The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently, in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here
Open source networking proponents have uncorked an updated routing protocol project designed to give white box, virtualized environments of all sizes fast and reliable communications.The project, now called the Free Range Routing (FRR) offers a full-on IP routing protocol suite for Linux/Unix platforms and includes protocol daemons for BGP, IS-IS, LDP, OSPF, PIM, and RIP. The FRR groupsays that the technology’s integration with the native Linux/Unix IP networking stacksmakes it applicable to a wide variety of applications from connectinghosts/virtual machines/containers to the network, advertising network services, LAN switching and routing, Internet access routers, and Internet peering.To read this article in full or to leave a comment, please click here
Cisco has issued an urgent request to Cisco customers running specific releases of software on their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances to reboot their devices to prevent a device from hanging and stop passing traffic.Cisco said its ASA and FTD devices are affected by a “functional software defect that will cause the device to stop passing traffic after 213 days of uptime” and that the issue is a result of a software regression bug introduced when addressing Cisco bug ID CSCva03607.+More on Network World: IBM on the state of network security: AbysmalTo read this article in full or to leave a comment, please click here
Cisco has issued an urgent request to Cisco customers running specific releases of software on their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances to reboot their devices to prevent a device from hanging and stop passing traffic.Cisco said its ASA and FTD devices are affected by a “functional software defect that will cause the device to stop passing traffic after 213 days of uptime” and that the issue is a result of a software regression bug introduced when addressing Cisco bug ID CSCva03607.+More on Network World: IBM on the state of network security: AbysmalTo read this article in full or to leave a comment, please click here
IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here
IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here
Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business will be sold to Extreme for $55 million in cash from its current owner Broadcom.Broadcom bought Brocade last year for about $5.5 billion but has since sold off Brocade’s Ruckus Wireless Wi-Fi business for $800 million to Arris International and now the data center networking business to Extreme.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here
Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business for $55 million in cash from its current owner Broadcom.Broadcom bought Brocade last year for about $5.5 billion but has since sold off Brocade’s Ruckus Wireless Wi-Fi business for $800 million to Arris International and now the data center networking business to Extreme.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here
Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business for $55 million in cash from its current owner Broadcom.Broadcom bought Brocade last year for about $5.5 billion but has since sold off Brocade’s Ruckus Wireless Wi-Fi business for $800 million to Arris International and now the data center networking business to Extreme.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here
The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as:
The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years.
In one case, a single source leaked more than 1.5 billion records [see Yahoo breach].
In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year.
In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised.
The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware.
In December 2016, a malware developer with an ongoing banking Trojan Continue reading
The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as:
The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years.
In one case, a single source leaked more than 1.5 billion records [see Yahoo breach].
In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year.
In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised.
The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware.
In December 2016, a malware developer with an ongoing banking Trojan Continue reading
Perhaps nowhere is the challenge of keeping up with the onslaught of wireless devices greater than in the small-to-midsized companies with little or no IT expertise to handle it.That’s the target for Cisco’s latest line of 802.11ac Wave 2-based wireless products which include scalable Aironet wireless access points and a new version of Cisco’s Mobility Express software to manage the whole environment.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here
Cisco Talos today warned of a flaw in the X.509 certificate validation feature of Apple macOS and iOS that could let an attacker remotely execute code and steal information.X.509 security certificates are widely used and integral to many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure web browsing protocol.+More on Network World: 5 burning questions with new IETF Chair and Cisco Fellow Alissa Cooper+“For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many different steps that are taken to ensure you are safely and securely connecting to the websites that claim they are who they are. This process includes certificate validation, or making sure that the servers that users are connecting to present “identification” showing they are legitimate. This helps to protect users from fraudulent servers that might otherwise steal sensitive information,” Talos wrote.To read this article in full or to leave a comment, please click here
