Archive

Category Archives for "Networking"

Email security appears grounded as attacks continue to take flight

Recently inboxes have been hit by the so-called “airline phishing attack.” It is a new take on an old phishing email. It uses multiple techniques to capture sensitive data and deploy an advanced persistent threat (APT).Barracuda Networks has seen this attack with several of its customers, especially in industries that deal with frequent shipping of goods or employee travel, such as logistics, shipping, and manufacturing. The attacker will either impersonate a travel agency or even an employee in HR or finance who is sending an airline ticket or e-ticket. The email will be constructed to appear inconspicuous.The attacker will have researched his target, selecting the airline, destination and price so that these details look legitimate in the context of the company and the recipient, Barracuda reports. After getting the employee to open the email, an APT embedded in an email attachment goes into action. The attachment is typically formatted as a PDF or DOCX document. In this attack, the malware will be executed upon opening the document. To read this article in full or to leave a comment, please click here

Email security appears grounded as attacks continue to take flight

Recently inboxes have been hit by the so-called “airline phishing attack.” It is a new take on an old phishing email. It uses multiple techniques to capture sensitive data and deploy an advanced persistent threat (APT).Barracuda Networks has seen this attack with several of its customers, especially in industries that deal with frequent shipping of goods or employee travel, such as logistics, shipping, and manufacturing. The attacker will either impersonate a travel agency or even an employee in HR or finance who is sending an airline ticket or e-ticket. The email will be constructed to appear inconspicuous.The attacker will have researched his target, selecting the airline, destination and price so that these details look legitimate in the context of the company and the recipient, Barracuda reports. After getting the employee to open the email, an APT embedded in an email attachment goes into action. The attachment is typically formatted as a PDF or DOCX document. In this attack, the malware will be executed upon opening the document. To read this article in full or to leave a comment, please click here

Top 5 email security best practices to prevent malware distribution

A trusted channelImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here

Top 5 email security best practices to prevent malware distribution

A trusted channelImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here

How company culture can make or break your business

If there's one big lesson to be learned from the recent revelations about ridesharing startup and Silicon Valley darling Uber's culture, it's this: Culture can be a four-letter word if it is ignored. Culture can be a four-letter word if is toxic. And toxic cultures kill more businesses than recessions. And it is liable to kill Uber too, says Steven L. Blue, president and CEO of Miller Ingenuity and author of American Manufacturing 2.0: What Went Wrong and How to Make It Right.To read this article in full or to leave a comment, please click here

Can the IoT transform loading operations?

Transporting freight operates at a massive scale in the U.S., most of it hauled by trucks that are the lifeblood of the American economy. But the trailers those trucks are hauling typically have a load efficiency of 70 to 75 percent, says Tom Bianculli, CTO of Zebra Technologies. The remaining 25 to 30 percent is air.But smart environments powered by the internet of things (IoT) can change that, Bianculli says. Zebra's new SmartPack Trailer offering, announced at ProMat 2017 in Chicago today, uses sensors on the dock doors of distribution facilities, which peer into each trailer using a combination of 3D depth-sensing technology and a conventional megapixel camera.To read this article in full or to leave a comment, please click here

IT service providers get low marks on innovation

Nearly half (48 percent) of the customers of IT service providers aren't satisfied with the service they’re getting, according to Everest Group’s global survey of 132 enterprises. That figure includes 25 percent who are “highly unsatisfied.”To read this article in full or to leave a comment, please click here(Insider Story)

Internet@MySchool – a pilot project connecting Yemeni schools in Sanaa and Aden

As a country, Yemen is among the least with Internet connectivity in the Middle East. This is particularly troubling given the rise of Internet access across the globe. Furthermore, the youth in Yemen constitute the majority of the population yet are being left behind because of the lack of Internet access in schools due to poor economic conditions coupled with other priorities that supersede Internet access.

