Archive

Category Archives for "Networking"

Cisco issues critical warning around Apache Struts2 vulnerability

Cisco's security team today called the weakness in Apache Struts “critical” and is evaluating many its products to assess the impact.The company said it will publish a list of vulnerable products here as it learns of them.Earlier this week Apache revealed a vulnerability in the Jakarta multipart parser used in Apache Struts2 that could let an attacker execute commands remotely on the targeted system using what’s known as acrafted Content-Type header value.-More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here

70% off PaperPort Professional 14 – Deal Alert

One thing for certain is that every year we have to file our taxes. Stuck between gathering all the correct documentation and making sure you have everything you need in one place, it can become a strenuous process. Take control of your documents and have instant access to them all. From scanning and converting, to editing and sharing files, with PaperPort Professional 14 simplify document management and spend less time thinking about missing files and more on getting work done. Nuance is currently offering PaperPort Professional 14 at the discounted price of $600, a good deal considering its $200 list price. Check this deal now on Nuance.To read this article in full or to leave a comment, please click here

33% off YETI Hopper 20 Portable Cooler – Deal Alert

The YETI Hopper 20 ice-for-days portable cooler and is tough as nails so it can be hauled anywhere you want to take it.  It features a DryHide Shell and nearly indestructible straps will stand up to an abundance of abuse in the field.  It's HydroLok Zipper is completely leakproof, eliminating spills and locking in cold.  It can hold 18 cans, a limit of rainbow trout, or 20 pounds of ice.  The YETI Hopper 20 is currently selling at the discounted price of $199.99, a good deal considering its $299.95 list price. See this high-end portable cooler now on Amazon. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tech crime as a service escalates

Criminals are increasingly offered crime as a service (CaaS) and are using sharing-economy ride-sharing and accommodation services, too, a major law enforcement agency says.Europol, the European Union’s policing office says tech-oriented CaaS is being offered to swathes of the underbelly of Europe. Criminals gain an advantage because they can perform crimes better and more efficiently, and they can work at scales greater than their existing technical proficiency.+ Also on Network World: Anonymous hacker causes dark web to shrink by as much as 85% + An estimated 5,000 internationally operating crime gangs are currently being investigated in the trading bloc, according to Europol.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tech crime as a service escalates

Criminals are increasingly offered crime as a service (CaaS) and are using sharing-economy ride-sharing and accommodation services, too, a major law enforcement agency says.Europol, the European Union’s policing office says tech-oriented CaaS is being offered to swathes of the underbelly of Europe. Criminals gain an advantage because they can perform crimes better and more efficiently, and they can work at scales greater than their existing technical proficiency.+ Also on Network World: Anonymous hacker causes dark web to shrink by as much as 85% + An estimated 5,000 internationally operating crime gangs are currently being investigated in the trading bloc, according to Europol.To read this article in full or to leave a comment, please click here

Anonymous hacker causes dark web to shrink by as much as 85%

An attack by Anonymous, the shadowy hacker crew that seems to alternate between good guys and bad guys depending on the issue, help cut the dark web down by as much as 85 percent, according to a new report. Anonymous turned its sights on Freedom Hosting II, a hosting service for Tor-based sites, at the start of February. Freedom Hosting II (FHII) was the host to over 10,000 dark web sites, many of them hosting images of sexually abused children. It was named after another host, Freedom Hosting, that Anonymous took down in 2011. An Anonymous hacker went after the service after they discovered the provider knew what was going on and did nothing to stop it. The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site—just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here

Anonymous hacker causes dark web to shrink by as much as 85%

An attack by Anonymous, the shadowy hacker crew that seems to alternate between good guys and bad guys depending on the issue, help cut the dark web down by as much as 85 percent, according to a new report. Anonymous turned its sights on Freedom Hosting II, a hosting service for Tor-based sites, at the start of February. Freedom Hosting II (FHII) was the host to over 10,000 dark web sites, many of them hosting images of sexually abused children. It was named after another host, Freedom Hosting, that Anonymous took down in 2011. An Anonymous hacker went after the service after they discovered the provider knew what was going on and did nothing to stop it. The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site—just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here

IBM pledge: Not only does Notes/Domino live, there’s no end in sight

Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time.Not surprising, though.    In a blog post published yesterday, Ed Brill, vice president of product management and design for IBM Collaboration Solutions, laid out the company’s current thinking: “Notes/Domino 9.0 shipped in 2013, and IBM’s normal five-year support model meant that mainstream support could have ended in 2018. However, we know how important these products are to your business, and we are continuing to invest in new functionality. For IBM Notes/Domino 9.0, we have announced that product support will be extended through at least 2021, and extended support through at least 2024. There is no end of life planned for Notes and Domino, and we will continue to update the timeline for support as appropriate based on future releases and market requirements.”To read this article in full or to leave a comment, please click here

IBM pledge: Not only does Notes/Domino live, there’s no end in sight

Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time.Not surprising, though.    In a blog post published yesterday, Ed Brill, vice president of product management and design for IBM Collaboration Solutions, laid out the company’s current thinking: “Notes/Domino 9.0 shipped in 2013, and IBM’s normal five-year support model meant that mainstream support could have ended in 2018. However, we know how important these products are to your business, and we are continuing to invest in new functionality. For IBM Notes/Domino 9.0, we have announced that product support will be extended through at least 2021, and extended support through at least 2024. There is no end of life planned for Notes and Domino, and we will continue to update the timeline for support as appropriate based on future releases and market requirements.”To read this article in full or to leave a comment, please click here

Google offers new ‘Always Free’ cloud tier to attract users

Google is letting its customers get a taste of its cloud for free, without a time-limited trial. The company quietly launched a new “Always Free” tier on Thursday that lets people use small amounts of its public cloud services without charge, beyond the company’s limited-time trial.The tier includes — among other things — 1 f1-micro compute instance, 5 GB per month of Regional Storage and 60 minutes per month of access to the Cloud Speech API. Using the free tier requires users to provide a credit card that Google can automatically bill for any use over the limits.In addition, the cloud provider expanded its free trial so that users get $300 in credits that they can use for up to 12 months. Google will halt users’ workloads if they eat up all of the credits before the end of 12 months.To read this article in full or to leave a comment, please click here

IBM’s position on Security Analytics and Operations (SOAPA)

Just what is a security operations and analytics platform architecture (SOAPA) anyway? In the past, most enterprises anchored their security analytics and operations with one common tool: Security Information and Event Management (SIEM) systems. Now, SIEM still plays a major role here, but many organizations are supplementing their security operations centers (SOCs) with additional data, analytics tools and operations management systems. We now see SOCs as a nexus for things like endpoint detection and response tools (EDR), network analytics, threat intelligence platforms (TIPs) and incident response platforms (IRPs). In aggregate, security operations is changing, driven by a wave of new types of sensors, diverse data sources, analytics tools and operational requirements. And these changes are driving an evolution from monolithic security technologies to a more comprehensive event-driven software architecture along the lines of SOA 2.0, where disparate security technologies connected with middleware for things like data exchange, message queueing and business-level trigger conditions. To read this article in full or to leave a comment, please click here