Archive

Category Archives for "Networking"

MWC protest asks about the fate of 4 million recalled Note7 batteries

The question of how the electronics industry recycles or disposes of old batteries came up again due to a Greenpeace protest of Samsung at Mobile World Congress this week.Greenpeace protestors appeared at a Samsung press event in Barcelona on Sunday carrying and erecting banners outside the venue; the group urged reuse and recycling of old batteries.Greenpeace said in a statement that it was demanding Samsung reuse and recycle the 4.3 million Galaxy Note7 batteries that were recalled last year after reports that some of the lithium ion batteries overheated and caught fire.To read this article in full or to leave a comment, please click here

The 10 essential Reddits for security pros

Going viralImage by IDGReddit isn’t just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between — if you know where to look.To read this article in full or to leave a comment, please click here

The 10 essential Reddits for security pros

Going viralImage by IDGReddit isn’t just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between — if you know where to look.To read this article in full or to leave a comment, please click here

Safari browser sheds users, mimicking IE

Apple's Safari browser, like rival Internet Explorer (IE), has lost a significant number of users in the last two years, data published Wednesday showed.The most likely destination of Safari defectors: Google's Chrome.According to California-based analytics vendor Net Applications, in March 2015, an estimated 69% of all Mac owners used Safari to go online. But by last month, that number had dropped to 56%, a drop of 13 percentage points -- representing a decline of nearly a fifth of the share of two years prior.It was possible to peg the percentage of Mac users who ran Safari only because that browser works solely on macOS, the Apple operating system formerly labeled OS X. The same single-OS characteristic of IE and Edge has made it possible in the past to determine the percentage of Windows users who run those browsers.To read this article in full or to leave a comment, please click here

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country.The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines.+More on Network World: Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier’s check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country.The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines.+More on Network World: Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier’s check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here

25% off Xbox One Play and Charge Kit – Deal Alert

Forget disposable batteries and keep the action going with the Xbox One Play & Charge Kit. Recharge while you play or afterwards, even when your Xbox is in standby. The long-lasting rechargeable battery fully charges in under 4 hours. Compatible with the original Xbox One Wireless controller and the new white Xbox Wireless Controller. The typical list price of $24.99 has been reduced 25% to $18.74. See the discounted Xbox One Play and Charge Kit on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Customization key to successful ITSM implementation

Axelos defines IT Service Management (ITSM) as the implementation and management of quality IT services that meet the needs of the business. IT service management is performed by IT service providers through an appropriate mix of people, process and information technology. A widely adopted framework for ITSM is IT Infrastructure Library (ITIL).ITIL refers to a set of best-practice publications for IT service management. Owned by the U.K. Cabinet Office, ITIL gives guidance on the provision of quality IT services and the processes, functions and other capabilities needed to support them. The ITIL framework is based on a service lifecycle and consists of five lifecycle stages (service strategy, service design, service transition, service operation and continual service improvement), each of which has its own supporting publication.To read this article in full or to leave a comment, please click here

Turn your iPhone into an even better digital camera

Since the time a mobile phone vendor first added a camera lens (creating the ‘camera phone’), we’ve seen improvements to the lenses, megapixels and software, but not much else on the outside. While you’ve likely given up using a regular digital camera in favor of your smartphone, for truly professional photographs you likely have invested in a larger DLSR-style camera (with the costs associated with that).If you’re looking for something that helps enhance your existing iPhone but not to the level of the DLSR space, Bitplay has some accessories that can help. The company recently sent me a bunch of their Snap! line of camera cases and accessories – the SNAP! Pro, the Snap! 7 and one add-on wide-angle lens.To read this article in full or to leave a comment, please click here

H-1B reform bill unites political opposites

Since 2005, U.S. Rep. Bill Pascrell (D-N.J.) has been introducing H-1B reform legislation in the House and getting nowhere. But with the bill he introduced today, he might have struck gold.Pascrell calls his bill bipartisan, but that doesn't quite do it justice. The co-sponsors of this bill, called the H-1B and L-1 Visa Reform Act of 2017, are about as far apart politically as you can get.This legislation, perhaps more than any other H-1B reform bill introduced in either chamber, illustrates the belief that visa reform is a strongly bipartisan issue that can bring together otherwise divided lawmakers.To read this article in full or to leave a comment, please click here

Infosec mourns over Howard Schmidt, who helped make the country a safer place

Howard Schmidt advised both President Brack Obama and George W. Bush on cybersecurity. He was a CSO at Microsoft and a CISO at eBay. He led several industry groups, and wrote books on cybersecurity.But when security professionals remember him, it is not so much for his technical accomplishments as for the impact he had on the people around him. He is remembered as a mentor, a communicator, and an educator."He does have a very storied path of accomplishment," said Mary Ann Davidson, CSO at Redwood City, Calif.-based Oracle Corp. "From a security standpoint, he had a tremendous impact, the many roles he played, the work in the white house."To read this article in full or to leave a comment, please click here

Infosec mourns over Howard Schmidt, who helped make the country a safer place

Howard Schmidt advised both President Brack Obama and George W. Bush on cybersecurity. He was a CSO at Microsoft and a CISO at eBay. He led several industry groups, and wrote books on cybersecurity.But when security professionals remember him, it is not so much for his technical accomplishments as for the impact he had on the people around him. He is remembered as a mentor, a communicator, and an educator."He does have a very storied path of accomplishment," said Mary Ann Davidson, CSO at Redwood City, Calif.-based Oracle Corp. "From a security standpoint, he had a tremendous impact, the many roles he played, the work in the white house."To read this article in full or to leave a comment, please click here

Are Virtual CISOs the answer to your security problems?

Chief Information Security Officers are a relatively rare breed. Information security is, after all, a relatively recent addition or subset to IT, and while most large organizations now do profess to having a CISO, CSO or head of information security, many still don’t. Indeed, it’s often the case that a company appoints its first CISO in the aftermath of a data breach - like Target did in 2014 or Sony in 2011.To read this article in full or to leave a comment, please click here(Insider Story)

CloudScale ASICs on Software Gone Wild

Last year Cisco launched a new series of Nexus 9000 switches with table sizes that didn’t match any of the known merchant silicon ASICs. It was obvious they had to be using their own silicon – the CloudScale ASIC. Lukas Krattiger was kind enough to describe some of the details last November, resulting in Episode 73 of Software Gone Wild.

For even more details, watch the Cisco Nexus 9000 Architecture Cisco Live presentation.

IDG Contributor Network: Ensure your data infrastructure remains available and resilient

The fundamental role of data infrastructure is to protect, preserve, secure, serve applications and data, transforming them into information. Data protection is an encompassing topic, as it spans security (logical and physical), reliability availability serviceability (RAS), privacy and encryption, backup/restore, archiving, business continuance (BC), business resiliency (BR) and disaster recovery (DR).Recently, we've seen news about data infrastructure and application outages, including Amazon Web Service (AWS) Simple Storage Service (S3), Gitlab, and the Australian Tax Office (ATO).To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ensure your data infrastructure remains available and resilient

The fundamental role of data infrastructure is to protect, preserve, secure, serve applications and data, transforming them into information. Data protection is an encompassing topic, as it spans security (logical and physical), reliability availability serviceability (RAS), privacy and encryption, backup/restore, archiving, business continuance (BC), business resiliency (BR) and disaster recovery (DR).Recently, we've seen news about data infrastructure and application outages, including Amazon Web Service (AWS) Simple Storage Service (S3), Gitlab, and the Australian Tax Office (ATO).To read this article in full or to leave a comment, please click here