Custom Thin Client

We can custom configure your thin client to connect remotely to any environment. We can customize your thin client to connect to multiple remoting protocols such as MS Remote Desktop, Citrix or VMware.

We can design a custom thin-client to meet your specific needs. We can customize thin-clients to various VESA mount configurations so our thin-clients can be seamlessly integrated into monitors or TV's. We can customize our thin-clients with integrated keyboard, mouse and displays for an all in thin-client solution. We can also customize the operating system for your thin-client

Critical Windows Zero-Day Flaw Warning

The flaw exists because the Windows version of Adobe Type Manager Library improperly handles a specially-crafted multi-master font (called the Adobe Type 1 PostScript format). Type 1 vector outline fonts are a specialized form of PostScript, which contain instructions for building outlines from scaleable lines and curves ...

Apple Fixes Critical WebKit Flaws in iOS, Safari

The most severe of the vulnerabilities is a type confusion bug, CVE-2020-3897, in WebKit. Type confusion flaws are caused because a piece of code doesn't verify the type of object that is passed to it, and uses it blindly without type checking. The flaw could be abused by a remote hacker but user interaction is required to exploit the vulnerability. The vulnerability allows remote hackers to execute arbitrary code on affected installations of Apple Safari ...

APT36 uses Coronavirus to Spread Crimson RAT

Previous APT36 campaigns mainly relied on spear phishing and watering hole attacks to gain its foothold on victims. This most recent phishing email attaches a malicious macro document that targets vulnerabilities in RTF files. This is a high-severity Microsoft vulnerability, which allows hackers to execute Visual Basic script when a user opens a malicious Microsoft Office RTF document. ...

Corona virus Themed Attack Spreads Malware

After the victim opens the specially crafted RTF document, and the Microsoft Word vulnerability is exploited, a malicious file,intel.wll, is dropped into the Microsoft Word startup folder ( %APPDATA%MicrosoftWordSTARTUP ). This serves to persist the malware and prevents the infection from fully activating if run inside a sandbox since a relaunch of Microsoft Word is required for the full execution of the malware. The file, intel.wll, then downloads a DLL file, which serves as the loader for th ...