Archive

Category Archives for "Networking"

Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever

Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom — both of which attackers can purchase to use to direct at a target— …

Crash Override: Malware that took down a power grid may have been a test run

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US.The malware, dubbed Crash Override in the Dragos report (pdf) and Industroyer in the ESET report (pdf), has nothing to do with espionage and everything to do with cyber-sabotage.Crash Override, Dragos says, “is the first ever malware framework designed and deployed to attack electric grids.” It could be “leveraged at multiple sites simultaneously.” Dragos founder Robert M. Lee told Reuters, “The malware is capable of causing outages of up to a few days in portions of a nation's grid, but is not potent enough to bring down a country's entire grid.”To read this article in full or to leave a comment, please click here

Crash Override: Malware that took down a power grid may have been a test run

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US.The malware, dubbed Crash Override in the Dragos report (pdf) and Industroyer in the ESET report (pdf), has nothing to do with espionage and everything to do with cyber-sabotage.Crash Override, Dragos says, “is the first ever malware framework designed and deployed to attack electric grids.” It could be “leveraged at multiple sites simultaneously.” Dragos founder Robert M. Lee told Reuters, “The malware is capable of causing outages of up to a few days in portions of a nation's grid, but is not potent enough to bring down a country's entire grid.”To read this article in full or to leave a comment, please click here

9 free Wi-Fi stumbling and surveying tools

Stumbling and surveyingHere are 9 tools that provide important details on known and unknown aspects of your Wi-Fi network. Each of these tools gives you the basic wireless details: SSIDs, signal strength, channels, MAC addresses and security status. Some can even reveal “hidden” or non-broadcasted SSIDs, display the noise levels, or display statistics on successful and failed packets of your wireless connection. Two of the tools include Wi-Fi password cracking tools as well, useful for educational or penetration testing purposes.To read this article in full or to leave a comment, please click here

47% off Etekcity Wireless Dimmable Color LED Desk Lamp – Deal Alert

With simple touch control, the Etekcity living color lamp can be adjusted to provide the perfect lighting. The white LED lamp provides up to 3 adjustable brightness levels for your reading and studying convenience. The base can be illuminated in virtually any hue with simple color spectrum touch and drag control. Turn on only the base of the lamp to use it as a soft and soothing night light. Whether used for studying, reading, or relaxing, the living color lamp will provide high-quality LED illumination that champions energy efficiency for lower usage and costs. The bright LED lighting also minimizes eye fatigue, allowing you to finish the task at hand without getting a migraine. The Etekcity LED lamp is a #1 best-seller on Amazon with 4.5 out of 5 stars from over 500 people (read reviews). The typical list price of $29.99 has been reduced 47% to just $15.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Hitachi wants to IoT-enable cities

Hitachi is an interesting organization. A huge conglomerate with total revenues of over $80 billion per annum, it employs over 300,000 people worldwide and has an incredibly broad range of contributing businesses in the power, industrial, urban development and healthcare spaces to name just a few.+ Also on Network World: Smart city tech growing in the U.S. + One of the businesses within the Hitachi Group is the Hitachi Insight Group (HIG), an organization focused on digital solutions within the broader Internet of Things (IoT) space. HIG offers the Lumada IoT platform, a solution that serves both public and private sector customers across three distinct categories: IoT, Energy IoT and Smart City.To read this article in full or to leave a comment, please click here

WhatsApp leaves IBM’s SoftLayer cloud for Facebook data center: What it really means

If you keep up with technology news, you’ve been hearing a lot lately about how enterprises are moving more and more key workloads from their own on-premise data centers to the public cloud. In fact, it happens so much that even the biggest transitions are hardly news anymore. Man bites dog? What does make people pay attention, though, is when the opposite happens: When a major product or service moves from running in the public cloud to an on-premise data center. And that’s exactly what happened last week when CNBC broke the news that Facebook plans to move its WhatsApp service from IBM’s SoftLayer public cloud service to its proprietary data centers.To read this article in full or to leave a comment, please click here

WhatsApp leaves IBM’s SoftLayer cloud for Facebook data center: What it really means

If you keep up with technology news, you’ve been hearing a lot lately about how enterprises are moving more and more key workloads from their own on-premise data centers to the public cloud. In fact, it happens so much that even the biggest transitions are hardly news anymore. Man bites dog? What does make people pay attention, though, is when the opposite happens: When a major product or service moves from running in the public cloud to an on-premise data center. And that’s exactly what happened last week when CNBC broke the news that Facebook plans to move its WhatsApp service from IBM’s SoftLayer public cloud service to its proprietary data centers.To read this article in full or to leave a comment, please click here

PCI Express 4.0 is done, 5.0 spec nears approval

This is one of those stories that isn’t very sexy, but it is important. The PCI Express 3.0 data transfer standard has been around longer than it should have, and now it seems the PCI-SIG that develops the standard is making up for it with two new specs in two years. The SIG—a consortium of 700 hardware vendors, including IBM, Intel and HP Enterprise—develops the spec, which is the standard for moving data around within a computer. Plug-in peripherals, like video cards and SSDs, use the PCI Express bus for data transfer. + Also on Network World: SSD shootout: PCI Express blows away SATA and M.2 in throughput testing + PCI Express 3.0, or PCIe, was finished in 2010, and motherboards began to appear in 2011. The 4.0 spec should have been done within three years but only now is being finished because if there’s one way to screw up development, it’s to have it done by committee, and 700 cooks can really spoil the broth. To read this article in full or to leave a comment, please click here

First Speakers in Autumn Network Automation Course

Today I can tell you who the first speakers in the autumn 2017 network automation online course will be.

Sounds promising? Why don’t you register before we run out of early-bird tickets?

Security as an Enabler?

I have often wondered why the “security as an enabler” model is as unique as unicorns in the wild. I think the logic works in a vacuum and it would be great if it held true. However when humans and politics (layer 8 stuff) come into the mix, it seems that the cybersecurity team tend to be viewed as the  naysayers that block progress. Quite honestly, the “security as an enabler” mantra only seems to work for those organizations that are directly profiting from the sale of cybersecurity. Those that understand the role cybersecurity plays in a typical organization realize that this is unfortunate.

With this thought in mind, I was reading through an article about the traits of CEO’s and found identified points that I think contribute to these challenges for information security:

  • Bias toward action
  • Forward Thinking

By no means am I criticizing CEO’s for these traits—they are primary contributors to keeping a given business relevant in its industry. I’m just using these to help explain the fallacy of a “security as an enabler” mindset within a given organization.

CEO’s are the highest single point of authority within an organization. They often appoint CSO’s (Chief Security Officers) or CISO’s Continue reading

Golang Magic: Package level vars, init

Magic

Sometimes code appears to be magic. Layer up on layer of abstraction followed through with crazy names and advanced tricks. Great for the writer and a show case of knowledge, bad for readability and maintenance. This article explores removal of said magic by simplifying what packages can do.

Intro

I’m currently levelling up my learnings with Golang and keen to maintain the heat and make use of this skill. So, when Peter Bourgon posted this http://peter.bourgon.org/blog/2017/06/09/theory-of-modern-go.html, I took note. I’ve never met Peter, but I like what I read. In summary , his post is about removing the use of package level vars and the implicitly called init() function.

I am the first to admit to using package level vars and init. My first reaction to reading the article was being irked. Why irked? Because it’s easy to use package level vars and once you understand what init() is and when it’s called. Not using package level vars means you have to think about relationships and what needs to be passed what. Not using init() means you have to think about how something is instantiated and whether it’s unique and if it should be globally Continue reading