Custom Thin Client

We can custom configure your thin client to connect remotely to any environment. We can customize your thin client to connect to multiple remoting protocols such as MS Remote Desktop, Citrix or VMware.

We can design a custom thin-client to meet your specific needs. We can customize thin-clients to various VESA mount configurations so our thin-clients can be seamlessly integrated into monitors or TV's. We can customize our thin-clients with integrated keyboard, mouse and displays for an all in thin-client solution. We can also customize the operating system for your thin-client

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

UEFI Bootkit Targeting Organizations

A Chinese hacking group used a rare UEFI bootkit called MosaicRegressor to target organizations and diplomatic missions for two years according to Kaspersky. UEFI initiates the boot sequence in a PC and loads the device's operating system. By exploiting this feature, the MosaicRegressor framework takes over the booting process. The group modified the firmware in order to deploy malicious code that will be run after the operating system is loaded. Since the firmware is typically shipped wi ...

CISA Issues Alert After Observing Surge in LokiBot Activity

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued an alert after observing a surge in LokiBot activity over the past two months. LokiBot first appeared in 2015 and is used to steal credentials and other sensitive data from victim's machines. The malware targets Windows and Android operating systems and uses a keylogger to steal usernames and passwords and monitors browser and desktop activity. LokiBot can steal credentials from multiple applicatio ...

Alien Trojan Bypasses Two Factor Authentication

A trojan that targets banking apps have been found in Android devices. The trojan is called Alien. Alien bypasses two-factor authentication or 2FA, to steal credentials. Alien targets more than 200 mobile apps, including Bank of America and Microsoft Outlook. The malware has been used to actively target institutions worldwide, including France, Germany, Italy, Spain, and the United States. Researchers think Alien is a copy clone of Cerberus banking malware. ...