During the first half of this year 2020, the security firm Trend Micro blocked 8.8 million cyber threats that took advantage of Covid-19 to infect computers. Spam through email was the main way used to carry out different types of fraud, accounting for almost 92% of the total.
This data comes from the report for the first six months of the year published by Trend Micro, which shows how cybercriminals changed their strategies since the beginning of the year to take advantage of the interest aroused by the pandemic around the world.
The source code of the Radar COVID application will be available to all users and developers next Wednesday September 9th. This has been confirmed by the Secretary of State for Digitization of the Spanish Government through Twitter.
During this atypical summer our blog has received thousands of visits from people interested in finding out about news related to the virtualization sector in general, VDI in particular, interesting topics such as free and Open Source technologies and the latest news from UDS Enterprise, our connection broker for desktop and application virtualization.
At the end of this month of July, the development of a new Linux distribution will begin, which promises to be different from the rest. Serpent OS will challenge the usual conventions that Linux users are used to. In fact, it is not oriented to the masses, but to the most purist linuxers. It will be modular and optimized for modern machines.
Virtual desktop infrastructure aka VDI is a computer system technology for sharing the core OS platform and other computing resources with multiple users simultaneously through cloud computing models of businesses. This technology allows any remote data scientist or analyst to access and work with the virtual data resources and applications located in the cloud easily, efficiently, and securely. Thus, any enterprise that uses virtual data services can easily hire data scientist remotely to handle and manage valuable data of the company.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.