Archive

Category Archives for "Network World SDN"

February 2017: The month in hacks and breaches

On February 5, an anonymous hacker kicked off February’s breaches, taking down a dark web hosting service that the hacker claimed was hosting child pornography sites. In the process, the hacker showed just how easily the dark web can be compromised.To read this article in full or to leave a comment, please click here(Insider Story)

Azure Stack’s third technical preview arrives

Azure Stack, Microsoft’s hybrid cloud system, is getting close to release. On Wednesday, the tech giant unveiled the third major public beta for customers that want to test it out.The new release brings a handful of additional capabilities for users to test, like support for Azure D-Series virtual machine sizes and deployment with ADFS (Active Directory Federation Services) to support systems that don’t have constant connections to Azure. Technical Preview 3, as this release is known in Microsoft parlance, will get a handful of other features over the coming months, including support for Azure Functions and Active Directory multi-tenancy.To read this article in full or to leave a comment, please click here

Cisco warns of NetFlow appliance vulnerability

Cisco today issued a security warning about a potential vulnerability in its NetFlow traffic monitoring device that could cause the system to lock-up. +More on Network World: Cisco tries to squash Smart Install security abuse+ Specifically, Cisco wrote: “A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: SD-WAN facilitates security on the WAN

With RSA San Francisco—one of, if not the biggest security show of the year—behind us, it’s a good time to revisit security and SD-WANs. I know, we already lived through Yoda’s prognostications about the future of networking and security. In that blog post, we spoke about vendor approaches to securing the new Internet connections created by SD-WAN. There’s another dimension, though, to SD-WAN security that we didn’t discuss and that’s about the WAN.The WAN: Risk and reward for today’s attackers For a lot of SD-WAN vendors, security integration means inspecting incoming and outgoing Internet traffic. But while services, such as Zscaler, may inspect HTTP traffic bound for the internet, they do nothing for traffic bound to other locations. And that’s a problem because increasingly site-to-site traffic requires its own inspection and protection.To read this article in full or to leave a comment, please click here

IDG Contributor Network: To improve information security, enterprises and government must share information

Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.The reality is providing protection in this kind of environment is so challenging that no single entity, whether it’s a company or a government agency, can accomplish this task alone. There needs to be some kind of cooperation between the private and public sectors. This leads to the questions of what kind of relationship should the government and companies have, how can they work together and what’s preventing this process from happening?To read this article in full or to leave a comment, please click here

IT Experience Can Be Beneficial for a Cybersecurity Career

Given my interest in cybersecurity skills and training, I’m contacted by academic institutions, professional organizations, and training companies with news about some type of cybersecurity education curriculum.  This isn’t surprising given the global shortage of cybersecurity skills.  New ESG research discloses that 45% of organizations report a “problematic shortage” of cybersecurity skills in 2017 (note: I am an ESG employee).Clearly we need more smart and well-prepared people to enter the cybersecurity ranks but it’s important to note that most cybersecurity professionals don’t enter the workforce directly from college or training programs.  According to research conducted in 2016 by ESG and the Information Systems Security Association (ISSA), 78% of cybersecurity professionals follow a more indirect route.  These folks start their careers as IT professionals and make their way into cybersecurity as their careers progress.  (Note:  The two ESG/ISSA research reports are available for free download here).To read this article in full or to leave a comment, please click here

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are looking around for ways to carry out exploits.The $105 million cash deal brings LightCyber’s ability to analyze behavior of devices to discover reconnaissance by malware inside networks and lateral movements as it seeks to compromise vulnerable systems.Based on machine learning, LightCyber absorbs the behaviors of individuals and devices, sets a normal level for them and finds anomalies that could indicate attacks underway.To read this article in full or to leave a comment, please click here

Robots are just as plagued by security vulnerabilities as IoT devices

An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety.The robotics industry has already seen significant growth in recent years and will only further accelerate. Robots are  expected to serve in many roles, from assisting people in homes, stores and medical facilities, to manufacturing things in factories and even handling security and law enforcement tasks."When you think of robots as computers with arms, legs, or wheels, they become kinetic IoT devices that, if hacked, can pose new serious threats we have never encountered before," researchers from cybersecurity consultancy firm IOActive said in a new report.To read this article in full or to leave a comment, please click here

