Archive

Category Archives for "Networking"

Trump’s executive order won’t destroy Privacy Shield, says EU

Fears that U.S. President Trump has destroyed the Privacy Shield Transatlantic data transfer agreement with one of the many executive orders he has signed this week are unfounded, the European Commission said Friday.On Wednesday, Trump signed an executive order entitled "Enhancing Public Safety in the Interior of the U.S.," one of several he has issued since taking office on Jan. 20. Such executive orders are used by U.S presidents to manage the operations of the federal government.To read this article in full or to leave a comment, please click here

Fiber & Wireless – Stronger Together for Community Broadband

Google in June stunned some in the broadband world by acquiring wireless provider Webpass and “momentarily” exiting the fiber stage. Hybrid wired/wireless networks became the Next Big Thing – for a month. But what if hybrid infrastructure is the key that unlocks the doors to the next level of community broadband success?

Craig Settles

Cisco starts patching critical flaw in WebEx browser extension

Cisco Systems has started to patch a critical vulnerability in its WebEx collaboration and conferencing browser extension that could allow attackers to remotely execute malicious code on computers.The company released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions.The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.To read this article in full or to leave a comment, please click here

Cisco starts patching critical flaw in WebEx browser extension

Cisco Systems has started to patch a critical vulnerability in its WebEx collaboration and conferencing browser extension that could allow attackers to remotely execute malicious code on computers.The company released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions.The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.To read this article in full or to leave a comment, please click here

Your Business Won’t Use a Server in 5 Years ? What Bull….

What a load of bull.

The journey to cloud is a matter of when, not if. The first step in that journey is well underway with organizations replacing on-premise servers with cloud-based systems that are better in every dimension — faster, cheaper, more secure. In 5 years, every modern business will have a substantial portion of their systems running the cloud. But that’s only the first step.

  1. There are people using laptops older than 5 years. Mass migration to public cloud, much less server less, is not practical within 5 years. Reaching 30% would highly optimistic. (also, 30% of what, exactly)
  2. Also, its arrogant to assume that serverless technology can only be provided in the public cloud. Expect to see private cloud serverless solutions arrive in a few years and undermine the assertion further.
  3. Serverless will enable quite a few new things but also requires companies to completely change the way they operate. The focus on Internet-first, and high investments in technology is not a trend.

Your Business Won’t Use a Server in 5 Years : https://serverless.zone/your-business-wont-use-a-server-in-5-years-79c8fd25b239

The post Your Business Won’t Use a Server in 5 Years ? What Bull…. appeared first on EtherealMind.

Review: Royole Moon 3D Virtual Mobile Theater

I’m generally an optimist when it comes to new technology (hence the ‘Cool Tools’ name of the column, not ‘Meh Tools’ or something like that), which means I go into most reviews ready to enjoy the products I’m testing.Such was the case with the Royole Moon 3D Virtual Mobile Theater ($799). I’ve seen products like this before – take a display and attach some headphones, and you can experience video and music as if you were sitting in a movie theater while you’re at home or on an airplane. Royole In the case of this headset, it includes the experience of an 800-inch movie screen – the front part has two AMOLED displays at 1080p resolution. Over the top of the unit are two noise-canceling headphones that create the audio experience. It looks a lot like the VR headsets in the market now – such as the PlayStation VR, Oculus Rift or HTC Vive – so much so that people might think you’re playing VR games while using this. But no, it’s more of an entertainment device for experiencing content in this “virtual environment”.To read this article in full or to leave a comment, please click here

AI-based typing biometrics might be authentication’s next big thing

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.Research in the field of keystroke dynamics, also known as keyboard or typing biometrics, spans back over 20 years. The technique has already been used for various applications that need to differentiate among computer users, but its widespread adoption as a method of authentication has been held back by insufficient levels of accuracy.Keystroke dynamics relies on unique patterns derived from the timing between key presses and releases during a person's normal keyboard use. The accuracy for matching such typing-based "fingerprints" to individual persons by using traditional statistical analysis and mathematical equations varies around 60 percent to 70 percent, according to Raul Popa, CEO and data scientist at Romanian startup firm TypingDNA.To read this article in full or to leave a comment, please click here

