- · Simplified workflow and reduced costs
- · Increased product efficiency by developing prototypes going through testing phase
- · Mitigate risk in production
- · Saving time and money resulting to higher profit margins
- · Customization tailored to preferences
Friday, February 10, 2017
MSI-ECS Now Offers 3D Printing Solutions
MSI-ECS
Now Offers 3D Printing Solutions
In its relentless
commitment to fully address the evolving needs of the local IT community and
provide its valued partners with solutions that command business growth,
profitability, and stability, MSI-ECS today announced the newest addition to their
wide array of products – 3D printers.
3D printers have become competitive in the
recent years, allowing its popularity to rise and become known to deliver
out-of-the-box solutions. Since its introduction, it has benefited various
industries, small and big companies alike, by speeding up the process of
creating prototypes. Some industries that have tapped 3D printing technology
include architecture, aeronautics, medical, food industry, mechanical, robotics,
retails and even fashion.
This new technology offers many applications
such as prototyping, low-volume manufacturing, mechanical parts production,
biomedical and design. It provides innovative ways in manufacturing almost
anything and has ultimately signaled a change in the way we run our businesses
today and what’s to come in the future.
What exactly can businesses benefit from 3D
printers?
Sample:
Whether your aim is to catch your potential
customer’s attention, to utilize it for rapid product prototyping or even for
personal use, the benefits are endless and can only be hindered by one’s own
imagination.
MSI-ECS currently distributes Moment and Mobius 3D
printers.
About MSI-ECS: MSI-ECS
is one of the country's leading providers of innovative and reliable computing
solutions. Specializing in IT distribution as its core competence, MSI-ECS has
continuously redefined and broadened its portfolio of IT products and services
to fully address the evolving needs of the local IT community. More information
about MSI-ECS is available at http://www.msi-ecs.com.ph.
Monday, February 06, 2017
Two Arrested in London for Hacking Washington CCTV Cameras
Two suspected hackers have reportedly been arrested in London on suspicion of hacking 70 percent of the CCTV cameras in Washington with ransomware ahead of President Donald Trump's inauguration last month.
The arrest took place on 20th January by the officers from the National Crime Agency (NCA) of UK after it received a request from United States authorities, but it has not been disclosed until now.
The NCA raided a house in the south of London last month and detained a British man and a Swedish woman, both 50-years-old, reported The Sun.
Some 123 of the 187 police CCTV cameras used to monitor public areas in Washington DC stopped working on 12 January, just 8 days before the inauguration of Donald Trump, after a cyber attack hit the storage devices.
The cyber attack lasted for about three days, eventually leaving the CCTV cameras out of recording anything between 12 and 15 January.
It was reported that the surveillance cameras were left useless after a ransomware made its way onto the storage devices that records feds data from CCTV cameras across the city. The hackers demanded ransom money, but the Washington DC Police rejected their demand.
Ransomware is an infamous piece of malware that has been known for locking up computer files and then demanding a ransom in Bitcoins in order to help victims unlock their files.
The arrest took place on 20th January by the officers from the National Crime Agency (NCA) of UK after it received a request from United States authorities, but it has not been disclosed until now.
The NCA raided a house in the south of London last month and detained a British man and a Swedish woman, both 50-years-old, reported The Sun.
Some 123 of the 187 police CCTV cameras used to monitor public areas in Washington DC stopped working on 12 January, just 8 days before the inauguration of Donald Trump, after a cyber attack hit the storage devices.
The cyber attack lasted for about three days, eventually leaving the CCTV cameras out of recording anything between 12 and 15 January.
It was reported that the surveillance cameras were left useless after a ransomware made its way onto the storage devices that records feds data from CCTV cameras across the city. The hackers demanded ransom money, but the Washington DC Police rejected their demand.
Ransomware is an infamous piece of malware that has been known for locking up computer files and then demanding a ransom in Bitcoins in order to help victims unlock their files.
Radio Stations Hacked to Play "F**k Donald Trump" on Loop
One such order signed by the president was banning both refugees and visa holders from seven Muslim-majority countries (Iraq, Iran, Libya, Yemen, Somalia, Syria, and Sudan) from entering the United States, resulting in unexpectedly arrest of some travelers at airports.
Now, it seems like some anti-Trump protesters have publically declared their fight against the president by exploiting a known flaw in low power FM (LPFM) radio transmitters to play a song the radio stations didn't intend to broadcast.
Radio stations in South Carolina, Indiana, Texas, Tennessee and Kentucky, were hacked recently to broadcast the Bompton-based rapper YG and Nipsey Hussle's anti-Trump song "Fuck Donald Trump," which was already a radio hit in some parts of the country last year, several sources report.
The song was repeatedly played on Monday night, according to the RadioInsight, and the news of the incident began emerging shortly after Trump's inauguration on January 20, eight days before hackers hacked 70 percent of the police CCTV cameras in Washington DC.
Hackers gained access to the radio stations by exploiting known vulnerabilities in Barix Exstreamer devices which can decode audio file formats and send them along for LPFM transmission.
Over a dozen radio stations experienced the hack in recent weeks, though some of them shut down their airwaves as quickly as possible in an attempt to avoid playing the inflammatory "FDT (Fuck Donald Trump)" song on loop.
The hackers or group of hackers behind the cyber attack is still unknown. The affected stations so far include:
Now, it seems like some anti-Trump protesters have publically declared their fight against the president by exploiting a known flaw in low power FM (LPFM) radio transmitters to play a song the radio stations didn't intend to broadcast.
Radio stations in South Carolina, Indiana, Texas, Tennessee and Kentucky, were hacked recently to broadcast the Bompton-based rapper YG and Nipsey Hussle's anti-Trump song "Fuck Donald Trump," which was already a radio hit in some parts of the country last year, several sources report.
The song was repeatedly played on Monday night, according to the RadioInsight, and the news of the incident began emerging shortly after Trump's inauguration on January 20, eight days before hackers hacked 70 percent of the police CCTV cameras in Washington DC.
Hackers gained access to the radio stations by exploiting known vulnerabilities in Barix Exstreamer devices which can decode audio file formats and send them along for LPFM transmission.
Over a dozen radio stations experienced the hack in recent weeks, though some of them shut down their airwaves as quickly as possible in an attempt to avoid playing the inflammatory "FDT (Fuck Donald Trump)" song on loop.
The hackers or group of hackers behind the cyber attack is still unknown. The affected stations so far include:
- 105.9 WFBS-LP Salem, S.C.
- Radio 810 WMGC/96.7 W244CW Murfreesboro TN
- 101.9 Pirate Seattle
- 100.9 WCHQ-LP Louisville
- 100.5 KCGF-LP San Angelo TX

















