDvaS7pDUdo7yOk2Ii7iR-r4eCm40UEEDao06KM-ecV7qSEoz0se_270q6kh5okj-mrSIJmiueQ3F4pWaR2_6YlOaFYTqHakZ7FDf0X3dSuZZA9Y17mfsZGFQdPdvDjAZoHqArEmbdWUU/s1600/Fig1_24.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDvaS7pDUdo7yOk2Ii7iR-r4eCm40UEEDao06KM-ecV7qSEoz0se_270q6kh5okj-mrSIJmiueQ3F4pWaR2_6YlOaFYTqHakZ7FDf0X3dSuZZA9Y17mfsZGFQdPdvDjAZoHqArEmbdWUU/s400/Fig1_24.png" width="400" /></a></div>
<span style="font-family: Calibri;"><span id="goog_512283902"></span><span id="goog_512283903"><br /></span></span></div>
The most dangerous aspect of this virus is its ability to steal credentials not only from the banking company, but from any site a victim visits. According to Symantec.com, "<i>Dyre is capable of using several different types of man-in-the-browser (MITB) attacks against the victim’s web browser to steal credentials.</i>" <div>
<br /></div>
<div>
One attack redirects the victim to a fake website that looks similar to its genuine counterpart. This fake website will harvest the victim’s credentials before redirecting back to the genuine website. Another attack allows Dyre to alter the way legitimate websites are displayed in the browser window by adding malicious code to it to steal the victim’s login credentials. In some scenarios, Dyre may also display an additional fake page informing the victim that their computer has not been recognized and that additional credentials need to be provided to verify their identity, such as their date of birth, PIN code, and credit card details.<br /><br />Scomage encourages all our clients and their families to be careful when it comes to e-mail. Stay educated and never open an attachment from an unfamiliar e-mail address. <br /><br /><div style="margin: 0in 0in 10pt;">
<div class="separator" style="clear: both;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxTkQY-TAbJizzkFf0NFQFW2WuoV_Uhuz_Fcz9NRKECPBPK9W2XWgpjjICSbvs7Zccddaa8snEGPEoWJqNp3NUU4tiKJXfygas0Nr7gC0YQtJvWyvYaT4AKUrjKEhpOLGgl1bVGfEkLNY/s1600/dyre-infographic.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxTkQY-TAbJizzkFf0NFQFW2WuoV_Uhuz_Fcz9NRKECPBPK9W2XWgpjjICSbvs7Zccddaa8snEGPEoWJqNp3NUU4tiKJXfygas0Nr7gC0YQtJvWyvYaT4AKUrjKEhpOLGgl1bVGfEkLNY/s1600/dyre-infographic.jpg" /></a></div>
<span style="font-family: Calibri;"><br /></span></div>
<span style="font-family: Calibri;">
</span></div>
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-26132284802946578612015-07-21T13:27:00.002-04:002015-07-21T13:27:36.070-04:00Office Macros are Back<br />
Microsoft Office macros are back as reliable way to spread viruses and malware. This works by inserting a malicious macro into an otherwise normal looking document. This could be a Word document, Excel spreadsheet or PowerPoint presentation.<br />
<br />
Take a look at the email we received the other day. I'm sure Bedoes is a fine Georgia restaurant, but they are not immune from hacking and viruses. Neither are any of your typical vendors, so just assume this came from someone you do business with on a regular basis.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5OcvM24J_2QBDystIG7UCxloabMIO0gVzQncZFwOJe2GuNZw8MR6cFrOfspD8MFVp08zJ8yGWVlF-WRO13z3-aJH0Dy-B2yY1NnDlavOjJcytM1Sj8HfIlUPomF8pmv8oySNyavkL_eY/s1600/Macro-spam1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5OcvM24J_2QBDystIG7UCxloabMIO0gVzQncZFwOJe2GuNZw8MR6cFrOfspD8MFVp08zJ8yGWVlF-WRO13z3-aJH0Dy-B2yY1NnDlavOjJcytM1Sj8HfIlUPomF8pmv8oySNyavkL_eY/s1600/Macro-spam1.png" /></a></div>
<br />
The attached spreadsheet looks innocent enough and even pertains to the subject of the message. If you try to open it with a modern version of Excel (Office 2010 of later), you will receive a warning about the macro, but it does not prevent you from running it. If you have certain versions of Office or clones (Open Office, Libre Office, etc), you may not get a warning at all and could be immediately infected.<br />
