Archive

Category Archives for "Networking"

Gmail will block JavaScript attachments, a common source of malware

Starting Feb. 13, Google will no longer allow JavaScript attachments on its Gmail service, killing one of the main methods of malware distribution over the past two years.Users will no longer be able to attach .JS files to emails in Gmail, regardless of whether they attach them directly or they include them in archives like .gz, .bz2, .zip or .tgz. For those rare cases when such files need to be shared via email, users can upload them to a storage service like Google Drive and then share the link.The .JS file extension will be added an existing list of other banned file attachments that includes: .ADE, .ADP, .BAT, .CHM, .CMD, .COM, .CPL, .EXE, .HTA, .INS, .ISP, .JAR, .JSE, .LIB, .LNK, .MDE, .MSC, .MSP, .MST, .PIF, .SCR, .SCT, .SHB, .SYS, .VB, .VBE, .VBS, .VXD, .WSC, .WSF and .WSH. Most of these file types have long been abused by cybercriminals to send malware via email.To read this article in full or to leave a comment, please click here

Gmail will block JavaScript attachments, a common source of malware

Starting Feb. 13, Google will no longer allow JavaScript attachments on its Gmail service, killing one of the main methods of malware distribution over the past two years.Users will no longer be able to attach .JS files to emails in Gmail, regardless of whether they attach them directly or they include them in archives like .gz, .bz2, .zip or .tgz. For those rare cases when such files need to be shared via email, users can upload them to a storage service like Google Drive and then share the link.The .JS file extension will be added an existing list of other banned file attachments that includes: .ADE, .ADP, .BAT, .CHM, .CMD, .COM, .CPL, .EXE, .HTA, .INS, .ISP, .JAR, .JSE, .LIB, .LNK, .MDE, .MSC, .MSP, .MST, .PIF, .SCR, .SCT, .SHB, .SYS, .VB, .VBE, .VBS, .VXD, .WSC, .WSF and .WSH. Most of these file types have long been abused by cybercriminals to send malware via email.To read this article in full or to leave a comment, please click here

Seagate’s roadmap includes 14TB, 16TB hard drives within 18 months

Seagate is getting closer to reaching its goal of making 20TB hard drives by 2020.Over the next 18 months, the company plans to ship 14TB and 16TB hard drives, company executives said on an earnings call this week.Seagate's hard drive capacity today tops out at 10TB. A 12TB drive based on helium technology is being tested, and the feedback is positive, said Stephen Luczo, the company's CEO.The demand for high-capacity drives is mostly in enterprises and for consumers who can afford the drives. The drives are mostly used in NAS configurations and storage arrays.To read this article in full or to leave a comment, please click here

Wine 2.0 brings MS Office 2013 compatibility to Linux

This week, Wine—the project that allows you to run many Microsoft Windows applications on non-Windows platforms—hit a rather huge milestone: version 2.0. From the Wine 2.0 release notes:  “This release represents over a year of development effort and around 6,600 individual changes. The main highlights are the support for Microsoft Office 2013 and the 64-bit support on macOS.”  I’ll be honest. The Mac OS tidbit isn’t all that interesting to me. But the support for Microsoft Office 2013 is, almost certainly, of interest to a number of people. (I don’t use it personally, but I know plenty of organizations that do.) To read this article in full or to leave a comment, please click here

Commuting Chelsea Manning’s Sentence Was Just and Proper

Before leaving office, President Barack Obama commuted the sentence of former Army soldier Chelsea (Bradley) Manning.  At the time, Manning was serving a sentence of 35 years for leaking classified material to WikiLeaks in 2010.  This material was subsequently published by WikiLeaks, embarrassing the US government and exposing several previously undocumented war crimes that took place in Afghanistan and Iraq.  The President’s decision to commute Manning’s sentence was extremely controversial.  The verdict was made over the objection of Secretary of Defense Ashton Carter, while other military and government officials quickly criticized Obama’s pronouncement.   Just today, President Trump referred to Manning as an “ungrateful traitor” who should have never been released from prison on Twitter.To read this article in full or to leave a comment, please click here

Commuting Chelsea Manning’s sentence was just and proper

Before leaving office, President Barack Obama commuted the sentence of former Army soldier Chelsea (Bradley) Manning. At the time, Manning was serving a sentence of 35 years for leaking classified material to WikiLeaks in 2010. This material was subsequently published by WikiLeaks, embarrassing the U.S. government and exposing several previously undocumented war crimes that took place in Afghanistan and Iraq.  The President’s decision to commute Manning’s sentence was extremely controversial.  The verdict was made over the objection of Secretary of Defense Ashton Carter, while other military and government officials quickly criticized Obama’s pronouncement.   Just today, President Trump on Twitter referred to Manning as an “ungrateful traitor” who should have never been released from prison.To read this article in full or to leave a comment, please click here

