Archive

Category Archives for "Networking"

Dozens of iOS apps fail to secure users’ data, researcher says

Dozens of iOS apps that are supposed to be encrypting their users' data don't do it properly, according to a security researcher.Will Strafach, CEO of Sudo Security Group, said he found 76 iOS apps that are vulnerable to an attack that can intercept protected data.The developers of the apps have accidentally misconfigured the networking-related code so it will accept an invalid Transport Layer Security (TLS) certificate, Strafach claimed in a Monday blog post.   TLS is used to secure an app’s communication over an internet connection. Without it, a hacker can essentially eavesdrop over a network to spy on whatever data the app sends, such as login information.  To read this article in full or to leave a comment, please click here

Dozens of iOS apps fail to secure users’ data, researcher says

Dozens of iOS apps that are supposed to be encrypting their users' data don't do it properly, according to a security researcher.Will Strafach, CEO of Sudo Security Group, said he found 76 iOS apps that are vulnerable to an attack that can intercept protected data.The developers of the apps have accidentally misconfigured the networking-related code so it will accept an invalid Transport Layer Security (TLS) certificate, Strafach claimed in a Monday blog post.   TLS is used to secure an app’s communication over an internet connection. Without it, a hacker can essentially eavesdrop over a network to spy on whatever data the app sends, such as login information.  To read this article in full or to leave a comment, please click here

How to set up the EVE-NG network emulator on a Linux system

EVE-NG is a graphical network emulator that supports both commercial and open-source router images. It’s graphical user interface runs in a web browser. EVE-NG runs in a virtual machine so it can be set up Windows, Mac OS, or Linux computers.

In this post, I will show how to set up an EVE-NG virtual machine on an Ubuntu Linux system. I’ll show the basic steps to creating and running a simple lab consisting of emulated Linux nodes.

To support more complex labs using open-source routers and other open-source network appliances in EVE-NG, we need to create custom templates and build router images specifically for use in EVE-NG. I will cover these topics in a future post. In this post, we’ll focus only on getting an EVE-NG virtual machine set up and running on a Linux system.

EVE-NG Overview

EVE-NG is a clientless network emulator that provides a user interface via a browser. Users may create network nodes from a library of templates, connect them together, and configure them. Advanced users or administrators may add software images to the library and build custom templates to support almost any network scenario.

EVE-NG supports pre-configured multiple hypervisors on one virtual machine. It runs Continue reading

BrandPost: Ethernet Ports on PCs Are in for a Long Overdue Speed Boost

Every year, the processing power of the CPUs that drive our computing and gaming devices increases, enabling them to ingest, process, and churn out more data faster. When you look at the increases over time, as the folks at Expert Exchange did in 2015, the progress is nothing short of mind-boggling. They found that an Apple iPhone 5 had 2.7 times the processing power of a 1985 Cray-2 supercomputer. And a pair of 2015 Nintendo gaming systems had about the same processing power as the computer that guided Apollo 11 to the moon. We see it in the new models of workstations, PCs and laptops that come out every year, or even every six months – each one faster and smaller than the last. But, as IDC Research Director Linn Huang points out, the same is not true for the wired Ethernet ports on those machines.To read this article in full or to leave a comment, please click here

Juniper founder, CTO Sindhu cuts role to focus on startup

Founder and current CTO of Juniper Pradeep Sindhu says he will reduce his role at the company to focus on developing technology for a startup he co-founded in 2015 called Fungible.On his Juniper blog Sindhu wrote: I am equally passionate about the success of Juniper Networks, the company I founded in 1996. I believe that the technology I am working on at Fungible, in conjunction with Juniper's technologies, have the potential to revolutionize the industry. This is why Juniper has invested in Fungible. To read this article in full or to leave a comment, please click here

Juniper founder, CTO Sindhu cuts role to focus on startup

Founder and current CTO of Juniper Pradeep Sindhu says he will reduce his role at the company to focus on developing technology for a startup he co-founded in 2015 called Fungible.On his Juniper blog Sindhu wrote: I am equally passionate about the success of Juniper Networks, the company I founded in 1996. I believe that the technology I am working on at Fungible, in conjunction with Juniper's technologies, have the potential to revolutionize the industry. This is why Juniper has invested in Fungible. To read this article in full or to leave a comment, please click here

Juniper founder, CTO Sindhu cuts role to focus on startup

Founder and current CTO of Juniper Pradeep Sindhu says he will reduce his role at the company to focus on developing technology for a startup he co-founded in 2015 called Fungible.On his Juniper blog Sindhu wrote: I am equally passionate about the success of Juniper Networks, the company I founded in 1996. I believe that the technology I am working on at Fungible, in conjunction with Juniper's technologies, have the potential to revolutionize the industry. This is why Juniper has invested in Fungible. To read this article in full or to leave a comment, please click here

