Archive

Category Archives for "Network World Wireless"

Why you shouldn’t pay the ransomware fee

While most of the decision makers would likely prefer to hear a simple yes or no when asking if they should pay, nothing in security is simple. By and large, the position of many leaders in the industry is that the ideal situation is not to pay.Security experts across the industry would like to see all enterprises, large and small, be prepared for a hit so that they can recover their data without paying a ransomware fee. The question of whether to pay the ransomware fee is tricky, though, as sometimes organizations are left with no other options.MORE: How to respond to ransomware threats When asked whether companies should ever pay a ransomware fee, Ryan Manship, security practice director at RedTeam Security said, “The first thing about ransomware is that it’s in many ways like terrorism. The US has a policy not to negotiate with terrorists. Where does that come from? Why does it exist? The reality is, you can’t trust the bad guys. You can’t trust them to do what they say they are going to do, which is to give back access to your data.”To read this article in full or to leave a Continue reading

Happy anniversary, Windows 10: Here’s what coming in the latest update

Happy AnniversaryMicrosoft’s latest update to Windows 10, dubbed the Anniversary Update, is slated to officially drop on Aug. 2, a year after the initial release of Windows 10 last July 29. Windows 10 has been installed on more than 350 million devices, making it Microsoft’s most successful OS launch. However, there’s always room for improvement and this update introduces several changes, customization options, and new ways to interact with Windows 10. Here are the highlights:To read this article in full or to leave a comment, please click here

New products of the week 7.11.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ONLYOFFICE Сommunity EditionKey features - A free and open source office and productivity suite that offers a feature-rich online editors integrated with Mail, CRM, Project and Document Management systems, Calendar. More info.To read this article in full or to leave a comment, please click here

Special Pre-Prime Discount on Jaybird X2 Sport Wireless Bluetooth Headphones – Deal Alert

With a regular list price of $149.99, the current discount makes the Jaybird X2 Sport is now available with a 45% discount for this pre-Prime Day deal. Features include: Premium Bluetooth Audio For Skip-Free Music Outdoors 8 Hours of Music + Calls With Complete Remote Controls Secure Over/Under-Ear Fit Options Lifetime Sweat proof Warranty Includes Comply Premium Sport Memory Foam Ear Tips, Patented Secure-Fit Ear Fins, Friction-Fit Silicone Sport Carrying Case, Silicone Ear Tips, Charging Cable & Cord Management Clips. Jump to Amazon now for additional details, and to explore buying options.To read this article in full or to leave a comment, please click here

$30 off Lumo Lift Posture Coach, Today Only – Deal Alert

If your posture needs to be improved, this deal may be worth your consideration. With Lumo Lift, get gentle vibrational reminders for your posture whenever you slouch. Track your posture hours, steps taken, distance travelled and calories burned through the companion iOS, Android or Windows Desktop Lumo Lift app. For today only, Amazon is discounting the Lumo Lift posture coach by $30, making it available for just $50. It currently averages 4 out of 5 stars from over 1,900 customers (read reviews). Take advantage of today's deal on Amazon right now.To read this article in full or to leave a comment, please click here

Omni Hotels was hit by point-of-sale malware

Omni Hotels & Resorts has reported that point-of-sale systems at some of its properties were hit by malware targeting payment card information.The attack on the systems of the luxury hotel chain follows similar breaches of point-of-sale systems at various hotels and retailers like Hyatt Hotels, Target, Starwood Hotels & Resorts Worldwide and Hilton Worldwide Holdings.Omni in Dallas, Texas, said in a statement Friday that on May 30 this year, it discovered it was hit by malware attacks on its network, affecting specific POS systems on-site at some of its properties. “The malware was designed to collect certain payment card information, including cardholder name, credit/debit card number, security code and expiration date,” Omni said. There isn’t evidence that other customer information, such as contact information, Social Security numbers or PINs, was compromised, it added.To read this article in full or to leave a comment, please click here

Houston, we have code!