<div>
<br /></div>
<div>
If you receive an attachment of any type--even from someone you know-- be very, very cautious about opening it. If unsure, it is always best to call the sender to confirm. </div>
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-38987287507926199232015-06-19T10:17:00.000-04:002015-06-19T10:17:10.985-04:00Adobe Flash Prior to 18.0 May Lead to Ransomeware<b>Warning: a new <a href="http://news.scomage.com/2015/04/common-virus-definitions.html">exploit</a> was just released for the recent Adobe Flash <a href="http://news.scomage.com/2015/04/common-virus-definitions.html">vulnerability</a>.</b><br />
<br />
Adobe may have already patched a Flash Player vulnerability last week, but several users—especially those in the US, Canada, and the UK —are still currently exposed and are at risk of getting infected with CryptoWall 3.0. The Magnitude Exploit Kit included an exploit for the Flash vulnerability, allowing attackers to spread crypto-ransomware into their target systems.<br />
<br />
The fix for the vulnerability was just released on June 9th. The exploit appeared June 15th.<br />
<br />
This particular vulnerability, identified as CVE-2015-3105, was fixed as part of Adobe’s <a href="https://helpx.adobe.com/security/products/flash-player/apsb15-11.html">regular June Update</a> for Adobe Flash Player which upgraded the software to version 18.0.0.160. However, many users are still running the previous version (17.0.0.188), which means that a lot of users are still at risk.<br />
<br />
As of this week, these are the top 5 countries most affected by this threat:<br />
<ol>
<li>United States</li>
<li>Canada</li>
<li>UK</li>
<li>Germany</li>
<li>France</li>
</ol>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy7Ns-ldhNOhLTqcwYuTMsHM7-3cA5PrOtYJmJXwPuXWFk-vbZG0To1vnOH7GimY_j3rIDH20RrD_iPMgJrl6reBB1jZGre6-6aMF49E1hU1QyUZSLvYFCaLs3W689CHO9xvlpsM-oX38/s1600/Adobe-Up.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy7Ns-ldhNOhLTqcwYuTMsHM7-3cA5PrOtYJmJXwPuXWFk-vbZG0To1vnOH7GimY_j3rIDH20RrD_iPMgJrl6reBB1jZGre6-6aMF49E1hU1QyUZSLvYFCaLs3W689CHO9xvlpsM-oX38/s640/Adobe-Up.jpg" width="640" /></a></div>
<br />
<strong>Ongoing Exploit Problem</strong><br />
<br />
This is another example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits. We saw a similar incident in March, where exploits for an Adobe Flash Player vulnerability were added to the Nuclear Exploit Kit just a week after the patch was released. We also noted earlier this month that <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/exploit-kits-and-malvertising-a-troublesome-combination/">Flash Player was being targeted more frequently by exploit kits</a>, and that shows no sign of changing soon.<br />
<br />
Widely-used exploit kits such as Magnitude are often well-maintained with new vulnerabilities. Our research on these tools reveals that Magnitude is one of the most used exploit kits by cybercriminals along with SweetOrange and Angler.<br />
<br />
CryptoWall is also another notable threat in and of itself. We initially <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/social-engineering-watch-upatre-malware-abuses-dropbox-links/">saw CryptoWall last year spreading through spam</a>, and again later this year <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/cryptowall-3-0-ransomware-partners-with-fareit-spyware/">partnering with information stealing malware FAREIT</a>.<br />
<div align="center">
<br /></div>
<div>
<br />
For a more technical details, see the original Trend Micro blog:<br />