US House approves new privacy protections for email and the cloud

The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.The Email Privacy Act would update a 31-year-old law called the Electronic Communications Privacy Act (ECPA). Some privacy advocates and tech companies have pushed Congress to update ECPA since 2011. Lax protections for stored data raise doubts about U.S. cloud services among consumers and enterprises, supporters of the bill say.To read this article in full or to leave a comment, please click here

US House approves new privacy protections for email and the cloud

The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.The Email Privacy Act would update a 31-year-old law called the Electronic Communications Privacy Act (ECPA). Some privacy advocates and tech companies have pushed Congress to update ECPA since 2011. Lax protections for stored data raise doubts about U.S. cloud services among consumers and enterprises, supporters of the bill say.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. “Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data. There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.“Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data.There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

“Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data.

There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.

To read this article in full or to leave a comment, please click here

17% off MAXSA Innovations Park-Right Laser Garage Parking Device – Deal Alert

An innovative and unique device to help you park your cars, Park-Right automatically shines a laser on your car to guide you to the perfect parking spot every time. Simply drive into your garage and follow the laser. Once the laser is shining on the designated spot on your car, you are parked perfectly. The lasers are adjustable, allowing you to pick the ideal location on your car, so parking is consistent and accurate. Right now this parking gadget averages 4.5 out of 5 stars on Amazon from over 1,300 reviewers (read reviews). It's discounted 17% off its typical list price of $25, so you can save a few bucks and pick it up for $20.68. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Lenovo’s ThinkPad P71 will work with HTC, Oculus VR headsets

Lenovo's ThinkPad P71 is one superfast laptop that can work with HTC's Vive and the Oculus Rift VR headsets.It's technically a workstation and is targeted at professionals creating VR content, editing movies, or running engineering applications. Headsets are needed to create VR content.The laptop, which weighs 3.4 kilograms, has a 17-inch screen and is equipped with Intel's latest Xeon E3-v6 mobile chips, based on the Kaby Lake architecture. It can be configured with an Nvidia mobile Quadro GPU like the P5000M, which aid in the content creation and virtual reality experiences.The laptop will be available in April, starting at US$1,849. The laptop by default comes with an HD screen but can be configured with a 4K screen. It also supports a Thunderbolt 3 slot.To read this article in full or to leave a comment, please click here

DDoS Ransom: An Offer You Can Refuse

DDoS ransom

Cloudflare has covered DDoS ransom groups several times in the past. First, we reported on the copycat group claiming to be the Armada Collective and then not too long afterwards, we covered the "new" Lizard Squad. While in both cases the groups made threats that were ultimately empty, these types of security events can send teams scrambling to determine the correct response. Teams in this situation can choose from three types of responses: pay the ransom and enable these groups to continue their operations, not pay and hope for the best, or prepare an action plan to get protected.

Breaking the Ransom Cycle

We can’t stress enough that you should never pay the ransom. We fully understand that in the moment when your website is being attacked it might seem like a reasonable solution, but by paying the ransom, you only perpetuate the DDoS ransom group’s activities and entice other would be ransomers to start making similar threats. In fact, we have seen reports of victim organizations receiving multiple subsequent threats after they have paid the ransom. It would seem these groups are sharing lists of organizations that pay, and those organizations are more likely to be targeted again in Continue reading

Samsung scraps a Raspberry Pi 3 competitor, shrinks Artik line

Samsung has scrapped its Raspberry Pi 3 competitor called Artik 10 as it moves to smaller and more powerful boards to create gadgets, robots, drones, and IoT devices.A last remaining stock of the US$149 boards is still available through online retailers Digi-Key and Arrow.Samsung has stopped making Artik 10 and is asking users to buy its Artik 7 boards instead."New development for high-performance IoT products should be based on the Samsung Artik 710, as the Artik 1020 is no longer in production. Limited stocks of Artik 1020 modules and developer kits are still available for experimentation and small-scale projects," the company said on its Artik website.To read this article in full or to leave a comment, please click here

You’ll see right through this iPhone 8 concept design

Designers are really trying to outdo each other in early 2017, pumping out Apple iPhone 8 design concept videos at a rapid pace in advance of an expected iPhone 8 (or iPhone 10 or iPhone X?) release in the fall. The latest to grab attention -- with more than 61K views on Youtube as of this writing -- envisions a transparent smartphone screen.The design for the iPhone 7 follow-on comes courtesy of Georgy Pashkov via ConceptsiPhone. Featured design elements beyond the transparent screen (with optical sensor) include an ultrasonic fingerprint sensor and piezeoelectric speaker.As for the likelihood of a transparent screen on the actual iPhone 8? Highly unlikely, say Apple watchers. Though advances in Harry Potter-like invisibility cloaks are for real.To read this article in full or to leave a comment, please click here