Archive

Category Archives for "Networking"

Data-wiping malware strikes Saudi government agencies

Saudi Arabia's government agencies were hit with a cyberattack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data.Several government bodies and vital installations suffered the attack, disrupting their servers, the country's Saudi Press Agency said on Thursday. The transportation sector was among the agencies hit by an actor from outside the country, the press agency said.Security firms say the attack involved malware called Shamoon or Disttrack that was previously found targeting a Saudi Arabian oil company four years ago. That attack disabled 30,000 computers.  To read this article in full or to leave a comment, please click here

Who’s responsible for data compliance? 25% of executives don’t know

According to the 2016 State of Compliance survey conducted by data management and integration provider Liaison Technologies, one-quarter of top executives are unclear who in their organization is responsible for compliance. And nearly half (47 percent) of respondents to the survey of 479 senior and C-level executives said they don't know which compliance standards apply to their organizations.To read this article in full or to leave a comment, please click here(Insider Story)

Firefox recovers from near-death experience

Mozilla's Firefox backed further from the brink last month, and Mac owners continued to abandon Apple's Safari, new data released today showed.Also, last month, Microsoft lost another 23 million Internet Explorer and Edge users.According to analytics vendor Net Applications, Firefox's user share -- an estimate of the proportion of all personal computer users who ran that browser -- climbed eight-tenths of a percentage point last month to finish at 11.9%, its highest mark since December 2015. In the last three months, Firefox has regained 4.2 points, recovering from a near-death experience when in August it recorded a user share of just 7.7%.To read this article in full or to leave a comment, please click here

Who’s responsible for data compliance? 25% of executives don’t know

According to the 2016 State of Compliance survey conducted by data management and integration provider Liaison Technologies, one-quarter of top executives are unclear who in their organization is responsible for compliance. And nearly half (47 percent) of respondents to the survey of 479 senior and C-level executives said they don't know which compliance standards apply to their organizations.“As leaders in the compliance domain we thought it was important to share our findings on how U.S. companies perceive their regulatory obligations—and examine ways to help improve their compliance postures,” Hmong Vang, chief trust officer with Liaison, said in a statement. “What we found was rather concerning."To read this article in full or to leave a comment, please click here(Insider Story)

American Heart Association looks for cure in the cloud

LAS VEGAS -- Executives at the American Heart Association are betting that the cures for heart disease, stroke and diabetes lie in the cloud.The heart association (AHA), a nonprofit organization that funds research on heart disease and promotes public health policies, is working with Amazon Web Services (AWS) to set up a cloud-based system where scientists from around the world can store, share and analyze research data.Making that data available in the cloud could accelerate research and lead to a cure for cardiovascular disease, which is the top cause of death worldwide. American Heart Association Nancy Brown is CEO of the American Heart Association.To read this article in full or to leave a comment, please click here

AWS tries to protect its customers from DDoS attacks with new service

One of the big stories in security over the past year has been the rise of devastating distributed denial of service (DDoS) attacks that have hit sites and organizations like DNS provider Dyn, the BBC and the website of security journalist Brian Krebs.Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It's called Shield, and the free entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday.To read this article in full or to leave a comment, please click here

AWS tries to protect its customers from DDoS attacks with new service

One of the big stories in security over the past year has been the rise of devastating distributed denial of service (DDoS) attacks that have hit sites and organizations like DNS provider Dyn, the BBC and the website of security journalist Brian Krebs.Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It's called Shield, and the free entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday.To read this article in full or to leave a comment, please click here

Review: Linksys WRT3200ACM AC3200 MU-MIMO Gigabit Wi-Fi Router

Imagine that you’re Linksys – you’ve been in the home wireless space for decades, even before the term Wi-Fi was created. You’ve been bought and sold a few times to a bunch of different companies (including Cisco), but you’re still plugging away, creating new wireless routers for home users. Then along comes a wave of new products with wireless mesh capabilities, fancy mobile device apps and a whole bunch of media love. You want to just get up and scream, “Hey, new kids! Get off my damn lawn!”OK, maybe that last metaphor is a stretch – Linksys is not the old guy yelling at the millennials, but this company is still considered one of the major players in the home Wi-Fi space, even if they don’t have a bunch of tiny, shiny new mesh units to speak of (at least yet). Their latest Wi-Fi router is the WRT3200ACM AC3200 MU-MIMO Gigabit Wi-Fi Router, and we were lucky enough to take it out for a spin.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

2016’s notable deaths in technology, science & inventions

Paying respectsImage by Network World staffThe worlds of networking, computing, science and inventions have lost pioneering and influential figures in 2016, from those who brought us networked email to the earliest PCs to movie icons. Here’s our modest tribute to these innovators worth remembering. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Clickbait and the Avaya feeding frenzy

A friend I respect a great deal once told me that using Latin makes you sound smart. So, here I go, consciously throwing the term horror vacui your way. Horror vacui is a concept originally from Aristotle that, according to Porter, ‎Park ‎and Daston, “By the thirteenth century, scholastic writers were beginning to attribute to nature … a kind of force by which nature resists allowing a vacuum to form.” Something of this character seems to be happening as people rush to fill the void of no official news about the current business challenges Avaya faces. In absence of any real information, a narrative has evolved in the past several weeks that has not been positive.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to architect the network so IoT devices are secure

Just as the internet changed everything, a new revolution known as the Internet of Things (IoT) promises to produce even greater disruption.  Primarily because IoT sensors will be utilized everywhere—in hospitals to monitor medical devices, in factories to supervise operations, in buildings for controlling temperature and lighting, etc.  Data from these sensors will be used for operations management, predictive maintenance and much more. Meanwhile, all of these applications are typically integrated with an enterprise’s IT infrastructure. As such, they are introducing a variety of new security challenges.+ Also on Network World: DDoS attacks using IoT devices follow The Manchurian Candidate model + Just like in current IT environments, there is no security silver bullet that can protect IoT devices from every possible cyber threat.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to architect the network so IoT devices are secure

Just as the internet changed everything, a new revolution known as the Internet of Things (IoT) promises to produce even greater disruption.  Primarily because IoT sensors will be utilized everywhere—in hospitals to monitor medical devices, in factories to supervise operations, in buildings for controlling temperature and lighting, etc.  Data from these sensors will be used for operations management, predictive maintenance and much more. Meanwhile, all of these applications are typically integrated with an enterprise’s IT infrastructure. As such, they are introducing a variety of new security challenges.+ Also on Network World: DDoS attacks using IoT devices follow The Manchurian Candidate model + Just like in current IT environments, there is no security silver bullet that can protect IoT devices from every possible cyber threat.To read this article in full or to leave a comment, please click here