Commuting Chelsea Manning’s Sentence Was Just and Proper

Before leaving office, President Barack Obama commuted the sentence of former Army soldier Chelsea (Bradley) Manning.  At the time, Manning was serving a sentence of 35 years for leaking classified material to WikiLeaks in 2010.  This material was subsequently published by WikiLeaks, embarrassing the US government and exposing several previously undocumented war crimes that took place in Afghanistan and Iraq.  The President’s decision to commute Manning’s sentence was extremely controversial.  The verdict was made over the objection of Secretary of Defense Ashton Carter, while other military and government officials quickly criticized Obama’s pronouncement.   Just today, President Trump referred to Manning as an “ungrateful traitor” who should have never been released from prison on Twitter.To read this article in full or to leave a comment, please click here

Commuting Chelsea Manning’s sentence was just and proper

Before leaving office, President Barack Obama commuted the sentence of former Army soldier Chelsea (Bradley) Manning. At the time, Manning was serving a sentence of 35 years for leaking classified material to WikiLeaks in 2010. This material was subsequently published by WikiLeaks, embarrassing the U.S. government and exposing several previously undocumented war crimes that took place in Afghanistan and Iraq.  The President’s decision to commute Manning’s sentence was extremely controversial.  The verdict was made over the objection of Secretary of Defense Ashton Carter, while other military and government officials quickly criticized Obama’s pronouncement.   Just today, President Trump on Twitter referred to Manning as an “ungrateful traitor” who should have never been released from prison.To read this article in full or to leave a comment, please click here

Digital disrupts traditional outsourcing market in 2016

The traditional IT and business process outsourcing market declined 25 percent in the fourth quarter of 2016 compared to the same period last year, producing a total of $9.6 billion in total contract value, according to data from Information Services Group (ISG). The value of traditional infrastructure, applications, and business process deals in the fourth quarter was down eight percent over the previous quarter, according to ISG.[ Related: Outsourcing trends to watch in 2017 ]“These results, we believe, reflect uneven global demand,” says John Keppel, partner and president of North EMEA and Asia for ISG. “The traditional sourcing sector is in the midst of a structural change, as more and more services move to the cloud and many service providers try to adapt their business and sales models to meet these changing market conditions.”To read this article in full or to leave a comment, please click here

5 of the most anticipated smartphones for 2017

It's become an annual tradition that we await tech companies to debut the latest smartphone hardware. Smartphone rumors fly every year as experts and consumers  speculate about the features they think -- and hope -- will be included in their favorite devices.And if it's time for an upgrade, there are plenty of new exciting smartphone features that your old device probably doesn't offer. Whether you want more screen real estate, a waterproof smartphone or a fresh new design, you'll want to keep an eye on these five smartphones.iPhone 8 Apple Once released, the iPhone 8 will mark the 10th anniversary of the popular Apple smartphone and industry experts anticipate a completely redesigned iPhone. MacWorld reports a possible return to stainless steel, an all-glass design, a curved OLED display, new color options, wireless charging, a foldable design and a third, smaller model of the iPhone 8.To read this article in full or to leave a comment, please click here

Chrome, Firefox start warning users when websites use insecure HTTP logins

The war on insecure webpages has begun, and Mozilla fired the first shot.Recently, Mozilla rolled out Firefox 51 to its mainstream user base. With the new release comes an insecure warning on any page that offers a login form over an HTTP connection instead of HTTPS. Chrome plans to follow suit with version 56, expected to be released to mainstream users on Tuesday, January 31, as Ars Technica first pointed out.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords HTTP uses an open, unencrypted connection between you and the website you’re visiting that could be intercepted by anyone monitoring traffic between you and the site. For that reason, it’s never a good idea to share login or credit card information over an HTTP connection. Most major sites offer the encrypted version—HTTPS—but every now and then you’ll come across a site that doesn’t.To read this article in full or to leave a comment, please click here