<span class="post_h2_a"><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/magnitude-exploit-kit-uses-newly-patched-adobe-vulnerability-us-canada-and-uk-are-most-at-risk/" rel="bookmark" title="Trend Micro Blog">Magnitude Exploit Kit Uses Newly Patched Adobe Vulnerability - US Most At Risk</a></span><br />
<br />
<div style="text-align: center;">
<a href="http://blog.trendmicro.com/trendlabs-security-intelligence/magnitude-exploit-kit-uses-newly-patched-adobe-vulnerability-us-canada-and-uk-are-most-at-risk/" style="text-align: center;" target="_blank"><img alt="Trend Micro Blog" border="0" height="43" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-4_vUGx7wQnk3MWYfFBQRgUaVjM2NS6bEYj0I8br1yiGftgRbtsiOiWwtYmtmPvzlu0uVsyorC4wRV-WuKi5QXMxnBjhPoa_KPescfhfG7Y_Rocq84ij1Gq-rAKnzykMJd_yxalXn40A/s1600/TrendLabs.png" title="Trend Micro Blog" width="200" /></a></div>
</div>
<div>
<br /></div>
<div>
<br /></div>
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-32800762698385813112015-05-04T10:22:00.002-04:002015-05-07T07:17:12.481-04:00Acumatica Presents<style media="screen" type="text/css">
<!--
.silver-box
{
display: table;
max-width: 830px;
xheight: 50px;
xborder: 3px inset #black;
background-color: rgb(236,236,236);
position: relative;
margin: 10px 0px 10px 0px;
padding: 15px 25px 15px 25px;
-moz-border-radius: 8px; /* Firefox */
-webkit-border-radius: 8px; /* Safari and chrome */
-khtml-border-radius: 8px; /* Linux browsers */
border-radius: 8px; /* CSS3 */
behavior: url(/pie.htc); /* IE8 */
zoom: 1; /* IE8 */
}
.blue-box
{
display: table;
max-width: 800px;
xborder: 2px solid #CCCCCC;
background-color: darkblue;
color: white;
opacity: 1;
position: relative;
margin: 10px 0px 10px 0px;
padding: 20px 10px 20px 40px;
-moz-border-radius: 8px; /* Firefox */
-webkit-border-radius: 8px; /* Safari and chrome */
-khtml-border-radius: 8px; /* Linux browsers */
border-radius: 8px; /* CSS3 */
behavior: url(/pie.htc); /* IE8 */
zoom: 1; /* IE8 */
}
-->
</style>
<br />
<div>
<a href="http://www.eventbrite.com/e/connected-world-connected-business-nyc-presented-by-acumatica-inc-tickets-16385392149" target="_blank"><img border="0" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbSNZ0fNel86sY-l11Ya7de9Ay6SNIqDrxCRNsvhUx6S0Irr6JhPOoatObu0Y3xB2qiq8M-M7Khkm1mUA0Pg2Cm_lRmjzBqXDdlFby3WRtaZMO-jsY8eM3K3dni-rvmMiylEafwkye5VI/s640/connected_world_marriott.png" width="640" /></a>
<br />
<br />
Many of today's businesses are more connected than ever before with new technologies such as cloud computing and the growing functionality of mobile devices driving a whole new level of expectations - from your customers, your business partners and your employees.<br />
<br />
Whether its how you engage from a customer service perspective, how you enable your employee's productivity or even how you engage with the next generation of customers and employees, small and midsize businesses like yours can take advantage of these technologies to <strong>drive profitable growth</strong> and carve out a <strong>competitive edge</strong> in your market. <br />
<br />
<b>Acumatica and Scomage can show you how!</b><br />
<br />
<div class="silver-box">
<b>Join us at the Connected World - Connected Business event where you'll learn: </b><br />
<br />
<ul>
<li>How you can utilize Cloud ERP to unlock your business potential and drive profitable growth.</li>
<li>How businesses like yours are doing this today.</li>
<li>How your business can accelerate past your competitors using cost effective cloud technology as an enabler.</li>
<li>How Acumatica's Cloud ERP enables you to take control of your business, play to your strengths and empower your people.</li>
</ul>
</div>
<div style="margin-left: 80px;">
<table style="padding: 20px; xborder: 1px solid silver;"><tbody>
<tr><td><table>
<tbody>
<tr>
<td align="center" colspan="3"><b>Connected World - Connected Business Agenda </b>
