Archive

Category Archives for "Networking"

How to use your Android device as a mobile hotspot

It's not always easy to find reliable Wi-Fi on the go, especially if you're looking for a secure, private connection. Public Wi-Fi networks can leave you vulnerable to hackers and create privacy issues if you're viewing sensitive data. But if you have an Android smartphone in your pocket, you're just a few steps away from having a private, personal Wi-Fi hotspot.All smartphones running Android 2.2 or later have built-in hotspot capabilities, but some carriers might limit access to the feature depending on your wireless plan. Also, your smartphone might run a slightly different version of Android depending on your device --few devices carry stock Android, instead applying a proprietary interface, like Samsung TouchWiz. So some of these steps might look slightly different on your device.To read this article in full or to leave a comment, please click here

New financial regulations go into effect in New York

On March 1, new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the cybersecurity policies of their business partners.It might seem a little sudden, since the regulations were only finalized a month ago. But it's actually not as bad as it sounds."There's a transitional period," said Brad Keller, senior director of third party strategy at Prevalent. "Everyone has six months to be in compliance."To read this article in full or to leave a comment, please click here

New financial regulations go into effect in New York

On March 1, new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the cybersecurity policies of their business partners.It might seem a little sudden, since the regulations were only finalized a month ago. But it's actually not as bad as it sounds."There's a transitional period," said Brad Keller, senior director of third party strategy at Prevalent. "Everyone has six months to be in compliance."To read this article in full or to leave a comment, please click here

Will a cyber crisis add to chaos of Trump’s first 100 days?

While plenty of controversy has surrounded President Donald Trump’s fledgling administration, it hasn’t yet faced a major crisis.But according to Forrester Research, aside from any political or military events, the new president will face a cyber crisis sometime within his first 100 days.The company made the prediction last fall, prior to the election, as part of its “Predictions 2017” brief, so it didn’t specifically focus on either Trump or Democratic candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

Will a cyber crisis add to chaos of Trump’s first 100 days?

While plenty of controversy has surrounded President Donald Trump’s fledgling administration, it hasn’t yet faced a major crisis.But according to Forrester Research, aside from any political or military events, the new president will face a cyber crisis sometime within his first 100 days.The company made the prediction last fall, prior to the election, as part of its “Predictions 2017” brief, so it didn’t specifically focus on either Trump or Democratic candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

7 universal rules of threat intelligence

ThreateningImage by ThinkstockCybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization’s cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.To read this article in full or to leave a comment, please click here

7 universal rules of threat intelligence

ThreateningImage by ThinkstockCybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization’s cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.To read this article in full or to leave a comment, please click here

Visa, Mastercard beef up mobile payment tech at Mobile World Congress

BARCELONA -- Mobile payments made in different parts of the globe were an important theme at Mobile World Congress this week, with leaders Visa and Mastercard announcing new services.Visa on Monday announced one of the most unusual approaches, one that relies primarily on older QR code technology through its mVisa payment service. It went live Monday for merchants and customers in India, Kenya and Rwanda and will soon be available in Egypt, Pakistan and a few other developing countries.The service allows merchants and consumers to make payments via a mobile phone and a QR code kept at each merchant's store location. Visa said the flexible nature of QR codes means that merchants do not need to invest in costly point-of-sale infrastructure.To read this article in full or to leave a comment, please click here

Not-so-free Flow of Data

The digitalization of human activities, from social interactions to industrial processes, has led to unprecedented levels of data collection. New data is constantly being produced, driven by the rise of user-generated content, the digitalization of industries and services, and the improvement of both machine to machine communication and data storage. As recognized in the Commission’s Communication “Towards a data-driven economy”, this trend “holds enormous potential in various fields, ranging from health, food security, energy efficiency to intelligent transport systems and smart cities”. Indeed, data has become an essential resource for societal improvement.

Frédéric Donck

8 ways to make Amazon’s Alexa even more awesome

I’ve been using an Amazon Echo for a while now, yet I still find myself amazed at how well its voice assistant technology works—at least within the relatively narrow confines it has set for itself. By sticking to what she can do well, Alexa mostly avoids the common trap of heavily hyped new technology delivering a disappointing experience in real life. To read this article in full or to leave a comment, please click here

Relax: This phone measures your blood pressure

This Swiss electronics company is on a mission: to stop millions of people dying of ignorance each year.Worldwide, high blood pressure leads to around 9.4 million deaths annually according to figures from the World Health Organization. And yet, the condition is easily diagnosed and treated. In the Americas, the prevalence of high blood pressure fell from 31 percent in 1980 to 18 percent in 2014, but remains high in developing countries.Before high blood pressure can be controlled, though, it needs to be detected, and that's the part that Leman Micro Devices wants to make simpler. It is showing off its solution at Mobile World Congress in Barcelona this week.To read this article in full or to leave a comment, please click here

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices.The chip is just 5 millimeters square -- smaller than a fingernail -- and is capable of generating mathematically provable random numbers. Such numbers are the basis for highly-secure encryption systems and producing them in such a small package hasn't been possible until now.The chip, on show at this week's Mobile World Congress in Barcelona, could be in sample production as early as March this year and will cost a few dollars once in commercial production, said Sean Kwak, director at SK Telecom's quantum technology lab.To read this article in full or to leave a comment, please click here

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices.The chip is just 5 millimeters square -- smaller than a fingernail -- and is capable of generating mathematically provable random numbers. Such numbers are the basis for highly-secure encryption systems and producing them in such a small package hasn't been possible until now.The chip, on show at this week's Mobile World Congress in Barcelona, could be in sample production as early as March this year and will cost a few dollars once in commercial production, said Sean Kwak, director at SK Telecom's quantum technology lab.To read this article in full or to leave a comment, please click here

Fabric Extension (FEX) Cheat Sheet Released

Here is the Cisco FEX Cheat Sheet on Nexus platform, Fabric Extender (FEX for short) is a companion to a Nexus 5K to 9K switch. The FEX, unlike a traditional switch, has no capability to store a forwarding table or run any control plane protocols. It relies on its parent 5K/6K/7K/9K to perform those functions. As the name implies, the FEX “extends” the fabric (ie, the network) out towards the edge devices that require network connectivity.

If you found a bug or want new content to be added, please report it!

Click here to download FEX Cheat Sheet

Fabric Extension (FEX) Cheat Sheet Released

Here is the Cisco FEX Cheat Sheet on Nexus platform, Fabric Extender (FEX for short) is a companion to a Nexus 5K to 9K switch. The FEX, unlike a traditional switch, has no capability to store a forwarding table or run any control plane protocols. It relies on its parent 5K/6K/7K/9K to perform those functions. As the name implies, the FEX “extends” the fabric (ie, the network) out towards the edge devices that require network connectivity.

If you found a bug or want new content to be added, please report it!

Click here to download FEX Cheat Sheet

Smart teddy bears involved in a contentious data breach

If you own a stuffed animal from CloudPets, then you better change your password to the product. The toys -- which can receive and send voice messages from children and parents -- have been involved in a data breach dealing with more than 800,000 user accounts.The breach, which grabbed headlines on Monday, is drawing concerns from security researchers because it may have given hackers access to voice recordings from the toy's customers. But the company behind the products, Spiral Toys, is denying that any customers were hacked. "Were voice recordings stolen? Absolutely not," said Mark Myers, CEO of the company.Security researcher Troy Hunt, who tracks data breaches, brought the incident to light on Monday. Hackers appear to have accessed an exposed CloudPets' database, which contained email addresses and hashed passwords, and they even sought to ransom the information back in January, he said in a blog post.To read this article in full or to leave a comment, please click here