Archive

Category Archives for "Networking"

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a bittorrent download. It is written in Apple's Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.To read this article in full or to leave a comment, please click here

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a bittorrent download. It is written in Apple's Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.To read this article in full or to leave a comment, please click here

Hybrid ERP matures as companies develop better strategies

It’s hard to find a company that does not have some form of a hybrid (cloud and on-premise) ERP system. For most, that happened by accident. Someone in the organization bypassed IT and bought a cloud service to fill a need more quickly than they could with an on-premise solution. Salesforce.com, for example, has often been the start of a company’s march to a hybrid environment.Cloud applications can be relatively easy, low-cost solutions, but they do introduce new complexities when they need to be integrated with on-premise ERP systems and databases, or with each other. Ensuring that cloud and on-premise systems play nice together is just one part of the hybrid challenge. Making the right decisions about what will be in the cloud and what stays in-house is the other.To read this article in full or to leave a comment, please click here

Hybrid ERP matures as companies develop better strategies

It’s hard to find a company that does not have some form of a hybrid (cloud and on-premise) ERP system. For most, that happened by accident. Someone in the organization bypassed IT and bought a cloud service to fill a need more quickly than they could with an on-premise solution. Salesforce.com, for example, has often been the start of a company’s march to a hybrid environment.Cloud applications can be relatively easy, low-cost solutions, but they do introduce new complexities when they need to be integrated with on-premise ERP systems and databases, or with each other. Ensuring that cloud and on-premise systems play nice together is just one part of the hybrid challenge. Making the right decisions about what will be in the cloud and what stays in-house is the other.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here

Virtual assistants move into DevOps

Companies embracing DevOps practices are turning to chat-based and voice-guided virtual assistants to monitor applications, provision virtual machines and perform other operations. Such tools are instrumental in keeping developers and IT operations staff on the same page as they prioritize speedier software deployment in the digital era."The problems you run into in DevOps is teams are distributed," says Milan Hanson, a Forrester Research analyst who focuses on infrastructure and operations. "You can have the bot automate activities, address it in the chat like it's another person, and it will perform what you've asked it to do and bring the result back into the chat channel where everyone can see it. In a crisis, when people put together a war room or a SWAT team, being able to do that virtually through a chat is a huge advantage."To read this article in full or to leave a comment, please click here

How to create IT innovation

Sixty-four percent of IT leaders say their departments are taking the steps necessary to drive innovation in their business. Are you one of them?To read this article in full or to leave a comment, please click here(Insider Story)

A trove of new Android smartphones to debut at MWC

Several new high-profile Android smartphones are expected to launch this weekend in advance of Mobile World Congress, which opens Monday in Barcelona.Analysts and published reports have said these new Android smartphones will include: the BlackBerry DTEK70 (through a license with TCL); the LG G6; Moto G5 (the Motorola brand is owned by Lenovo); Nokia 8/P1 ( HMD holds the Nokia brand); Sony Xperia X2; the Huawei P10; and at least one model from HTC.To read this article in full or to leave a comment, please click here

AMD’s Ryzen launches March 2, outperforming Intel’s Core i7 at a fraction of the price

Ryzen is here. AMD said Wednesday that it plans a “hard launch” of its first three Ryzen processors on March 2, outperforming Intel’s high-end chips while undercutting its prices by as much as 54 percent. AMD executives confidently unveiled the first three desktop chips to attack Intel’s Core i7, supported by several top-tier motherboard vendors and boutique system builders. In many cases, executives said, AMD will offer more for less. The top-tier Ryzen 7 1800X will cost less than half of what Intel’s thousand-dollar Core i7-6900K chip does—and outperform it, too. You can preorder Ryzen chips and systems from 180 retailers and system integrators today.To read this article in full or to leave a comment, please click here

AMD’s Ryzen launches March 2, outperforming Intel’s Core i7 at a fraction of the price

Ryzen is here. AMD said Wednesday that it plans a “hard launch” of its first three Ryzen processors on March 2, outperforming Intel’s high-end chips while undercutting its prices by as much as 54 percent. AMD executives confidently unveiled the first three desktop chips to attack Intel’s Core i7, supported by several top-tier motherboard vendors and boutique system builders. In many cases, executives said, AMD will offer more for less. The top-tier Ryzen 7 1800X will cost less than half of what Intel’s thousand-dollar Core i7-6900K chip does—and outperform it, too. You can preorder Ryzen chips and systems from 180 retailers and system integrators today.To read this article in full or to leave a comment, please click here

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.The devices make up a family called the Cisco Firepower 2100 series and are built around dual, multi-core processors. That architecture enables custom processing of traffic requiring threat inspection, and also supports tagging traffic that doesn’t need threat inspection so it flows through only the separate network processing unit.These features combine to provide ample processing power for services such as IPS and also lighten the total load on that processor by diverting traffic that doesn’t require those services, Cisco says.To read this article in full or to leave a comment, please click here

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.The devices make up a family called the Cisco Firepower 2100 series and are built around dual, multi-core processors. That architecture enables custom processing of traffic requiring threat inspection, and also supports tagging traffic that doesn’t need threat inspection so it flows through only the separate network processing unit.These features combine to provide ample processing power for services such as IPS and also lighten the total load on that processor by diverting traffic that doesn’t require those services, Cisco says.To read this article in full or to leave a comment, please click here

Using CNI with Docker

In our last post we introduced ourselves to CNI (if you haven’t read that yet, I suggest you start there) as we worked through a simple example of connecting a network namespace to a bridge.  CNI managed both the creation of the bridge as well as connecting the namespace to the bridge using a VETH pair.  In this post we’ll explore how to do this same thing but with a container created by Docker.  As you’ll see, the process is largely the same.  Let’s jump right in.

This post assumes that you followed the steps in the first post (Understanding CNI) and have a ‘cni’ directory (~/cni) that contains the CNI binaries.  If you don’t have that – head back to the first post and follow the steps to download the pre-compiled CNI binaries.  It also assumes that you have a default Docker installation.  In my case, Im using Docker version 1.12.  

The first thing we need to do is to create a Docker container.  To do that we’ll run this command…

user@ubuntu-2:~/cni$ sudo docker run --name cnitest --net=none -d jonlangemak/web_server_1
835583cdf382520283c709b5a5ee866b9dccf4861672b95eccbc7b7688109b56
user@ubuntu-2:~/cni$

Notice that when we ran the command we told Docker to use a network of ‘none’. Continue reading

IDG Contributor Network: What is OWASP, and why it matters for AppSec

Modern software development is firmly focused on speed. The race to be first in the market is extremely competitive. To innovate, companies develop at breakneck pace, quickly establishing feedback loops that allow them to hone their software. Security, however, is often an afterthought for stressed developers and the business people pushing them to deliver faster.The importance of application security (AppSec) is widely understood, with 97 percent of respondents to the SANS Institute’s 2016 State of Application Security report revealing they have an AppSec program in place.To read this article in full or to leave a comment, please click here