<br />
Friday, May 15, 2015
<br />
</td></tr>
<tr>
<td>9:30am - 10:000am</td><td width="10"></td><td>Welcome and Hot Breakfast</td>
</tr>
<tr>
<td>10:00 – 11:30am</td><td></td><td>Acumatica Overview and Live Demos</td>
</tr>
<tr>
<td>11:30 – 11:45am</td><td></td><td>Power BI Demo</td>
</tr>
<tr>
<td>11:30 – 12:15am</td><td></td><td>Open Q&A with Acumatica Executives and Customers</td>
</tr>
<tr>
<td>12:15 – 1:00pm</td><td></td><td>Open Q&A with ISV Community</td>
</tr>
<tr>
<td colspan=3 align=center><i>Business Casual</i></td>
</tr>
</tbody></table>
</td></tr>
</tbody></table>
</div>
<div class="blue-box">
<div style="color: darkblue; width: 780px;">
</div>
<u>Questions about the Event or Product Pricing and Information?</u><br />
For more information contact the Acumatica team <br />
1-888-228-8300 events@acumatica.com<br />
<a class="sky" href="http://www.acumatica.com/connectedworld">www.acumatica.com/connectedworld</a>
<br />
<div style="color: darkblue; width: 780px;">
</div>
</div>
<iframe frameborder="0" height="400" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d1511.1500908785638!2d-73.97269200000002!3d40.755422!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x89c258fd178d5bed%3A0x25efc1f5e73c3396!2sNew+York+Marriott+East+Side!5e0!3m2!1sen!2sus!4v1430748001110" style="border: 0;" width="830"></iframe>
<table cellspacing="30" style="background-color: #ececec; width: 830px;"><tbody>
<tr>
<td>Acumatica Inc. <br />
4030 Lake Washington Blvd NE Suite 100<br />
Kirkland, WA 98033<br />
www.acumatica.com
</td>
<td>Scomage Information Services<br />
6 Kevin Road, Suite 301<br />
Scotch Plains, NJ 070763<br />
www.scomage.com
</td>
</tr>
</tbody></table>
</div>Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-40238998028366922082015-04-30T17:31:00.003-04:002015-04-30T17:31:34.425-04:00Watch out for fake ACH, Dropbox and Microsoft Word documentsA recent outbreak spreading by email is targeting users of common office documents. The malware called BARTALEX uses a Microsoft Word document and social engineering lure that is widely recognized by enterprises—making infection all too possible. This attack highlights how macro malware in Microsoft Office files is fast becoming a big threat to businesses and organizations.<br />
<br />
In this attack, some messages all related to Automated Clearing House (ACH) fraud. ACH is a network used for electronic fund transfers in the United States; as a result it is frequently used by businesses that need to transact with other companies on a regular basis.<br />
<br />
<div align="center">
<img alt="" src="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/04/bartalex_mail_sample.jpg" /></div>
<div style="text-align: center;">
<em>Figure 1. Sample spammed email that leads to W2KM_BARTALEX.SMA</em></div>
<br />
<br />
ACH fraud is a typical cybercriminal hook seen in spammed emails, but instead of attachments, these email messages contain a Dropbox link. The URL leads to a Dropbox page that contains a specific and pretty convincing Microsoft Office warning that instructs users to enable the macros.<br />
<br />
<div align="center">
<a class="fancybox" href="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/04/bartalex_dropbox1.jpg" rel="fancybox" target="_blank" title=""><img alt="" src="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/04/bartalex_dropbox1_thumb.jpg" /></a></div>
<div style="text-align: center;">
<em>Figure 2. A Dropbox page contains the malicious macro (click to enlarge)</em></div>
<br />
<br />
Upon enabling the macro, the malicious document then triggers the download of the banking malware TSPY_DYRE.YUYCC. This malware targets banks and financial institutions in the United States, among which are JP Morgan, U.S. Bank, California Bank & Trust, Texas Capital Bank, etc. Based on feedback from the Smart Protection Network, the United States is the top country affected by BARTALEX, followed by Canada and Australia.<br />