Five sides and 1,500 access points: Wi-Fi at the Pentagon

The central offices of the U.S. Department of Defense – better known as the Pentagon – pose a unique IT challenge in a lot of ways, but bringing the 6.5 million square-foot space up to the wireless standards of the modern office environment was a particularly big undertaking, according to a government contractor charged with the task. The idea of a technology that broadcasts information in all directions, invisibly, through the air, is an understandably unpleasant one to a certain cast of military mind. So selling the people who run the Pentagon on installing Wi-Fi wasn’t an easy pitch, according to Defense Engineering, Inc. program manager Brendan DeBow.To read this article in full or to leave a comment, please click here

IDG Contributor Network: AI as advisor, not magician

In 2009, Google introduced Gmail Autopilot. “As more and more everyday communications take place over email, lots of people have complained about how hard it is to read and respond to every message. This is because they actually read and respond to all their messages.” Autopilot replied to email as if it were actually you. It included an authenticity control panel to adjust for "tone, typo propensity, and preferred punctuation."Autopilot was launched as an April Fools' prank. It was one of several programs tied to Google CADIE (cognitive autoheuristic distributed intelligence entity). Google provided several examples that demonstrated how helpful autopilot could be, including this one:To read this article in full or to leave a comment, please click here

Google hopes cord-cutters will sign up for YouTube TV: 44 channels for $35

Google has jumped into the cord-cutter game with YouTube TV, offering live TV without signing a contract.For $35 per month, you can watch 44 different channels via YouTube TV. Some of those channels are ABC, CBS, Fox, NBC, CW, ESPN, Disney, Disney Jr., National Geographic, USA, FX, FXX, Syfy, Bravo, Oxygen, Sprout, E! and FreeForm. Google’s announcement included the full run-down, as well as intentions to partner with local TV stations to get local news and sports.To read this article in full or to leave a comment, please click here

India’s Reliance Jio is blazing a trail to all-IP mobile networks

Fast-growing Indian mobile operator Reliance Jio may offer a glimpse of where all mobile networks are going eventually, to packet-based Internet Protocol infrastructure.At Mobile World Congress, the world’s largest gathering of the mobile industry, Reliance Jio stands out by having none of the specialized 2G and 3G infrastructure that long distinguished cellular carriers.Almost all mobile operators still have circuit-switched network gear in addition to IP systems. It came along with the 2G and 3G networks the carriers used before adopting LTE. Most are likely to keep older networks running for years, though some are moving faster than others to clear the decks.To read this article in full or to leave a comment, please click here

Microsoft may owe you $100 if you bought from the Microsoft Store

Microsoft has settled a class-action lawsuit regarding sales at its Microsoft Store outlets. And if you made a purchase at one of those stores, you might be owed as much as $100.The lawsuit alleged that Microsoft Store receipts contained too much information. The lead plaintiff’s receipt listed the buyer’s name, the name of the salesperson and the first six and last four digits of the buyer’s payment card number—more than half the numbers on the card. According to the 2003 U.S. Fair and Accurate Credit Transactions Act (FACTA), retailers may print only the last five numbers of a payment card on the receipt. Retailers had until 2006 to comply with this restriction, and the Microsoft Stores are much newer than that. To read this article in full or to leave a comment, please click here

Aruba’s top exec, large customers talk about Wi-Fi’s present and future at Atmosphere

Aruba kicked off its annual Atmosphere conference on Tuesday in Nashville with a keynote from CTO Keerti Melkote that featured CTOs and CIOs from several of the company’s most prominent customers.One of the key points made by Melkote, now the sole head honcho of the company following the departure of then-CEO Dominic Orr in January, was that the HPE-owned wireless equipment maker is working hard to unify Aruba’s offerings over the past year.+ ALSO ON NETWORK WORLD: Coolest new Android phones at Mobile World Congress 2017To read this article in full or to leave a comment, please click here

