Archive

Category Archives for "Networking"

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here

The real-world guide to Windows 10 migration

With Windows 10 already deployed on more than 400 million computers, it’s hard to argue with its success. But the fastest adoption rate of any Windows release has thus far played out predominantly on consumer devices. The enterprise tells a different story, with organizations still mostly on Windows 7. But the change is coming fast. Brad Anderson, corporate vice president at Microsoft, recently announced that 86 percent of enterprises will upgrade to Windows 10 within three to four years; of these, organizations 47 percent said they will upgrade in the next 12 months.To read this article in full or to leave a comment, please click here(Insider Story)

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here

Computer forensics follows the bread crumbs left by perpetrators

The boss gets tipped off that an employee might be leaving the company and in so doing is trying to grab as many clients as possible to take with him to his new job. The company brings in computer forensic specialists to look through the employee’s actions online to find the evidence before confronting the employee.Alfred Demirjian, president and CEO of computer forensic company TechFusion, has seen that and many other scenarios in the 30 years he has been in the business--anything from an employee sabotaging a former company through hijacking an email account to misusing the internet on company time. Commercial software allows his company to dig deep into an employee’s social media postings and texts, or to track them by GPS if they have a company-owned smartphone.To read this article in full or to leave a comment, please click here

Computer forensics follows the bread crumbs left by perpetrators

The boss gets tipped off that an employee might be leaving the company and in so doing is trying to grab as many clients as possible to take with him to his new job. The company brings in computer forensic specialists to look through the employee’s actions online to find the evidence before confronting the employee.Alfred Demirjian, president and CEO of computer forensic company TechFusion, has seen that and many other scenarios in the 30 years he has been in the business--anything from an employee sabotaging a former company through hijacking an email account to misusing the internet on company time. Commercial software allows his company to dig deep into an employee’s social media postings and texts, or to track them by GPS if they have a company-owned smartphone.To read this article in full or to leave a comment, please click here

BrandPost: Five New Rules For The WAN In The Digital Era

It’s safe to say that no one likes change.It makes us uncomfortable and puts us in positions that we are not familiar with. This is certainly true in our personal lives, but it’s also true in our jobs. It seems every time there is some kind of major technology shift everything changes, and IT needs to adapt, adopt new best practices, and develop new skills. Think back to the transition from mainframes to PC computing, TDM voice to VoIP, and physical servers to virtualization. Each of these seismic shifts required IT organizations to completely change the way they operate.The enterprise WAN is in the midst of a major transformation, requiring network managers and administrators to do things differently and to develop new skills. The key to developing a plan for the new world is to understand the new rules of networking in the digital era. Below are five “rules of the road” for the WAN in the digital era:To read this article in full or to leave a comment, please click here

New products of the week 5.8.17

New products of the weekImage by Aspect SoftwareOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Browser Stored Password Discovery ToolImage by thycoticTo read this article in full or to leave a comment, please click here

The first step in a digital transformation strategy

Virtually all digital transformation strategies focus on the network edge, as the goal is to enable agility and autonomy where technology and business meet. This edge is composed of internal and external users and their devices on the wireless network, as well as those who may interface over the Internet via VPN or even through mobile apps or websites that facilitate users. + Also on Network World: 3 telltale signs it's a real digital transformation + The focus on the edge has changed significantly as business explore customer and employee engagement, the Internet of Things, and the integration of layers of business intelligence and analytics over the top. Multidisciplinary teams are now needed to ensure there is alignment between the business and IT, and full participation is required to get the right requirements up front. To read this article in full or to leave a comment, please click here

The first step in a digital transformation strategy

Virtually all digital transformation strategies focus on the network edge, as the goal is to enable agility and autonomy where technology and business meet. This edge is composed of internal and external users and their devices on the wireless network, as well as those who may interface over the Internet via VPN or even through mobile apps or websites that facilitate users. + Also on Network World: 3 telltale signs it's a real digital transformation + The focus on the edge has changed significantly as business explore customer and employee engagement, the Internet of Things, and the integration of layers of business intelligence and analytics over the top. Multidisciplinary teams are now needed to ensure there is alignment between the business and IT, and full participation is required to get the right requirements up front. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Network check-ups critically important to a business’ health