Fahmi Albaheth

Encryption critical for protecting mobile device data

If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.For example, more people are storing copies of their driver’s license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.One very critical step you can take to secure this is to encrypt your mobile data.To read this article in full or to leave a comment, please click here

Encryption critical for protecting mobile device data

If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.For example, more people are storing copies of their driver’s license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.One very critical step you can take to secure this is to encrypt your mobile data.To read this article in full or to leave a comment, please click here

BrandPost: Why Cross-Domain Capabilities Matter for Automation: Two Business Scenarios

The digital economy has IT up against the wall. Lines of business are focused on boosting innovation and enhancing the customer experience through digital transformation initiatives, but network complexity can be a significant obstacle for IT. According to one study, 75% of CIOs admit that the network is impacting their organization’s ability to achieve business goals, with an estimated 35% of all network downtime attributed to human error.This problem has understandably led IT to embrace automation in each technology domain, including the network, as a means of accelerating service delivery. But automating service delivery within each domain alone isn't enough. There must be seamless automation across the entire data center, or the ability to perform consistently and efficiently will suffer serious setbacks. It’s this growing need for agility and operational efficiency that ultimately validates the business case for introducing open, cross-domain automation capabilities.To read this article in full or to leave a comment, please click here

Announcing the New NSX Community at VMUG!

If you want to go fast, go alone.

If you want to go far, go together.

The premise behind this saying is the reason why VMware and VMUG are excited to announce the creation of the NSX community at VMUG.  The education, certification, and adoption of new technologies can be met with fear and uncertainty as legacy traditions get challenged.  By building a community, we can provide strength in numbers that can facilitate learning and help people develop a mindset of embracing the people, process, and tooling challenges that come with VMware NSX.

This new community will be dedicated to network and security virtualization.  It will serve as a robust resource for individuals who are motivated to learn more about VMware NSX and its tremendous impact on the data centers of today and tomorrow.  VMware NSX is at the core of next-generation enterprise solutions for IT automation, micro-segmentation, application availability, and cross-cloud architecture.  The community will offer an opportunity for Q&A with NSX experts and product managers, special community content, discussions with peers, and much more.

VMUG logo

The launch of the NSX community at VMUG comes ripe with inherent benefits, but in order to show our Continue reading

Apple said to drop Imagination’s IP in favor of own graphics chips

Apple will soon stop using intellectual property from Imagination Technologies Group for graphics processing units for its iPhone and other devices, as it is working on a separate, independent graphics design for its products, the chip technology company said Monday.But the U.K. company is not giving up without a fight as it doubts Apple can develop a brand new GPU without infringing Imagination’s intellectual property.Apple held an 8.5 percent share of the issued share capital of Imagination as of April 30 last year. The iPhone maker said in a filing in March last year that it had discussions with Imagination about a possible acquisition, though it did not have plans to make an offer at that time. Apple is Imagination's largest customer and it described the iPhone maker as "essential to the business of the Group" in its annual report for 2016.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security in an insecure world

If I could give only one piece advice for CTOs and IT teams, it would be this: Data security is not just an IT task—it comes down to people and processes. As a startup CTO, you’re often going to lead the charge when it comes to information security for your firm.  According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches in 2016—a 40 percent increase over 2015. We’ve all seen the headlines and the high-profile victims, but attackers don’t discriminate when it comes to security breaches. Any company can become a victim, leading to losses of your data, your customers’ data, financial information, proprietary product information, and, ultimately, a loss of goodwill in the market. As more processes move online and into the cloud, companies increasingly feel this burden of staying secure.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security in an insecure world

If I could give only one piece advice for CTOs and IT teams, it would be this: Data security is not just an IT task—it comes down to people and processes. As a startup CTO, you’re often going to lead the charge when it comes to information security for your firm.  According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches in 2016—a 40 percent increase over 2015. We’ve all seen the headlines and the high-profile victims, but attackers don’t discriminate when it comes to security breaches. Any company can become a victim, leading to losses of your data, your customers’ data, financial information, proprietary product information, and, ultimately, a loss of goodwill in the market. As more processes move online and into the cloud, companies increasingly feel this burden of staying secure.To read this article in full or to leave a comment, please click here