<br />
Additionally we noticed that this attack used an old Microsoft Office 2010 logo. Given that many enterprises do not immediately upgrade to the latest Office versions, it is possible that users within enterprise organizations may fall victim to this technique.<br />
<br />
<div align="center">
<img alt="" src="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/04/bartalex_infectioncounts-2.jpg" /></div>
<div style="text-align: center;">
<em>Figure 3. W2KM_BARTALEX infection count over the last three months</em></div>
<br />
<br />
<div>
<br />
For a more technical details, see the original Trend Micro blog: <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/enterprises-hit-by-bartalex-macro-malware-in-recent-spam-outbreak/" style="text-align: center;" target="_blank"><img alt=" Trend Micro Blog" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-4_vUGx7wQnk3MWYfFBQRgUaVjM2NS6bEYj0I8br1yiGftgRbtsiOiWwtYmtmPvzlu0uVsyorC4wRV-WuKi5QXMxnBjhPoa_KPescfhfG7Y_Rocq84ij1Gq-rAKnzykMJd_yxalXn40A/s1600/TrendLabs.png" height="43" title="Trend Micro Blog" width="200" /></a><br />
<a href="http://blog.trendmicro.com/trendlabs-security-intelligence/enterprises-hit-by-bartalex-macro-malware-in-recent-spam-outbreak/" rel="bookmark" title="Permanent Link: Enterprises Hit by BARTALEX Macro Malware in Recent Spam Outbreak"><span class="post_h2_a">Enterprises Hit by BARTALEX Macro Malware in Recent Spam Outbreak</span></a></div>
<div>
<br /></div>
<div>
<br /></div>
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-54384838910826773472015-04-28T14:25:00.000-04:002015-04-28T14:40:25.264-04:00Ransomware 101: What, How & Why<a href="http://www.trendmicro.com/vinfo/resources/images/tex/infographics/ransomware-101.jpg" imageanchor="1"><img border="0" src="http://www.trendmicro.com/vinfo/resources/images/tex/infographics/ransomware-101.jpg" /></a>
<br />
<h2>
<span style="font-family: Verdana, sans-serif; font-size: large;">Need help protecting your systems? Give us a call at 844-SCO-MAGE</span></h2>
<hr style="color: #ffffcc;" />
Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-75807264403958239402015-04-27T12:31:00.002-04:002015-04-27T12:31:24.533-04:00Common Virus Definitions<dl>
<dt><b>Add-On</b></dt>
<dd>Software that adds additional benefits or features to an existing program.
For example, adding a particular search engine interface to your browser.
</dd>
<dt><b>Adware</b></dt>
<dd>A type of <b>malware</b> that bombards the user with advertisements. This may include pop-up or in-browser ads.
</dd>
<dt><b>Drive By</b> (<i>drive by exploit, drive by vulnerability</i>)</dt>
<dd>An <b>exploit</b> or <b>malware</b> that can infect the users system without any interaction from the user.
The user is not required to "click" anywhere, open anything, or respond to any dialogue box.
</dd>
<dt><b>Exploit</b></dt>
<dd>Any trick or combination of actions that can take advantage of a <b>vulnerability</b> to install some type of <b>malware</b>.
</dd>
<dt><b>Malware</b></dt>
<dd>Any collection of programs and/or configuration changes that alters the operation of the users system in a negative way.
Includes: viruses, worms, PUPs, and others.
</dd>
<dt><b>Potentially Unwanted Program (PUP)</b></dt>
<dd>A type of <b>malware</b> that alters the operation of the user's system, but also provides a useful feature.
Some users are willing to live with the negative aspects of the program in order to gain the benefits.
Typically, PUPs are distributed as "free" games, shopping incentives (sales, coupons), or web browsing enhancements.