Chrome, Firefox start warning users when websites use insecure HTTP logins

The war on insecure webpages has begun, and Mozilla fired the first shot.Recently, Mozilla rolled out Firefox 51 to its mainstream user base. With the new release comes an insecure warning on any page that offers a login form over an HTTP connection instead of HTTPS. Chrome plans to follow suit with version 56, expected to be released to mainstream users on Tuesday, January 31, as Ars Technica first pointed out.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords HTTP uses an open, unencrypted connection between you and the website you’re visiting that could be intercepted by anyone monitoring traffic between you and the site. For that reason, it’s never a good idea to share login or credit card information over an HTTP connection. Most major sites offer the encrypted version—HTTPS—but every now and then you’ll come across a site that doesn’t.To read this article in full or to leave a comment, please click here

Trump’s trade TPP move a setback for cloud computing

WASHINGTON -- On the heels of the news that President Trump has removed the United States from the Trans-Pacific Partnership (TPP), a massive trade deal that he blasted as a candidate, experts warned of the fallout for cloud-computing companies that have been advocating for policies to break down digital trade barriers that restrict the flow of data traffic across international boundaries.Here at the annual State of the Net tech policy conference, the news was met with disappointment by a panel of experts, who said that the provisions of the TPP governing the activities of tech companies would have been an important step toward establishing international norms for trade in the digital age.To read this article in full or to leave a comment, please click here

Face-off: Oracle vs. CA for identity management

Employees come and go, or switch departments, so IT managers seek an automated way to give (or deny) them access privileges to corporate systems. Two of the top software products for identity and access management (IAM) are Oracle Identity Manager and CA Identity Manager, according to IT Central Station, an online community where IT professionals review enterprise products.To read this article in full or to leave a comment, please click here(Insider Story)

Face-off: Oracle vs. CA for identity management

Employees come and go, or switch departments, so IT managers seek an automated way to give (or deny) them access privileges to corporate systems. Two of the top software products for identity and access management (IAM) are Oracle Identity Manager and CA Identity Manager, according to IT Central Station, an online community where IT professionals review enterprise products.Both products have their fans who say the sophisticated software helps them handle routine access tasks … without paperwork. But users also note that there are areas where the products have room for improvement — areas such as the user interface, initial setup and vendor tech support, according to reviews at IT Central Station. Plus, several users said the vendors need to migrate these products to the cloud.To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: Thales Data Threat Report: Security spending up, but so are breaches

It’s interesting seeing how much money technology vendors spend on surveys that (at least most often) justify their own existence. It would be easy to be cynical about them, but beyond the self-serving aspects of it all, the data these surveys generate is interesting as a general “state of the nation” assessment.A good case in point is Thales' new Data Threat Report (pdf). Thales is a huge vendor that employs over 60,000 people across 56 countries. With multibillion euro revenue, it makes sense for the company to increase the perception that it is a thought leader in its field. And Thales' field is a big one. It is a systems integrator, equipment supplier and service provider in the aerospace, transport, defense and security markets. A major part of the company's offering lies around cybersecurity. This report is, therefore, very much in its wheelhouse.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Thales Data Threat Report: Security spending up, but so are breaches

It’s interesting seeing how much money technology vendors spend on surveys that (at least most often) justify their own existence. It would be easy to be cynical about them, but beyond the self-serving aspects of it all, the data these surveys generate is interesting as a general “state of the nation” assessment.A good case in point is Thales' new Data Threat Report (pdf). Thales is a huge vendor that employs over 60,000 people across 56 countries. With multibillion euro revenue, it makes sense for the company to increase the perception that it is a thought leader in its field. And Thales' field is a big one. It is a systems integrator, equipment supplier and service provider in the aerospace, transport, defense and security markets. A major part of the company's offering lies around cybersecurity. This report is, therefore, very much in its wheelhouse.To read this article in full or to leave a comment, please click here

iPhone 8 likely to feature ‘wraparound’ display design

It's no secret that Apple's iPhone design is in need of a refresh. While there's certainly nothing wrong with the current form factor, the iPhone's industrial design has largely remained unchanged since Apple released the iPhone 6 back in 2014. That's quite a long time for a smartphone market that tends to move at warp speed.What's more, with 2016 marking the first year that iPhone sales experienced a decline, there's a strong case to be made that iPhone owners are more eager than ever before for something a little bit fresher.Not to fear, Apple's 2017 iPhone -- a device that will reportedly be dubbed the iPhone 8 -- may finally introduce a brand new design. Over the past few months, there have been a deluge of rumors all pointing towards an iPhone 8 featuring an edge to edge OLED display with extremely minimal bezels. What's more, some reports claim that all of the iPhone's front-facing sensors, including Touch ID, will somehow be embedded into the display itself.To read this article in full or to leave a comment, please click here