Archive

Category Archives for "Networking"

Email dump hits French candidate Macron ahead of election

Another political campaign has been hit by an email dump. This time, the target is French presidential candidate Emmanuel Macron.On Friday, his campaign said a massive and coordinated hack had breached the email inboxes of several staffers. This came after a mysterious user named “EMLEAKS” apparently dumped the stolen data through torrent files on text storage site Pastebin.It’s unclear if the information in the dump is genuine. Allegedly, the dump contains a 9GB trove of emails and photos. The torrent files, which were hosted on Archive.org, are no longer available there.But Macron’s campaign said the leaked files have been spreading over social media as the country prepares to vote for a new president on Sunday.To read this article in full or to leave a comment, please click here

Patch to fix Intel-based PCs with enterprise bug rolls out next week

Next week, PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack.   Intel on Friday released a new notice urging clients to take steps to secure their systems.The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out. To read this article in full or to leave a comment, please click here

Patch to fix Intel-based PCs with enterprise bug rolls out next week

Next week, PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack.   Intel on Friday released a new notice urging clients to take steps to secure their systems.The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out. To read this article in full or to leave a comment, please click here

Red Hat nicely positioned for the turn to cloud

Red Hat CEO James Whitehurst kicked off the company’s Summit meeting in Boston this week, which attracted more than 6,000 people, up 20% from last year. Network World Editor in Chief John Dix caught up with Whitehurst at the show for an update on the company’s position and prospects. One of your keynote speakers said 84% of Red Hat customers have cloud deployment strategies. Is the shift to cloud accelerating your business?I do think the shift to cloud is helping. We have data that shows our customers who use cloud actually grow faster in total with us than ones who don’t. The promise of cloud accelerates the Unix-to-Linux migration as people modernize applications to be able to move to cloud -- whether they move immediately or not -- because clouds primarily run Linux. In general, anything that makes people move to a new architecture is good for us because we have a high share of new architecture relative to old. I think that’s a big, big driver.To read this article in full or to leave a comment, please click here

Are next-generation firewalls legacy technology?

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.Fast forward to 2017, and the bloom is coming off the NGFW rose for several reasons: Requirements have changed. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Back then, mobile and remote office workers VPNed into the corporate network and traffic was backhauled for Internet ingress/egress. This model is changing rapidly, however. As cloud computing, SaaS, mobility and broadband networks evolved, mobile and remote worker connection are often dual homed, offering direct connections to the public internet. Once this happens, NGFWs lose their usefulness, offering no visibility or control of network traffic. Software is eating the world. Remember Marc Andreessen’s famous essay about the rise of software? Ironically, his publication doesn’t dedicate a single word to cybersecurity, but make no mistake, software is eating Continue reading

Are next-generation firewalls legacy technology?

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.Fast forward to 2017, and the bloom is coming off the NGFW rose for several reasons: Requirements have changed. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Back then, mobile and remote office workers VPNed into the corporate network and traffic was backhauled for Internet ingress/egress. This model is changing rapidly, however. As cloud computing, SaaS, mobility and broadband networks evolved, mobile and remote worker connection are often dual homed, offering direct connections to the public internet. Once this happens, NGFWs lose their usefulness, offering no visibility or control of network traffic. Software is eating the world. Remember Marc Andreessen’s famous essay about the rise of software? Ironically, his publication doesn’t dedicate a single word to cybersecurity, but make no mistake, software is eating Continue reading

40% off Dell Computer Ultrasharp U2415 24.0-Inch Screen LED Monitor – Deal Alert

The Dell Ultrasharp monitor has virtual borderless viewing ideal for a multi-monitor set-up; with more vertical resolution available on the U2415 16:10 monitor . Fully adjustable features like tilt, swivel, height adjust including pivoting both 90 Degree clockwise or counter-clockwise, allowing the thinnest possible edges to be placed side by side . Connect seamlessly to other peripherals simultaneously without compromising on picture quality via digital connectivity. A high current USB 3.0 charging port supplies twice the power for charging and powering BC1.2 compatible devices, and DP1.2 supports multi-stream transport.  This monitor averages 4.5 out of 5 stars from over 1,00 people on Amazon (read reviews). The typical list price has been reduced 40% to just $239.85. See it now on Amazon.To read this article in full or to leave a comment, please click here