Did you know that the computer that coordinated the Apollo 11 mission that landed on the moon, the Apollo Guidance Computer, had about 0.08 percent of the processing power of an iPhone 5s? That it had just 2K of RAM and ran at 1.024MHz and its external signaling ran at 512Khz ? That it had only four 16-bit registers and 32KB of storage? Despite having so little power, the AGC guided the Apollo 11 mission across more than 221,000 miles of space to land on the moon then brought them back again. Amazing. And check out the AGC's user interface:To read this article in full or to leave a comment, please click here

​I hunted Pokemon by two of the world’s most famous landmarks and all I caught was a lousy Zubat

If you’ve not seen it, the new Pokemon Go mobile game lets you walk around town interacting with local landmarks via your phone’s screen. You’ll likely find plaques, artworks and other local facts about where you live and work that you never knew existed. And then, every once in a while, a wild Pokemon will appear on the ground next to you (it’s invisible but you can see it on your phone’s screen) and you’ve gotta catch it by flicking Pokeballs at it. There are some exotic Pokemon and many boring ones. Perhaps I was hoping for too much when I stood beneath Sydney’s iconic Harbour Bridge, looking out across the water to the enormously-famous Sydney Opera House only to be notified that the wild Pokemon that had appeared was this.To read this article in full or to leave a comment, please click here

Cayenne, how to manage a frustration of IoT devices

Collective nouns are fascinating. You start with the basics — a flock of seagulls, a herd of buffalo, a school of fish, an army of ants — then you move on to the more interesting ones — a lodge of beaver, a mob of kangaroos, a warren of rabbits, a covey of grouse. Now we come to the truly great collective nouns: An unkindness of ravens, a murder of crows, a parliament of owls, an implausibility of gnus, an ambush of tigers, and a descent of woodpeckers. We also have collective nouns for things: A box of crayons, a pad of paper, and so on. There are also the invented collective nouns; a purchase of senators, a deficit of economists, a shortage of dwarves, and for all you GoT fans, a weyr of dragons (okay, so that was made up by Anne McCaffrey but it works even better for GoT). To read this article in full or to leave a comment, please click here

Bugs & Bugs: As in, the software kind — and insects

Network World this past Friday afternoon launched the alpha version of our possibly regular new Facebook Live stream dubbed Bugs & Bugs, as in the software kind and actual insects.I've joined forces with our resident IT security expert, Tim Greene, who handles the software bugs side of things. I, an amateur entomologist, take charge of the insect news.Perhaps surprisingly, there is no shortage of either. Between Tim checking out the new Stuxnet documentary Zero Days and reviewing new research from New York University and others to help reduce software bugs, and me catching up on the Gypsy Moth invasiion and a cyborg locust, we had no shortage of material.To read this article in full or to leave a comment, please click here

Hacker claims to have breached Amazon server, dumped data on nearly 84,000 Kindle users

After a person claiming to be a security researcher “declared war on the Baton Rouge police” and took credit for the data breach after the shooting death of Alton Sterling, he took aim at Amazon. 0x2Taylor In a Twitter direct message, hacker @0x2Taylor told Mic the he and a buddy “’breached a server’ owned by Amazon that contained database files with more than 80,000 Kindle users’ information.”To read this article in full or to leave a comment, please click here

Cybersecurity firms step up intel sharing despite issues of trust

The war against cybercriminals won’t be won alone. To keep hackers at bay, security vendors are establishing more ways for their customers to cooperate and share data about the latest threats -- even as it sparks concerns about trust and competition.“We have to win this war together,” said Ben Johnson, chief security strategist of Carbon Black.The company is the latest to help pool together security expertise with a new platform called the Detection eXchange.Carbon Black protects the networks of thousands of companies, and it's now opening a line of communication between them. More than a virus signature or an IP address, the exchange aims to foster the sharing of "patterns of attack," which identify behaviors and tactics employed by malicious hackers.To read this article in full or to leave a comment, please click here

Stuxnet the movie: The U.S. has pwned Iran

The new documentary about Stuxnet, ‘Zero Days’, says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country’s infrastructure and could be used as a weapon in any future war.Quoting unnamed sources from inside the NSA and CIA, the movie says the Nitro Zeus program has infiltrated the systems controlling communications, power grids, transportation and financial systems, and is still ready to “disrupt, degrade and destroy” that infrastructure if a war should break out with Iran.The multi-million dollar program was run from within the NSA during the same time Stuxnet was active, and was put in place should the U.S. be drawn into a war there because Israel launched an attack against Iran, according the film by academy award winning director Alex Gibney. The movie opened in U.S. theaters today.To read this article in full or to leave a comment, please click here

