Archive

Category Archives for "Networking"

iPhone 8 Rumor Rollup: Tim Cook cites rumors; LTE shortfall; envisioning a function area

If you think you’re sick of the iPhone 8 rumors, pity Apple CEO Tim Cook, who acknowledged during a Q&A following the company’s earnings results announcement this past week that “earlier and much more frequent reports about future iPhones” did in fact “pause” purchases of current models.451 Research, issuing smartphone demand survey findings this week, concurred with Cook's assessment, noting that while Apple remains the preferred manufacturer among planned smartphone buyers surveyed, much fewer of them are planning purchases in the next 90 days as they anticipate iPhone 7s, iPhone 7s Plus and possibly a 10th-anniversary premium phone. To read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: Tim Cook cites rumors; LTE shortfall; envisioning a function area

If you think you’re sick of the iPhone 8 rumors, pity Apple CEO Tim Cook, who acknowledged during a Q&A following the company’s earnings results announcement this past week that “earlier and much more frequent reports about future iPhones” did in fact “pause” purchases of current models.451 Research, issuing smartphone demand survey findings this week, concurred with Cook's assessment, noting that while Apple remains the preferred manufacturer among planned smartphone buyers surveyed, much fewer of them are planning purchases in the next 90 days as they anticipate iPhone 7s, iPhone 7s Plus and possibly a 10th-anniversary premium phone. To read this article in full or to leave a comment, please click here

Anonymity and Abuse Reports

Last Thursday, ProPublica published an article critiquing our handling of some abuse reports that we receive. Feedback from the article caused us to reevaluate how we handle abuse reports. As a result, we've decided to update our abuse reporting system to allow individuals reporting threats and child sexual abuse material to do so anonymously. We are rolling this change out and expect it to be available by the end of the week.

I appreciate the feedback we received. How we handle abuse reports has evolved over the last six and a half years of Cloudflare's history. I wanted to take this opportunity to walk through some of the rationale that got us to this point and caused us to have a blindspot to the case that was highlighted in the article.

What Is Cloudflare?

Cloudflare is not a hosting provider. We do not store the definitive copy of any of the content that someone may want to file an abuse claim about. If we terminate a customer it doesn’t make the content go away. Instead, we are more akin to a specialized network. One of the functions of the network that we provide is to add security to the content Continue reading

HandBrake mirror server hacked to serve up Proton RAT for Macs

If you recently downloaded the HandBrake app for Mac, then there’s a good chance your system is infected with a nasty Remote Access Trojan (RAT).On Saturday, the HandBrake team posted a security alert after learning one of the mirror download servers was hacked. The attacker replaced the Mac version of the HandBrake client with a malicious version.In case you don’t know, HandBrake is an open source video transcoder app which allows users to convert video to other formats.The HandBrake team said an attacker compromised the download mirror server at download.handbrake.fr and replaced the HandBrake-1.0.7.dmg installer file with a version infected with a new variant of the Proton RAT.To read this article in full or to leave a comment, please click here

HandBrake mirror server hacked to serve up Proton RAT for Macs

If you recently downloaded the HandBrake app for Mac, then there’s a good chance your system is infected with a nasty Remote Access Trojan (RAT).On Saturday, the HandBrake team posted a security alert after learning one of the mirror download servers was hacked. The attacker replaced the Mac version of the HandBrake client with a malicious version.In case you don’t know, HandBrake is an open source video transcoder app which allows users to convert video to other formats.The HandBrake team said an attacker compromised the download mirror server at download.handbrake.fr and replaced the HandBrake-1.0.7.dmg installer file with a version infected with a new variant of the Proton RAT.To read this article in full or to leave a comment, please click here

Email dump hits French candidate Macron ahead of election

Another political campaign has been hit by an email dump. This time, the target is French presidential candidate Emmanuel Macron.On Friday, his campaign said a massive and coordinated hack had breached the email inboxes of several staffers. This came after a mysterious user named “EMLEAKS” apparently dumped the stolen data through torrent files on text storage site Pastebin.It’s unclear if the information in the dump is genuine. Allegedly, the dump contains a 9GB trove of emails and photos. The torrent files, which were hosted on Archive.org, are no longer available there.But Macron’s campaign said the leaked files have been spreading over social media as the country prepares to vote for a new president on Sunday.To read this article in full or to leave a comment, please click here

Email dump hits French candidate Macron ahead of election

Another political campaign has been hit by an email dump. This time, the target is French presidential candidate Emmanuel Macron.On Friday, his campaign said a massive and coordinated hack had breached the email inboxes of several staffers. This came after a mysterious user named “EMLEAKS” apparently dumped the stolen data through torrent files on text storage site Pastebin.It’s unclear if the information in the dump is genuine. Allegedly, the dump contains a 9GB trove of emails and photos. The torrent files, which were hosted on Archive.org, are no longer available there.But Macron’s campaign said the leaked files have been spreading over social media as the country prepares to vote for a new president on Sunday.To read this article in full or to leave a comment, please click here