It’s best practice that every year we see our primary care doctor for a full physical exam. According to the CDC, regular health check-ups can help find problems before they start and improve the chances of treatment and recovery from illnesses. So, with just an annual exam, we should be in great shape, right? Most Americans, of all ages, are in poorer health when compared to their counterparts in comparable countries. So, where’s the disconnect, and what lessons can those of us in the technology industry take away?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Network check-ups critically important to a business’ health

It’s best practice that every year we see our primary care doctor for a full physical exam. According to the CDC, regular health check-ups can help find problems before they start and improve the chances of treatment and recovery from illnesses. So, with just an annual exam, we should be in great shape, right? Most Americans, of all ages, are in poorer health when compared to their counterparts in comparable countries. So, where’s the disconnect, and what lessons can those of us in the technology industry take away?To read this article in full or to leave a comment, please click here

IDG Contributor Network: An API recipe for the disruption of traditional industries

The use of APIs is a good indicator of an enterprise’s ability to adapt to the digital needs of customers. APIs are at the heart of a business’ ability to develop products faster, seamlessly integrate data systems, and extend their reach to new partners and other value co-creators.Business readiness for digital You can often tell a business’ API readiness just by looking at their website. If they have an online chat system for customers to reach out, offer email or white paper downloads, have an intuitive, engaging design, and offer some way to contact them via mobile devices, chances are they are at least taking steps towards being digitally ready.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How IoT faded when net neutrality became ‘pay to play’

It’s 2020, and the Internet of Things (IoT) is in decline. What happened? People whisper that it started in 2017 when net neutrality was killed.In the spirit of George Orwell’s Animal Farm, here’s what may unfold if net neutrality becomes "pay to play."Loss of net neutrality: The beginning The regulations were changed with the promise of providing "better" internet access. Internet carriers were given free rein to charge what they liked for traffic on their networks. “Free at last, free at last. Thank God Almighty carriers are free to rule at last,” exclaimed Bill Paider, a fictional carrier executive paraphrasing Martin Luther King Jr. "We've even published a Carrier Code of Conduct to guide our improved public service!"To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smart buildings start with awareness

I want to work in an energy-efficient smart building. It would have advanced energy systems that would ensure no watt gets wasted. It would have lighting, like my fridge, that would magically turn off when unneeded, and doors that would reliably swish open Star Trek-style when and only when appropriate.Unfortunately, most buildings aren’t like that today. The majority of commercial buildings are relatively barbaric with primitive infrastructure oblivious to its purpose or costs. Far too often, building managers lack basic visibility into the infrastructure they are responsible for.+ Also on Network World: How IoT with bio-mimicry reduces indoor air pollution + However, times have changed, and today it’s appropriate to be green, although the interpretation of “green” ranges from environmental to financial motivations. Of course, a building with smart infrastructure might not always be viable. Renters wouldn’t want to pay for the upgrades. And, as long as infrastructure is otherwise working, it might not be green at all to replace it. A better option could be to focus on visibility.To read this article in full or to leave a comment, please click here

7 things Microsoft left out of Windows 10

As usual in the tech industry, not everything that’s previewed by a vendor shows up in the final product. That’s what happened with the latest update to Windows 10, the Creators Update, which was released last month. Microsoft showed off some big changes and some smaller tweaks in its Insider Previews that are nowhere to be found in the Creators Update.To read this article in full or to leave a comment, please click here(Insider Story)

Qualcomm’s Quick Charge 4 is coming in phones midyear

If you hate waiting for your smartphone to charge, relief is coming soon.After some hiccups, Qualcomm's superfast charging technology, called Quick Charge 4, will be in smartphones around the middle of this year.Qualcomm says Quick Charge 4 is one of the fastest smartphone battery technologies. It can charge a smartphone up to 50 percent in less than 15 minutes, or give enough juice for five hours of talk time in five minutes, the chip maker claims.The new charging technology is about 20 percent faster than its predecessor, Quick Charge 3, which is in many smartphones from Sony, LG, HTC and Motorola.To read this article in full or to leave a comment, please click here

12 top tech fields of the future

Top jobsImage by ThinkstockTech jobs of the future will include programmers, analysts, application and system developers, database and network administrators, engineers, designers, architects, scientists, researchers, statisticians, specialists, project and system managers, system and data integrators, technicians and tech support, quality controllers, trainers, and consultants in each of the following 12 areas. (Read the full story: Hot jobs of the future.)To read this article in full or to leave a comment, please click here