Pro Thin Client

Overview

CielView Pro remote desktop thin client with multiple monitor capability. CielView Pro ThinClient was designed to give you the flexibility to use more peripherals while giving you access to your custom CielView Desktop. The CielView Pro ThinClient supports 2 monitors at full HD resolution. The Pro ThinClient supports 2 additional USB devices including security dongles. The Pro ThinClient provides you with the performance you need with the flexibility to attach other peripherals as you need them.

Specifications

Dimensions 7.9" X 1.8" X 7.1"
Weight 5.8 lbs
Video DVI
Resolution Full HD 1080P
Ports USB
Network 10/100, WiFi
Audio 16 bit stereo
Power 17.2 Watts

Flexibility and Security

The Pro ThinClient gives you the flexibility to connect external devices to your custom CielView Desktop. It is powerful enough to use dual monitors at full HD quality with stereo sound. The Pro ThinClient give you the ability to run programs that require security dongles on your custom CielView Desktop. The Pro ThinClient has no moving parts and runs so cool that a fan isn't needed. There is no need to worry if the Pro is lost or stolen because all your data is stored on CielView, there is no security risk at all. The Pro ThinClient can also be used as an interactive kiosk without worrying about security issues.

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

UEFI Bootkit Targeting Organizations

A Chinese hacking group used a rare UEFI bootkit called MosaicRegressor to target organizations and diplomatic missions for two years according to Kaspersky. UEFI initiates the boot sequence in a PC and loads the device's operating system. By exploiting this feature, the MosaicRegressor framework takes over the booting process. The group modified the firmware in order to deploy malicious code that will be run after the operating system is loaded. Since the firmware is typically shipped wi ...

CISA Issues Alert After Observing Surge in LokiBot Activity

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued an alert after observing a surge in LokiBot activity over the past two months. LokiBot first appeared in 2015 and is used to steal credentials and other sensitive data from victim's machines. The malware targets Windows and Android operating systems and uses a keylogger to steal usernames and passwords and monitors browser and desktop activity. LokiBot can steal credentials from multiple applicatio ...

Alien Trojan Bypasses Two Factor Authentication

A trojan that targets banking apps have been found in Android devices. The trojan is called Alien. Alien bypasses two-factor authentication or 2FA, to steal credentials. Alien targets more than 200 mobile apps, including Bank of America and Microsoft Outlook. The malware has been used to actively target institutions worldwide, including France, Germany, Italy, Spain, and the United States. Researchers think Alien is a copy clone of Cerberus banking malware. ...