FireEye unmasks a new North Korean threat group

CTOvision

FireEye researchers have identified a distinct North Korean hacking group called APT38, which focuses almost exclusively on financial crimes. The researchers claimed that the group has already tried to steal $1.1 billion so far. The researcher said that APT38, is distinct from other Pyongyang-linked hackers because of its overriding financial motivation — as opposed to […]. CTO Cyber Security News

Groups 147

Finland’s OP Financial Group outlines digital ambitions

Computer Weekly

Chief digital officer at financial services group describes how new technology is fundamentally changing the business

IGMP: Host Group Tables

IT Toolbox

A typical implementation will keep the host group information for all interfaces in a single, global table

Groups 126

HCL completes integration of Volvo Group IT services

Computer Weekly

Deal sees 2,560 Volvo Group staff transferred to HCL, bringing mainframe expertise to Indian IT services firm

Groups 191

Create AD Group Based SCCM Collection – Part 3

Anoop

In this post, I will help you to learn how to create an AD Group Based SCCM Collection. We can create AD security group based collection using dynamic and direct member query rules. The post Create AD Group Based SCCM Collection – Part 3 appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair. I have explained how to create static and dynamic collections in the previous posts.

Randstad group to consolidate network infrastructure with BT

Computer Weekly

HR services giant Randstad Group is standardising its global network infrastructure with BT

Groups 180

IGMP: Joining a Host Group

IT Toolbox

To eliminate unnecessary multicast traffic on a network, hosts and multicast routers use the Internet Group Management Protocol (IGMP

Groups 131

Building an Agile IT Group

Eric D. Brown

Like the data center in most organizations, IT groups have been undergoing a transformation over the last few years. Many organizations have been pushing data center transformation projects while neglecting the transformation of the IT group itself.

Agile 222

Russian cyber espionage group targeting hotel Wi-Fi

Computer Weekly

A Russian cyber espionage group is targeting hotel Wi-Fi networks to carry out malware infections and potentially steal credentials, researchers warn

Hotels 161

Proposed snoopers’ charter changes inadequate, say rights groups

Computer Weekly

The government has proposed additional safeguards around the power granted to police by the Investigatory Powers Act, but the Open Rights Group and Liberty say they do not go far enough

Groups 155

CIO interview: Russell Harte, group technology director, DFS

Computer Weekly

The furniture store’s group head of IT speaks to Computer Weekly about how customer experience can be used internally

Groups 147

FDM Group launches Getting Back to Business programme

Computer Weekly

IT services consultancy FDM Group announces the launch of its Back to Business programme designed to help women return to the IT industry

Groups 185

IGMP: Leaving a Host Group

IT Toolbox

As the final step of initialization, hginit calls hgjoin to place the host in the all-hosts group. Once a host has joined the all-hosts group, it will receive IGMP queries

Groups 122

Customer data integration a market opportunity, says CXP Group consultant

Computer Weekly

Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft

Groups 180

President Launches New Tech Group

CTOvision

Charles Hall. President Donald Trump has launched the American Technology Council via executive order on May 1, 2017. A meeting is being scheduled for June to bring together executives to start hashing out the initiative. While a list of tech executives being invited has not been released, some of the tech companies from Trump's first tech summit in New York are likely to be called.

Groups 113

Sainsbury’s Group sales grow as Argos boosts performance

Computer Weekly

Group reports 8% increase in online grocery business and 10% rise in online Argos sales as total like-for-like sales jump 2.3% in first quarter

Groups 154

CIO interview: Martin Hofmann, Volkswagen Group

Computer Weekly

Volkswagen Group recently demonstrated how it was working with D-Wave to research uses for quantum computing. We find out what the car maker is hoping to achieve

Groups 117

Airport group uses cloud-based software to support insourcing

Computer Weekly

Manchester Airport Group is using cloud-based ITSM software to support its in-house service

Groups 137

Everyone Should Patch, Always: Microsoft patches Windows zero-day used by multiple cyber-espionage groups

