Archive

Category Archives for "Networking"

FBI dispute with DNC over hacked servers may fuel doubt on Russia role

The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee -- the agency never directly examined the DNC servers that were breached.Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement.The incident threatens to spark more skepticism over whether the U.S. properly arrived at its conclusion that Russian cyberspies were responsible for the breach.To read this article in full or to leave a comment, please click here

FBI dispute with DNC over hacked servers may fuel doubt on Russia role

The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee -- the agency never directly examined the DNC servers that were breached.Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement.The incident threatens to spark more skepticism over whether the U.S. properly arrived at its conclusion that Russian cyberspies were responsible for the breach.To read this article in full or to leave a comment, please click here

MP on Vertitech IT’s “Best IT Blogs 2017”

This is a quick post to say thanks to the folks at Vertitech IT for listing movingpackets.net among their Best IT Blogs for 2017 (“Must-Read Resources for CIOs, IT & Security Pros”).

Vertitech IT

In their own words:

VertitechIT’s top 50 IT blogs were selected because they are among the most current, frequently updated, credible, and informative sources of information related to IT on the web today. From musings of industry leaders, to the veteran guys and gals in the trenches who chronicle their IT journeys, these 50 blogs all have something important to say about the IT world of today, and tomorrow.

Vertitech’s list is definitely worth a browse; I’m very flattered to be listed in such amazing company. I was also delighted to see that NetworkingNerd, Jeremy Stretch and Chris Wahl were featured as well; are all blogs I follow from people I respect.

Some other highlights include Cisco, Gigaom, the Forrester Blog for CIOs, Solarwinds’ Geek Speak (for whom – along with other contributors – I have written a number of blog posts), SC Magazine and TechCrunch Enterprise.

I’m delighted to even be on the same page as these other outlets. Go check the list out and perhaps you’ll also find some great Continue reading

A new Wi-Fi spec will help smart homes run like clockwork

Wi-Fi is an obvious candidate for connecting almost any device that can be plugged into a wall, because it’s already running in nearly every home that has broadband. But can all those products work in lockstep when timing matters, like while video and audio are streaming on several devices?The Wi-Fi Alliance says it has a way to make sure they do. On Thursday at CES, the industry group announced Wi-Fi Certified TimeSync, a specification for precise time synchronization among Wi-Fi devices. It’s expected to be available in the middle of this year.When Wi-Fi began as a wireless way to send packets of data between computers, synchronized clocks didn’t matter. When the packets arrived, the screen appeared or the page was printed. But now that Wi-Fi has a growing role in home entertainment, timing matters.To read this article in full or to leave a comment, please click here

KillDisk cyber sabotage tool evolves into ransomware

A malicious program called KillDisk that has been used in the past to wipe data from computers during cyberespionage attacks is now encrypting files and asking for an unusually large ransom.KillDisk was one of the components associated with the Black Energy malware that a group of attackers used in December 2015 to hit several Ukrainian power stations, cutting power for thousands of people. A month before that, it was used against a major news agency in Ukraine.Since then, KillDisk has been used in other attacks, most recently against several targets from the shipping sector, according to security researchers from antivirus vendor ESET.However, the latest versions have evolved and now act like ransomware. Instead of wiping the data from the disk, the malware encrypts it and displays a message asking for 222 bitcoins to restore them. That's the equivalent of $216,000, an unusually large sum of money for a ransomware attack.To read this article in full or to leave a comment, please click here

KillDisk cyber sabotage tool evolves into ransomware

A malicious program called KillDisk that has been used in the past to wipe data from computers during cyberespionage attacks is now encrypting files and asking for an unusually large ransom.KillDisk was one of the components associated with the Black Energy malware that a group of attackers used in December 2015 to hit several Ukrainian power stations, cutting power for thousands of people. A month before that, it was used against a major news agency in Ukraine.Since then, KillDisk has been used in other attacks, most recently against several targets from the shipping sector, according to security researchers from antivirus vendor ESET.However, the latest versions have evolved and now act like ransomware. Instead of wiping the data from the disk, the malware encrypts it and displays a message asking for 222 bitcoins to restore them. That's the equivalent of $216,000, an unusually large sum of money for a ransomware attack.To read this article in full or to leave a comment, please click here