</dd>
<dt><b>Ransomware</b></dt>
<dd>A type of <b>malware</b> encrypts or locks the user's system or data (files, pictures, other important info).
Typically, the user is presented with an option to pay a ransom of about $500 to regain access.
</dd>
<dt><b>Virus</b></dt>
<dd>A type of <b>malware</b> that alters the operation of the users system for evil.
</dd>
<dt><b>Vulnerability</b> (bug, flaw)</dt>
<dd>A previously undetected problem with your operating system or installed software that exposes a weakness that can
be exploited by a <b>malware</b> author.
</dd>
<dt><b>Zero Day</b> (<i>zero day exploit</i>)</dt>
<dd>A vulnerability so new that a fix has not been discovered.
The term is used most often to refer to specific <b>malware</b> that already exploits the new vulnerability and was named because the
developers had "zero" days to find and fix the problem.
</dd>
</dl>Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com0tag:blogger.com,1999:blog-6248774773378517136.post-77628529146993398312014-10-08T18:08:00.003-04:002014-10-09T08:31:34.217-04:00New Web Email ClientOn Saturday October, 11 we will be replacing our current web-based email client with a new version. If you use Outlook, Thunderbird or similar programs to read and send your email, this change will not affect you.<br />
<div>
<br /></div>
<div>
However, if you use our web client (<a href="https://webmail.scomage.com/webmail/" target="_blank">https://webmail.scomage.com/webmail</a>) for your email, you will notice significant changes beginning at the login page below:<br />
<br /></div>
<table border="0" cellpadding="0" cellspacing="8" class="tr-caption-container"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWVvizcl_UAqsEGY4M36m8rPDp9rzsjRoNjeB-XsYla6t6-9Cj3SqYda01vdSASHe65J9xJkMsHp87o-uIsdG_zjMRdiuNClEmqVZGrr4cfBNmSHApDJ3jDhYG71AVkjGRpejrmzuarVM/s1600/Icewarp+v10+Login.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWVvizcl_UAqsEGY4M36m8rPDp9rzsjRoNjeB-XsYla6t6-9Cj3SqYda01vdSASHe65J9xJkMsHp87o-uIsdG_zjMRdiuNClEmqVZGrr4cfBNmSHApDJ3jDhYG71AVkjGRpejrmzuarVM/s1600/Icewarp+v10+Login.png" height="167" width="240" /></a></td>
<td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu7O4dEGQGfzhi3wlIYfXTrOesJ_1qZJTRl0masTGRuUzHOW50V-fb75pp1z1bM2b9dStfdcUZ1gCJX7C03E3m0Rngsfe8teGwkhmYR-qstrX1wL-JNoG7ZIoGO7qa_B-D0Kra8TxWcYE/s1600/Icewarp+v11+Login.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu7O4dEGQGfzhi3wlIYfXTrOesJ_1qZJTRl0masTGRuUzHOW50V-fb75pp1z1bM2b9dStfdcUZ1gCJX7C03E3m0Rngsfe8teGwkhmYR-qstrX1wL-JNoG7ZIoGO7qa_B-D0Kra8TxWcYE/s1600/Icewarp+v11+Login.png" height="167" width="240" /></a></td>
</tr>
<tr><td class="tr-caption" style="text-align: center;">Current Webmail Login</td>
<td class="tr-caption" style="text-align: center;">New Webmail Login</td></tr>
</tbody></table>
<br />
The basic features remain the same, but the look and feel are very different. This new version has been optimized for touchscreens and has a more modern look. For example (below), the main inbox page has much more whitespace (to make it easier when using a finger) and all of the right-click actions have been replaced with buttons.<br />
<br />
<table border="0" cellpadding="0" cellspacing="8" class="tr-caption-container"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih-Qwd80Bzv4KOBazM4-dxAA3RkY5aziKrJPURpgCgQ-FftnINk6YVcHeL4BMDgb16mNsFnaYDj3AVqa1kWLkif4sEpAJujcBbOjhQKoGaCcxq4Myvr1FK_u1L8iZWuElLwFUc7gHx1Y4/s1600/Icewarp+v10+Inbox.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih-Qwd80Bzv4KOBazM4-dxAA3RkY5aziKrJPURpgCgQ-FftnINk6YVcHeL4BMDgb16mNsFnaYDj3AVqa1kWLkif4sEpAJujcBbOjhQKoGaCcxq4Myvr1FK_u1L8iZWuElLwFUc7gHx1Y4/s1600/Icewarp+v10+Inbox.png" height="167" width="240" /></a></td>