AI-based typing biometrics might be authentication’s next big thing

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.Research in the field of keystroke dynamics, also known as keyboard or typing biometrics, spans back over 20 years. The technique has already been used for various applications that need to differentiate among computer users, but its widespread adoption as a method of authentication has been held back by insufficient levels of accuracy.Keystroke dynamics relies on unique patterns derived from the timing between key presses and releases during a person's normal keyboard use. The accuracy for matching such typing-based "fingerprints" to individual persons by using traditional statistical analysis and mathematical equations varies around 60 percent to 70 percent, according to Raul Popa, CEO and data scientist at Romanian startup firm TypingDNA.To read this article in full or to leave a comment, please click here

Trump eyes an H-1B visa aimed at ‘best and brightest’

President Donald Trump is considering a new way of distributing the H-1B visa to ensure they go to the "best and brightest."The phrase "best and the brightest" has long been used by tech industry groups to champion the H-1B program. It's greeted with derision by critics, who say the program's mostly entry-level workers are used to displace U.S. workers.But some critics of the visa, a group that now includes top officials in the Trump administration, are adopting the phrase to advance the idea of a priority-based H-1B distribution system.This comes from a draft executive order by Andrew Bremberg, the director of Trump's Domestic Policy Council. The order -- if signed by the president -- opens the door to major reforms of the H-1B and the Optional Practical Training programs.To read this article in full or to leave a comment, please click here

Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchase an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips.Forrester recently released a report that reveals the characteristics of users and the factors that go into how much – or how little – each category of user shares. “We frequently hear that Millennials don’t care about privacy — just look at everything they share on social media! But this ignores the fact that Millennials actually manage their online identities quite aggressively.""While it may appear that they overshare online, they use privacy settings, ephemeral messaging, and browser plug-ins to control who sees what about them. This is exactly how most of us behave in the physical world: Our willingness to share personal information with specific people changes depending on our relationship with them.”To read this article in full or to leave a comment, please click here

Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchase an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips.Forrester recently released a report that reveals the characteristics of users and the factors that go into how much – or how little – each category of user shares. “We frequently hear that Millennials don’t care about privacy — just look at everything they share on social media! But this ignores the fact that Millennials actually manage their online identities quite aggressively.""While it may appear that they overshare online, they use privacy settings, ephemeral messaging, and browser plug-ins to control who sees what about them. This is exactly how most of us behave in the physical world: Our willingness to share personal information with specific people changes depending on our relationship with them.”To read this article in full or to leave a comment, please click here

How to protect your data, your vehicles, and your people against automotive cyber threats?

Modern vehicles increasingly connect to the rest of the world via short range wireless technologies such as Wi-Fi and Bluetooth, wired interfaces such as OBD-II and USB, long range wireless communications such as 4G and the coming 5G for internet, and services such as OnStar, LoJack, and Automatic, to name only some. That world includes your enterprise and the criminal hackers and cyber carjackers who want to undo your data, your corporate fleets, and your people.The costs of their attacks include exposure of personal identifiable information and private data, and exposure or destruction of valuable intellectual property, according to Eric Friedberg, co-president at Stroz Friedberg. Loss of life in the midst of vehicle destruction/collision weighs heavily as a potential personal, professional, and corporate cost, as well.To read this article in full or to leave a comment, please click here(Insider Story)

How to protect your data, your vehicles, and your people against automotive cyber threats?

Modern vehicles increasingly connect to the rest of the world via short range wireless technologies such as Wi-Fi and Bluetooth, wired interfaces such as OBD-II and USB, long range wireless communications such as 4G and the coming 5G for internet, and services such as OnStar, LoJack, and Automatic, to name only some. That world includes your enterprise and the criminal hackers and cyber carjackers who want to undo your data, your corporate fleets, and your people.To read this article in full or to leave a comment, please click here(Insider Story)

That Hearbleed problem may be more pervasive than you think

 That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in April 2014 was still found in 199,594 internet-accessible devices during a scan it performed last weekend.But according to open-source security firm Black Duck, about 11% of more than 200 applications it audited between Oct. 2015 and March 2016 contained the flaw, which enables a buffer overread that endangers data from clients and servers running affected versions of OpenSSL.To read this article in full or to leave a comment, please click here