8 ways to make Amazon’s Alexa even more awesome

I’ve been using an Amazon Echo for a while now, yet I still find myself amazed at how well its voice assistant technology works—at least within the relatively narrow confines it has set for itself. By sticking to what she can do well, Alexa mostly avoids the common trap of heavily hyped new technology delivering a disappointing experience in real life. To read this article in full or to leave a comment, please click here

Relax: This phone measures your blood pressure

This Swiss electronics company is on a mission: to stop millions of people dying of ignorance each year.Worldwide, high blood pressure leads to around 9.4 million deaths annually according to figures from the World Health Organization. And yet, the condition is easily diagnosed and treated. In the Americas, the prevalence of high blood pressure fell from 31 percent in 1980 to 18 percent in 2014, but remains high in developing countries.Before high blood pressure can be controlled, though, it needs to be detected, and that's the part that Leman Micro Devices wants to make simpler. It is showing off its solution at Mobile World Congress in Barcelona this week.To read this article in full or to leave a comment, please click here

Smart teddy bears involved in a contentious data breach

If you own a stuffed animal from CloudPets, then you better change your password to the product. The toys -- which can receive and send voice messages from children and parents -- have been involved in a data breach dealing with more than 800,000 user accounts.The breach, which grabbed headlines on Monday, is drawing concerns from security researchers because it may have given hackers access to voice recordings from the toy's customers. But the company behind the products, Spiral Toys, is denying that any customers were hacked. "Were voice recordings stolen? Absolutely not," said Mark Myers, CEO of the company.Security researcher Troy Hunt, who tracks data breaches, brought the incident to light on Monday. Hackers appear to have accessed an exposed CloudPets' database, which contained email addresses and hashed passwords, and they even sought to ransom the information back in January, he said in a blog post.To read this article in full or to leave a comment, please click here

Qualcomm details plans for Windows 10 PCs with Snapdragon 835

Qualcomm has big plans to bring back ARM to Windows 10 PCs, and there is a chance that its Snapdragon 835 could support Windows Holographic for VR headsets.The company is already working with major PC makers for using Windows 10 with Snapdragon 835, its latest chip introduced in Sony's Xperia XZ smartphone at Mobile World Congress in Barcelona.The response to Windows 10 with Snapdragon 835 has been positive, and the grim memories of Windows RT -- a colossal failure in bringing ARM to PCs -- have remained in the past, said Keith Kressin, senior vice president of product management at Qualcomm Technologies."The goal is to get something credible out, show people why it's different from RT. Show that it's Windows 10 -- there isn't a second version of Windows 10," Kressin said.To read this article in full or to leave a comment, please click here

Boat relying on an iPad for navigation crashes into a ferry after Wi-Fi goes out

The iPad is undoubtedly a versatile device, but there's no getting around the fact that Apple's tablet has its fair share of limitations. A few months back, a U.K. sailor named David Carlin learned this the hard way after deciding it might be a good idea to navigate a 50-foot World War II boat he was steering via his trusty iPad. Things started out smoothly enough, but as relayed via a recent report in the Metro, navigation became tricky if not downright impossible once Carlin's iPad dropped its Wi-Fi signal. From there, a series of errors ensued as Carlin's boat, completely devoid of direction, blindly entered the U.K.'s busiest shipping lane where it promptly crashed into a cargo ferry. From there, Carlin's boat was a goner and began to sink. Ultimately, Carlin had to make a Mayday call and wait for rescuers to help him out.To read this article in full or to leave a comment, please click here

Save 38% on the TP-LINK Wi-Fi Smart Plug, Works with Amazon Alexa – Deal Alert

The TP-LINK HS100 smart plug is quite simply a power outlet that you can control from anywhere. Using your smartphone, you can turn devices on & off, set programs to turn them on & off at set times while you're away, or engage a "countdown timer" which powers the switch off after a set amount of time. Installation is simple -- just plug a device into your smart plug and connect to your wifi network. The HS100 is also compatible with Amazon Alexa, for voice control. Buy multiple plugs and get creative.To read this article in full or to leave a comment, please click here