Archive

Category Archives for "Networking"

Cloudflare wants to secure IoT connections to the internet

Many people are worried about putting smart internet-connected devices in their homes or offices because of flaws that could allow attackers into their private networks.Web optimization and security firm Cloudflare is trying to alleviate those fears with a new service that could allow internet-of-things manufacturers to protect devices from attacks and deploy patches much quicker.Cloudflare's content delivery network is used by millions of people and companies to increase the performance of their websites and to protect them from malicious traffic. The company's servers work as invisible proxies between websites and visitors, providing on-the-fly encryption and firewall protection.To read this article in full or to leave a comment, please click here

2.4GHz is a headache for Wi-Fi users, and it’s here to stay

Current-generation Wi-Fi technology lives in the 5GHz band. Almost all of the major innovation in wireless standards takes place in the relatively untroubled frequencies around 5GHz (and well above), where there’s little radio competition and the living is easy.But wireless LAN users can’t just stay comfortable in the 5GHz realm – the older 2.4GHz frequency bands are a necessary part of most wireless implementations, and they’re rarely a favorite of the people who have to build and operate Wi-Fi networks.+ ALSO ON NETWORK WORLD: Toward a bigger, faster, denser Wi-Fi WorldTo read this article in full or to leave a comment, please click here

2.4GHz is a headache for Wi-Fi users, and it’s here to stay

Current-generation Wi-Fi technology lives in the 5GHz band. Almost all of the major innovation in wireless standards takes place in the relatively untroubled frequencies around 5GHz (and well above), where there’s little radio competition and the living is easy.But wireless LAN users can’t just stay comfortable in the 5GHz realm – the older 2.4GHz frequency bands are a necessary part of most wireless implementations, and they’re rarely a favorite of the people who have to build and operate Wi-Fi networks.+ ALSO ON NETWORK WORLD: Toward a bigger, faster, denser Wi-Fi WorldTo read this article in full or to leave a comment, please click here

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here

9 essential tools for the security-conscious mobile worker

Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here

9 essential tools for the security-conscious mobile worker

Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here

Sensitive data often follows former employees out the door

There is an old cliché that says a company's most valuable assets walk out the door at the end of the day. However, according to a recent security report, some other valuable assets are walking out the door as well, and they're not coming back.In a survey from Osterman Research, 69 percent of organizations polled say that they have suffered significant data or knowledge loss resulting from employees who took information resources with them when they left the business.Any form of data loss is a threat to a business, but the report notes that problems can arise both from employees actually taking data with them when they leave, and when departing employees have parked corporate information in locations like cloud storage services that are unknown or inaccessible to their former employer.To read this article in full or to leave a comment, please click here

Sensitive data often follows former employees out the door

There is an old cliché that says a company's most valuable assets walk out the door at the end of the day. However, according to a recent security report, some other valuable assets are walking out the door as well, and they're not coming back.In a survey from Osterman Research, 69 percent of organizations polled say that they have suffered significant data or knowledge loss resulting from employees who took information resources with them when they left the business.Any form of data loss is a threat to a business, but the report notes that problems can arise both from employees actually taking data with them when they leave, and when departing employees have parked corporate information in locations like cloud storage services that are unknown or inaccessible to their former employer.To read this article in full or to leave a comment, please click here

Failure to communicate helps ransomware prosper

At least one of the major reasons for the ongoing exponential increase in ransomware as a criminal business model could be summed up with the iconic line from the prison boss in 1967’s “Cool Hand Luke”: “What we got here is a failure to communicate.”That was a recurring theme from those on a “Ransomware Panel” Thursday at SOURCE Boston 2017, moderated by Paul Roberts, founder and editor in chief of The Security Ledger.The communication breakdown occurs at all levels, the panelists said, starting with victims. ■ MORE FROM SOURCE Boston: Cyber infrastructure: Too big to fail, and failing Frank McLaughlin, a Boston Police detective, said when a business gets hit with ransomware, “the police are the last people they want to call, for obvious reasons. It becomes a public record.”To read this article in full or to leave a comment, please click here

Failure to communicate helps ransomware prosper

At least one of the major reasons for the ongoing exponential increase in ransomware as a criminal business model could be summed up with the iconic line from the prison boss in 1967’s “Cool Hand Luke”: “What we got here is a failure to communicate.”That was a recurring theme from those on a “Ransomware Panel” Thursday at SOURCE Boston 2017, moderated by Paul Roberts, founder and editor in chief of The Security Ledger.The communication breakdown occurs at all levels, the panelists said, starting with victims. ■ MORE FROM SOURCE Boston: Cyber infrastructure: Too big to fail, and failing Frank McLaughlin, a Boston Police detective, said when a business gets hit with ransomware, “the police are the last people they want to call, for obvious reasons. It becomes a public record.”To read this article in full or to leave a comment, please click here

13% off Seagate Backup Plus Slim 2TB Portable External Hard Drive USB 3.0 – Deal Alert

The Backup Plus Slim Portable Drive is the simple, one-click way to protect and share your entire digital life. At 12.1 millimeters thin and a generous 2TB of storage, it’s ready to take with you and go. All your photos, movies, and videos can be backed up using the downloadable Seagate Dashboard software, including the ones you’ve shared on Facebook, Flickr, and YouTube. Run a one-click backup or schedule an automatic backup plan to protect your files on your Backup Plus Slim Portable Drive at your convenience. High-speed USB 3.0 and 2.0 connectivity offers plug-and-play functionality without the need of an external power supply. Compatible with both PC and Mac systems. The drive averages 4 out of 5 stars from over 11,600 people on Amazon (read reviews). The typical list price has been reduced 13% to just $69.99 for the 2TB model. See it now on Amazon.To read this article in full or to leave a comment, please click here

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month.Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as targets for a set of international hackers who have been vetted by HackerOne, which is running the program.+More on Network World: IBM: Financial services industry bombarded by malware, security threats+To read this article in full or to leave a comment, please click here

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month.Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as targets for a set of international hackers who have been vetted by HackerOne, which is running the program.+More on Network World: IBM: Financial services industry bombarded by malware, security threats+To read this article in full or to leave a comment, please click here

Apple fanboys cited as Merriam-Webster herds ‘sheeple’ into dictionary

“Wake up!” the good folks a Merriam-Webster just tweeted. “Sheeple is in the dictionary now.” Merriam-Webster via Twitter And while the induction of such casual slang is sure to offend some, none will likely take great umbrage than Apple zealots, whose zealotry is cited by the dictionary as an example of the proper use of the word.To read this article in full or to leave a comment, please click here

Apple fanboys cited as Merriam-Webster herds ‘sheeple’ into dictionary

“Wake up!” the good folks a Merriam-Webster just tweeted. “Sheeple is in the dictionary now.” Merriam-Webster via Twitter And while the induction of such casual slang is sure to offend some, none will likely take great umbrage than Apple zealots, whose zealotry is cited by the dictionary as an example of the proper use of the word.To read this article in full or to leave a comment, please click here