39% off Dell Computer Ultrasharp U2415 24.0-Inch Screen LED Monitor – Deal Alert

The Dell Ultrasharp monitor has virtual borderless viewing ideal for a multi-monitor set-up; with more vertical resolution available on the U2415 16:10 monitor . Fully adjustable features like tilt, swivel, height adjust including pivoting both 90 Degree clockwise or counter-clockwise, allowing the thinnest possible edges to be placed side by side . Connect seamlessly to other peripherals simultaneously without compromising on picture quality via digital connectivity. A high current USB 3.0 charging port supplies twice the power for charging and powering BC1.2 compatible devices, and DP1.2 supports multi-stream transport.  This monitor averages 4.5 out of 5 stars from over 1,00 people on Amazon (read reviews). The typical list price has been reduced 39% to just $244.99. See it now on Amazon.To read this article in full or to leave a comment, please click here

Chromebook shipments surge by 38 percent, cutting into Windows 10 PCs

In a slowing PC market, Chromebooks siphoned market share away from Windows PCs in 2016 as their popularity grew outside the education market.Chromebook shipments grew by a stunning 38 percent in 2016 compared to 2015. Gartner estimated 9.4 million Chromebooks shipped, compared to 6.8 million units in 2015.The number is just a fraction of overall PC shipments, but growth came in an otherwise down PC market. Overall PC shipments in 2016 were about 270 million units, a decline of about 6.2 percent, according to Gartner.Looking forward, 2016 may go down as the best year ever for Chromebook shipment growth. Gartner is estimating shipments to continue growing in the coming years but at a slower pace.To read this article in full or to leave a comment, please click here

Fatboy ransomware adjusts demands based on local price of a Big Mac

A new ransomware-for-hire scheme called Fatboy adjusts the ransom it charges based on international exchange rates so it’s more likely the victims get hit for the largest amount they can reasonably pay.Posted on Exploit, a Russian-language online forum, Fatboy automatically adjusts ransom demands according to where the victim is located, according to the Recorded Future blog.That adjustment is based on the Big Mac Index, which was created by The Economist as a way to show whether official international monetary exchange rates line up with the price charged for a certain product – the Big Mac burger sold by McDonald’s – from country to country. The index tells whether currencies are overvalued or undervalued based on what McDonald’s charges in each country.To read this article in full or to leave a comment, please click here

Fatboy ransomware adjusts demands based on local price of a Big Mac

A new ransomware-for-hire scheme called Fatboy adjusts the ransom it charges based on international exchange rates so it’s more likely the victims get hit for the largest amount they can reasonably pay.Posted on Exploit, a Russian-language online forum, Fatboy automatically adjusts ransom demands according to where the victim is located, according to the Recorded Future blog.That adjustment is based on the Big Mac Index, which was created by The Economist as a way to show whether official international monetary exchange rates line up with the price charged for a certain product – the Big Mac burger sold by McDonald’s – from country to country. The index tells whether currencies are overvalued or undervalued based on what McDonald’s charges in each country.To read this article in full or to leave a comment, please click here

‘Found a leaky ethernet port’

As a regular reader of Reddit’s section devoted to system administration, I have come to understand that subject lines such as “Found a leaky ethernet port” do no always mean what one might assume they mean. Today’s example: “This is going to be a fun couple of days,” bemoans the Redditor who discovered this leak. “It's been raining for two days straight and it's expected to continue for another two.”To read this article in full or to leave a comment, please click here

‘Found a leaky ethernet port’

As a regular reader of Reddit’s section devoted to system administration, I have come to understand that subject lines such as “Found a leaky ethernet port” do no always mean what one might assume they mean. Today’s example: “This is going to be a fun couple of days,” bemoans the Redditor who discovered this leak. “It's been raining for two days straight and it's expected to continue for another two.”To read this article in full or to leave a comment, please click here

‘Found a leaky ethernet port’

As a regular reader of Reddit’s section devoted to system administration, I have come to understand that subject lines such as “Found a leaky ethernet port” do no always mean what one might assume they mean. Today’s example: “This is going to be a fun couple of days,” bemoans the Redditor who discovered this leak. “It's been raining for two days straight and it's expected to continue for another two.”To read this article in full or to leave a comment, please click here