Microsoft is bundling cloud services to make cars smarter

CES has turned into the first car show of the year, with major automakers choosing to show off upcoming features in Las Vegas. Microsoft wants to help make cars more intelligent, and it unveiled a new suite of services Thursday to do so.The Connected Vehicle Platform brings together a smorgasbord of services from Microsoft, including Azure IoT Hub, Cortana Intelligence Suite, Microsoft Dynamics and many others. In addition, Office 365, Skype for Business and Cortana can be integrated with the platform.It’s not a surprising move. Microsoft frequently packages cloud services as suites, then markets them for kick-starting particular applications. Furthermore, the company has been saying for some time that its goal in car tech is to support carmakers rather than build its own connected cars.To read this article in full or to leave a comment, please click here

Why We Wear Seat Belts On Airplanes

This post is inspired by Matt Simmons‘ fantastic post on why we still have ashtrays on airplanes, despite smoking being banned over a decade ago. This time, I’m going to cover seat belts on airplanes. I’ve often heard people balking at the practice for being somewhat arbitrary and useless, much like balking at turning off electronic devices before takeoff. But while some rules in commercial aviation are a bit arbitrary, there is a very good reason for seat belts.

In addition to being a very, very frequent flier (I just hit 1 million miles on United), I’m also a licensed fixed wing pilot and skydiving instructor. Part of the training of any new skydiver is what we call the “pilot briefing”. And as part of that briefing we talk about the FAA rules for seat belts: They should be on for taxi, take-off, and landing. That’s true for commercial flights as well.

Some people balk at the idea of seat belts on commercial airliners. After all, if you fly into the side of a mountain, a seat belt isn’t going to help much. But they’re still important.

84271048

Your Seat Belt Is For Me, My Seat Belt Is For You

Continue reading

Let’s Encrypt with DANE

For many years we’ve seen Domain Name certificates priced as a luxury add-on, costing many times more than the original name registration fees. Let’s Encrypt has broken that model and now basic security is now freely available to anyone. But the CA model itself is not all that robust, and there are still some critical vulnerabilities that can be exploited by a well-resourced attacker. Adding DANE TSLA records to the DNS signed zone, and equipping user applications, such as browsers, with an additional DNS lookup to fetch and validate the TLSA record is a small step, but a significant improvement to the overall security picture.

20% off Spigen 42mm Apple Watch Case and 2 Screen Protectors – Deal Alert

For the ultimate protection against drops and scratches, Spigen has invented the Rugged Armor case for your 42mm Apple Watch. The case features glossy accents and carbon fiber textures, and air absorption for superior shock protection.  The product ships with 2 screen protectors as well, and is currently listed for just $11.99, 20% off its list price. See the deal on Amazon.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

Intel’s Compute Card mini-computer is so small that you may lose it

You've perhaps never seen a full-blown computer smaller than Intel's amazingly thin Compute Card, announced for the first time at CES.At first glance, it's easy to mistake the modular computer for a credit card or smart card. It's so thin, it could be easy to lose.But it's a full blown computer, crammed with a 7th Generation Intel Kaby Lake processor, memory, storage, and wireless connectivity.It's so small, it can't accommodate USB-C or other ports to power up or connect to displays. The Compute Card will work only after being plugged into a slot of a larger device, much like smart cards.Here's the bad news: It's not targeted toward PCs. However, we hope Intel will eventually make them for PCs, and there are hints the chipmaker could.To read this article in full or to leave a comment, please click here

Woth Reading: Domain name proxies for privacy

Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. WWF-World Wide Fund for Nature aka WWF International v. Moniker Online Services LLC and Gregory Ricks, D2006-0975 (WIPO November 1, 2006) expresses the consensus, namely that use of these services “does not of itself indicate bad faith; there are many legitimate reasons for proxy registration services”). —Circle ID

LinkedInTwitterGoogle+Facebook

The post Woth Reading: Domain name proxies for privacy appeared first on 'net work.

IDG Contributor Network: 5 New Year’s resolutions for the telecom industry

Every year around this time we “gaze into our crystal ball” to identify key trends for the coming year. But this year I’ve decided to do something different. So, instead I’ll share some suggestions for New Year’s resolutions that we, as an industry, should work on together in 2017.What’s the difference, you ask? Trends are defined by the general direction in which something is shifting or changing, whereas the dictionary defines resolution as “a firm decision to do or not do something” or “the action of solving a problem, dispute or contentious matter.” So while the trends of the past few years have prepared us to expect the unexpected when it comes to today’s networks and what users demand, now is the time for us to be bold in our solutions.To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here