Ultra Thin Client

Overview

CielView Ultra ThinClient was designed with power and flexibility in mind. The Ultra ThinClient can connect up to 8 monitors when connecting to your custom CielView Desktop. The Ulta ThinClient supports unlimited USB devices including security dongles. The Ultra ThinClient provides the ultimate power and flexibility when connecting to your custom CielView Desktop.

Specifications

Dimensions 12.1" X 8.9" X 3.2"
Weight 12 lbs
Video DVI
Resolution Full HD 1080P
Ports USB
Network 10/100, WiFi
Audio 16 bit stereo
Power 14.2 Watts

Flexibility and Security

The Utlra ThinClient gives you the flexibility to connect external devices to your custom CielView Desktop. It is powerful enough to use up to 8 monitors at full HD quality with stereo sound. The Ultra ThinClient give you the ability to run programs that require security dongles on your custom CielView Desktop. The Ultra ThinClient has no moving parts and runs so cool that a fan isn't needed. There is no need to worry if the Ultra is lost or stolen because all your data is stored on CielView, there is no security risk at all.

The Ultra ThinClient can also be used as an interactive kiosk without worrying about security issues.

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

UEFI Bootkit Targeting Organizations

A Chinese hacking group used a rare UEFI bootkit called MosaicRegressor to target organizations and diplomatic missions for two years according to Kaspersky. UEFI initiates the boot sequence in a PC and loads the device's operating system. By exploiting this feature, the MosaicRegressor framework takes over the booting process. The group modified the firmware in order to deploy malicious code that will be run after the operating system is loaded. Since the firmware is typically shipped wi ...

CISA Issues Alert After Observing Surge in LokiBot Activity

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued an alert after observing a surge in LokiBot activity over the past two months. LokiBot first appeared in 2015 and is used to steal credentials and other sensitive data from victim's machines. The malware targets Windows and Android operating systems and uses a keylogger to steal usernames and passwords and monitors browser and desktop activity. LokiBot can steal credentials from multiple applicatio ...

Alien Trojan Bypasses Two Factor Authentication

A trojan that targets banking apps have been found in Android devices. The trojan is called Alien. Alien bypasses two-factor authentication or 2FA, to steal credentials. Alien targets more than 200 mobile apps, including Bank of America and Microsoft Outlook. The malware has been used to actively target institutions worldwide, including France, Germany, Italy, Spain, and the United States. Researchers think Alien is a copy clone of Cerberus banking malware. ...