Patch to fix Intel-based PCs with enterprise bug rolls out next week

Next week, PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack.   Intel on Friday released a new notice urging clients to take steps to secure their systems.The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out. To read this article in full or to leave a comment, please click here

Patch to fix Intel-based PCs with enterprise bug rolls out next week

Next week, PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack.   Intel on Friday released a new notice urging clients to take steps to secure their systems.The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out. To read this article in full or to leave a comment, please click here

Red Hat nicely positioned for the turn to cloud

Red Hat CEO James Whitehurst kicked off the company’s Summit meeting in Boston this week, which attracted more than 6,000 people, up 20% from last year. Network World Editor in Chief John Dix caught up with Whitehurst at the show for an update on the company’s position and prospects. One of your keynote speakers said 84% of Red Hat customers have cloud deployment strategies. Is the shift to cloud accelerating your business?I do think the shift to cloud is helping. We have data that shows our customers who use cloud actually grow faster in total with us than ones who don’t. The promise of cloud accelerates the Unix-to-Linux migration as people modernize applications to be able to move to cloud -- whether they move immediately or not -- because clouds primarily run Linux. In general, anything that makes people move to a new architecture is good for us because we have a high share of new architecture relative to old. I think that’s a big, big driver.To read this article in full or to leave a comment, please click here

Are next-generation firewalls legacy technology?

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.Fast forward to 2017, and the bloom is coming off the NGFW rose for several reasons: Requirements have changed. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Back then, mobile and remote office workers VPNed into the corporate network and traffic was backhauled for Internet ingress/egress. This model is changing rapidly, however. As cloud computing, SaaS, mobility and broadband networks evolved, mobile and remote worker connection are often dual homed, offering direct connections to the public internet. Once this happens, NGFWs lose their usefulness, offering no visibility or control of network traffic. Software is eating the world. Remember Marc Andreessen’s famous essay about the rise of software? Ironically, his publication doesn’t dedicate a single word to cybersecurity, but make no mistake, software is eating Continue reading

Are next-generation firewalls legacy technology?

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.Fast forward to 2017, and the bloom is coming off the NGFW rose for several reasons: Requirements have changed. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Back then, mobile and remote office workers VPNed into the corporate network and traffic was backhauled for Internet ingress/egress. This model is changing rapidly, however. As cloud computing, SaaS, mobility and broadband networks evolved, mobile and remote worker connection are often dual homed, offering direct connections to the public internet. Once this happens, NGFWs lose their usefulness, offering no visibility or control of network traffic. Software is eating the world. Remember Marc Andreessen’s famous essay about the rise of software? Ironically, his publication doesn’t dedicate a single word to cybersecurity, but make no mistake, software is eating Continue reading

40% off Dell Computer Ultrasharp U2415 24.0-Inch Screen LED Monitor – Deal Alert

The Dell Ultrasharp monitor has virtual borderless viewing ideal for a multi-monitor set-up; with more vertical resolution available on the U2415 16:10 monitor . Fully adjustable features like tilt, swivel, height adjust including pivoting both 90 Degree clockwise or counter-clockwise, allowing the thinnest possible edges to be placed side by side . Connect seamlessly to other peripherals simultaneously without compromising on picture quality via digital connectivity. A high current USB 3.0 charging port supplies twice the power for charging and powering BC1.2 compatible devices, and DP1.2 supports multi-stream transport.  This monitor averages 4.5 out of 5 stars from over 1,00 people on Amazon (read reviews). The typical list price has been reduced 40% to just $239.85. See it now on Amazon.To read this article in full or to leave a comment, please click here

39% off Dell Computer Ultrasharp U2415 24.0-Inch Screen LED Monitor – Deal Alert

The Dell Ultrasharp monitor has virtual borderless viewing ideal for a multi-monitor set-up; with more vertical resolution available on the U2415 16:10 monitor . Fully adjustable features like tilt, swivel, height adjust including pivoting both 90 Degree clockwise or counter-clockwise, allowing the thinnest possible edges to be placed side by side . Connect seamlessly to other peripherals simultaneously without compromising on picture quality via digital connectivity. A high current USB 3.0 charging port supplies twice the power for charging and powering BC1.2 compatible devices, and DP1.2 supports multi-stream transport.  This monitor averages 4.5 out of 5 stars from over 1,00 people on Amazon (read reviews). The typical list price has been reduced 39% to just $244.99. See it now on Amazon.To read this article in full or to leave a comment, please click here

Chromebook shipments surge by 38 percent, cutting into Windows 10 PCs

In a slowing PC market, Chromebooks siphoned market share away from Windows PCs in 2016 as their popularity grew outside the education market.Chromebook shipments grew by a stunning 38 percent in 2016 compared to 2015. Gartner estimated 9.4 million Chromebooks shipped, compared to 6.8 million units in 2015.The number is just a fraction of overall PC shipments, but growth came in an otherwise down PC market. Overall PC shipments in 2016 were about 270 million units, a decline of about 6.2 percent, according to Gartner.Looking forward, 2016 may go down as the best year ever for Chromebook shipment growth. Gartner is estimating shipments to continue growing in the coming years but at a slower pace.To read this article in full or to leave a comment, please click here