Businesses struggle to hire workers with cloud skills

Cloud services are becoming the cornerstone of an enterprise's IT infrastructure. However, IT leaders are finding it difficult to not only plan for and implement cloud technology, but also to hire qualified candidates. And part of that struggle, according to a recent study from Softchoice of 250 line of business managers and 250 IT decision makers, is a lack of qualified candidates as well as a general misunderstanding of how to create a successful cloud strategy.“There’s incredible opportunity for businesses if they move to the cloud, but with a lack of skilled resources they are not able to realize those benefits as quickly. At best, this impacts revenue and profit potential in isolation. At worst, competitiveness and market relevance suffer,” says Craig McQueen, director of Microsoft Practice at Softchoice.To read this article in full or to leave a comment, please click here

68% off Carllte Omnidirectional Condenser Lapel Microphone – Deal Alert

The Carllte Omnidirectional lapel mic has an extra long 59-inch cable and TRRS 3.5mm Jack, making it compatible with most phones, tablets and computers and suitable for a wide range of applications from live-streaming to kareoke. It is made from professional grade polished and protected steel, and captures crystal clear audio without batteries or external power. It averages 4 out of 5 stars from over 100 reviewers (read reviews). Amazon indicates that its $40 list price has been reduced by 68% to just $13.To read this article in full or to leave a comment, please click here

The truth about bug finders: They’re essentially useless

Today's popular bug finders catch only about two percent of the vulnerabilities lurking in software code, researchers have found, despite the millions of dollars companies spend on them each year.Bug finders are commonly used by software engineers to root out problems in code that could turn into vulnerabilities. They'll typically report back how many bugs they found -- what you don't know is how many were missed, leaving success rates an open mystery.So researchers at New York University's Tandon School of Engineering in collaboration with the MIT Lincoln Laboratory and Northeastern University decided to find out how much they are missing.To read this article in full or to leave a comment, please click here

Polycom accepts Siris Capital’s $2B offer, cancels Mitel merger

The technology industry is never short of intrigue and drama. There are always rumors of who might buy whom, which executive left to go where and what new product a certain vendor might come out with.The fate of Polycom has been one of the storylines industry watchers have been keeping an eye on. Earlier this year, Mitel announced it agreed to acquire Polycom for $1.96 billion. But alas, all things aren’t meant to be. In Hollywood, Bennifer broke up, and now Mitelocom will, too.On the eve of the deal being finalized, Siris Capital came in, upped the offer to a cool $2 billion and broke up the proposed joint company. Like all things in life, there are some definite pros and cons to this announcement.To read this article in full or to leave a comment, please click here

Screens that fold and roll will arrive as early as next year

Displays that can be folded and rolled up have been shown in prototype smartphones, wearables and other devices -- but when will such products be available?Advances in technology suggest they aren't too far off in the future. Such devices could start showing up as early as next year or 2018, said Jerry Kang, senior principal analyst for emerging display technologies and OLED at IHS.Manufacturers are trying to launch them in devices like tablets that can fold into a smartphone-size device. It's possible to use these displays in wearable devices, but reliability, weight and battery life need to be considered, Kang said.To read this article in full or to leave a comment, please click here

A CIO’s guide to understanding analytics

Wherever you turn, businesses are putting analytics into action. Retailer American Eagle outfitters, for example, uses an algorithm to figure out how best to fulfill online orders with products shipped from physical stores. Insurance company Allstate calculates premiums using an algorithm that weights different risk factors. Even beverage maker Minute Maid is applying algorithms to its orange juice, taking into account not just consumer preferences but its supply chain.To read this article in full or to leave a comment, please click here(Insider Story)

Confusion over cyber insurance leads to coverage gaps

Assessing damage after a major cybersecurity breach is one of the most harrowing things a CIO or CISO can face. There is plenty of blame to go around but rarely enough people to accept it evenly. And when it comes to recouping money from cyber insurance claims, this blame game is further complicated by confusion.A typical corporate cyber insurance discussion goes like this: The CEO or board chairman calls the CISO into the room and tells him that their insurers is going to pay out only 38 percent of a claim because "you didn't implement encryption on the affected applications."The CISO says: "First, I didn't know we had cyber insurance. Second, the impacted apps are running our ATM machines and if we would have encrypted them you would have fired me because our customers wouldn't have been able to access them. I wish you would have talked to me before you implemented these policies."To read this article in full or to leave a comment, please click here