CTOvision

Microsoft has patched a zero-day escalation of privilege bug in Windows after Kaspersky Lab researchers noticed multiple cyber-espionage groups exploiting it. The zero-day, tracked as CVE-2018-8589, impacts the Windows Win32k component. Microsoft classified the issue as an “elevation of privilege” vulnerability and says that before an attacker could use this zero-day to gain elevated privileges, they’ll […]. Cyber Security News Microsoft

Groups 133

Co-operative Group overhauls retail store networks

Computer Weekly

The Co-operative Group has brought in BT to revitalise and upgrade legacy networking infrastructure at its food retail business

Retail 108

Search engine Baidu becomes first China firm to join U.S. AI ethics group

CTOvision

The ethics group called Partnership on AI (PAI) has Alphabet Inc’ Google, Apple Inc and Facebook Inc as members, and is developing guidelines for ethical guidelines for AI research, including ensuring research does not violate international […]. The fear of AI has led to big tech companies in the United States forming an AI ethics club.

Hacking group targeting cybersecurity professionals

IT Manager Daily

A hacking group known as Group 74 is targeting professionals in the cybersecurity community with a fake conference document. A sign that points to Group 74’s involvement is the kind of malware used: Seduploader. Since the virus was embedded within an otherwise legitimate Office document, researchers looking into the campaign believe that Group 74 wanted the virus to remain hidden as long as possible.

Aster Group to implement ServiceNow

Computer Weekly

Housing developer to use cloud-based service across multiple business functions following succesful implementation for IT service desk

Groups 109

CW500 video: Mark Lockton-Goddard, former interim CIO, Drax Group

Computer Weekly

Mark Lockton-Goddard, former interim CIO, Drax Group, speaks to Computer Weekly about cloud maturity

Groups 118

Terror groups likely to be first to unleash cyber weapons, says Eugene Kaspersky

Computer Weekly

Terror groups are more likely than nation states to unleash cyber weapons and critical infrastructure is the most likely target, warns Kaspersky Lab chief

Groups 206

London Capital Group improves service deployment with SDN

Computer Weekly

Online trading firm has revitalised its service delivery after switching a legacy physical network for VMware NSX SDN

Groups 197

Group Currency Handling Challenges

IT Toolbox

Our company has its headquarters in the US and the reporting preference is therefore USD. We make sales in other parts of the world though and we carry a cost burden in India and various countries in Europe as well as in North America. SAP has some special handling aspects for FOREX

Groups 100

Danish bank group first to offer mobile payments with Dankort

Computer Weekly

A group of banks in Denmark are working together on a mobile payments service

Groups 114

Aller Group deploys Dropbox for Business in European AWS cloud

Computer Weekly

The end of Safe Harbour left many European businesses exposed in terms of data privacy, but Dropbox now has a German datacentre hosted on Amazon Web Services

Groups 186

CIO interview: Alan Crawford, City & Guilds Group

Computer Weekly

Four months into his role as CIO of City & Guilds, Alan Crawford opens up about the challenges of tending to the needs of a company that has hit the acquisition trail with aplomb in recent years

Groups 186

DCiM Solutions Buys IIS Group, Rebrands as Critical Environment Group

Data Center Knowledge

Formation of CEG doubles number of satellite offices DCiM had in key markets across the country Read More. DCIM News Deals

Groups 123

Strider cyber attack group deploying malware for espionage

Computer Weekly

Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware

Step-By-Step: Excluding Users or Usergroups from Group Policy

CanITPro

Sometimes excluding a user or user group from a group policy is needed to appease an application setting or system setting. I’ve seen administrators create separate OU and move users there to exclude said user from the particular group policy.

Intel to set up new group to focus on hardware security

Computer Weekly

Chip maker is reportedly planning to form a new group to focus on hardware security as it scrambles to limit the impact of recently discovered security flaws in chip designs

InterContinental Hotel Group reveals extent of malware attack

Computer Weekly

Hotel group InterContinental (IHG) reveals that malware attempting to glean payment card details sat undetected on its network in the US for three months

Hotels 121