Custom Thin Client

We can custom configure your thin client to connect remotely to any environment. We can customize your thin client to connect to multiple remoting protocols such as MS Remote Desktop, Citrix or VMware.

We can design a custom thin-client to meet your specific needs. We can customize thin-clients to various VESA mount configurations so our thin-clients can be seamlessly integrated into monitors or TV's. We can customize our thin-clients with integrated keyboard, mouse and displays for an all in thin-client solution. We can also customize the operating system for your thin-client

Zombie computer viruses that refuse to die

There are many old viruses that are still around and roam the internet continuing infecting computers world wide. They are referred to by security experts as Zombies, since no one can kill them off completely. The most prolific type of Zombie viruses are the worms. Most worms are self-replicating and spread themselves to other victims after cloning themselves. ...

iOS Malware SourMint Deployed Through Popular Advertising SDK Infects Over 1200 iOS Apps

Security researchers at Snyk discovered malware in a popular Advertising SDK used by over 1,200 apps in the AppStore which could represent over 300 Million downloads per month. The code was found in the iOS version of the SDK from mobile ad platform provider, Mintegral and is called SourMint. The code can spy on user activity by logging URL-based requests made through the app. The SDK also fraudulently reports user clicks on ads, stealing ad revenue from competing ad networks. ...

AWS Malware Harvests Credentials and Installs Cryptominers

Another cryptomining worm has plagued Amazon Web Services (AWS) cloud infrastructure. Security experts have warned that the worm from a group called TeamTNT has a number of nefarius side effects. Primary focus is mining cryptocurrencies on hosts that it takes over, but it also includes stealing server and user credentials to exploit them further. The worm used a number of known malware and security decryption schemes such as punk.py, log-cleaning and Diamorphine rootkit. ...

Google Removes Multiple Malicious Apps From Its Play Store

Google has deleted another batch of malicious apps from its Play marketplace. Malware called Joker (a.k.a Bread) has been infiltrating multiple mobile apps on Android devices. Apps which range from productivity software to, text messaging to emoji wallpaper, accounted for over 200,000 user installs. ...