Cisco Talos today warned of a flaw in the X.509 certificate validation feature of Apple macOS and iOS that could let an attacker remotely execute code and steal information.X.509 security certificates are widely used and integral to many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure web browsing protocol.+More on Network World: 5 burning questions with new IETF Chair and Cisco Fellow Alissa Cooper+“For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many different steps that are taken to ensure you are safely and securely connecting to the websites that claim they are who they are. This process includes certificate validation, or making sure that the servers that users are connecting to present “identification” showing they are legitimate. This helps to protect users from fraudulent servers that might otherwise steal sensitive information,” Talos wrote.To read this article in full or to leave a comment, please click here
When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper. Cooper will be the first woman to hold the position as the standards-setting body continues its work to improve all things internet technology-related.The Stanford and Oxford graduate comes to the job having worked with Cisco since 2014 in its collaboration business and the IETF since 2008.Jonathan Rosenberg, Cisco Fellow and Vice President, CTO for Cisco's Collaboration Business [who has authored many of the internet standards that define modern telecoms, including the Session Initiation Protocol (SIP)], and Cooper’s boss wrote that “Alissa has a long history of contributions to the IETF, serving most recently as the area director for the set of working groups that produce real-time communications protocols like SIP. Alissa, who was recently appointed to Cisco’s top technical rank of Cisco Fellow, takes the IETF reins in an exciting time. Areas like IoT, SDN, and NFV are requiring significant attention and making big impacts on the industry.”To read this article in full or to leave a comment, please click here
When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper. Cooper will be the first woman to hold the position as the standards-setting body continues its work to improve all things internet technology-related.The Stanford and Oxford graduate comes to the job having worked with Cisco since 2014 in its collaboration business and the IETF since 2008.Jonathan Rosenberg, Cisco Fellow and Vice President, CTO for Cisco's Collaboration Business [who has authored many of the internet standards that define modern telecoms, including the Session Initiation Protocol (SIP)], and Cooper’s boss wrote that “Alissa has a long history of contributions to the IETF, serving most recently as the area director for the set of working groups that produce real-time communications protocols like SIP. Alissa, who was recently appointed to Cisco’s top technical rank of Cisco Fellow, takes the IETF reins in an exciting time. Areas like IoT, SDN, and NFV are requiring significant attention and making big impacts on the industry.”To read this article in full or to leave a comment, please click here
The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country.
The FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money.
+More on Network World: U.S. Marshals warn against dual phone scams+
The Better Business Bureau described the scam earlier this year: “By replying ‘yes,’ ‘sure,’ or other agreeable response, the scammer records the call and uses that sound bite to authorize unwanted charges to the scammers benefit. “It seems like an innocent question, but it can cause undue financial burdens and stress. The scam caller may already have your financial information, which is how they authorize a payment and, if you dispute a charge, the scammer has doctored the recording to make it seems as though you agreed to it.”To read this article in full or to leave a comment, please click here
The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country.
The FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money.
+More on Network World: U.S. Marshals warn against dual phone scams+
The Better Business Bureau described the scam earlier this year: “By replying ‘yes,’ ‘sure,’ or other agreeable response, the scammer records the call and uses that sound bite to authorize unwanted charges to the scammers benefit. “It seems like an innocent question, but it can cause undue financial burdens and stress. The scam caller may already have your financial information, which is how they authorize a payment and, if you dispute a charge, the scammer has doctored the recording to make it seems as though you agreed to it.”To read this article in full or to leave a comment, please click here
Cisco is warning IOS and IOS EXE users of five security vulnerabilities it rates as “High” that could lead to denial of service attacks or allow an invader to execute arbitrary code on an particular system.The warnings – which include Cisco’s DHCP client, L2TP, Zero Touch Provisioning, HTTP server and Web user interface -- are part of what Cisco says are a twice-yearly bundle of IOS security advisories it issues to keep those users up-to-date on current IOS security issues.To read this article in full or to leave a comment, please click here
Cisco is warning IOS and IOS EXE users of five security vulnerabilities it rates as “High” that could lead to denial of service attacks or allow an invader to execute arbitrary code on an particular system.The warnings – which include Cisco’s DHCP client, L2TP, Zero Touch Provisioning, HTTP server and Web user interface -- are part of what Cisco says are a twice-yearly bundle of IOS security advisories it issues to keep those users up-to-date on current IOS security issues.To read this article in full or to leave a comment, please click here