<td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYkUxyY0JAODC4Ci1j7_PA0s6GsYI29ngnY7XhJarZN4-7_53e-bn-ZfIvfJeM-LMx3M6vSg-7BpncWeQQTeLX8JAIMqbuQ4OU6aRds_wed_a5uza2vStyN2VCHfC0OrANQhIgEYBISew/s1600/Icewarp+v11+Inbox.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYkUxyY0JAODC4Ci1j7_PA0s6GsYI29ngnY7XhJarZN4-7_53e-bn-ZfIvfJeM-LMx3M6vSg-7BpncWeQQTeLX8JAIMqbuQ4OU6aRds_wed_a5uza2vStyN2VCHfC0OrANQhIgEYBISew/s1600/Icewarp+v11+Inbox.png" height="167" width="240" /></a></td>
</tr>
<tr><td class="tr-caption" style="text-align: center;">Current Inbox</td>
<td class="tr-caption" style="text-align: center;">New Inbox</td></tr>
</tbody></table>
<br />
Notice that the small Microsoft-style icons to select Contacts and Calendar have been replaced with a row of large icons on the left edge that select all types of records. Also, the tiny Logout button has disappeared. To logout, change preferences or update your profile, click on your picture (or the generic picture) where the logout button used to be.<br />
<br />
If the new version seems too confusing, don't worry. You can switch back and forth between the new and old versions. Click on your picture (or the generic picture) and select Switch to Old Interface.<br />
<br />
For a quick video tour:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='480' height='399' src='https://www.youtube.com/embed/3wwSkRzgKlI?feature=player_embedded' frameborder='0'></iframe></div>
<br />
<br />
For complete documentation: <a href="http://dl.icewarp.com/documentation/client/webclient/V%2011%20IceWarp%20WebClient%20User%20Guide.pdf" target="_blank">The Icewarp WebClient Guide</a><br />
<br />
All of our hosting plans include free phone support, so if you need help navigating the new interface, please don't hesitate to call us at: 908-458-9200.<br />
<br />Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.comtag:blogger.com,1999:blog-6248774773378517136.post-32284231167132921222014-10-08T09:42:00.000-04:002014-10-08T09:42:14.476-04:00Android Browser Privacy FlawA vulnerability in the default browser app on all Android devices may expose private data from one website to another. This could allow an attack in one browser window to steal sensitive and private information from another window.<br />
<br />
The flaw, known as CVE-2014-6041, affects about 75 percent of Android systems and nearly 100 percent of the low-end prepaid phones (according to researchers at Rapid7's Metasploit research team.) The vulnerability is only present in the default browser app on Android versions prior to 4.4 (KitKat). In Android, 4.4 and later, Google replaced the default browser with Chrome.<br />
<br />
You can test your device for free on our website at: <a href="http://www.scomage.com/AndroidTest.asp" target="_blank">http://www.scomage.com/AndroidTest.asp</a>.<br />
<br />
Chrome and other third-party browsers do not seem to have the flaw. However, some standard and third-party applications use the same code as the default browser and may be susceptible as well.<br />
<br />
Google no longer supports the default Android browser and older phones are not likely to have support from their provider, so it appears that users of older versions are apparently out of luck. The only helpful recommendation is to stop using the default browser. Chrome and other major browsers are suitable replacements.<br />
<br />
If you have questions or additional concerns, please call our office at 908-458-9200.<br />
<br />Scomagehttp://www.blogger.com/profile/01761035143505334614noreply@blogger.com