Archive

Category Archives for "Networking"

Comodo Certificate Manager relieves the burden of managing security certificates manually  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Digital certificates provide the backbone of information security and trust on the Internet. Demand for certificates is exploding as companies use them to secure and build trust in web transactions, email messages, application code, and devices such as those on the Internet of Things. The use case for digital certificates continues to expand as more people and devices become connected. It’s not unusual for an enterprise organization to have 10,000 or more certificates in use. For example, a company might use certificates to digitally sign and encrypt email messages and attachments. Allowing for one certificate per email account, this can amount to tens of thousands of certificates for this use case alone.To read this article in full or to leave a comment, please click here

Attacks to make Ask.com Toolbar a conduit for malware are nipped in the bud

Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.The malicious actors are unknown but they managed to get the legitimate Ask.com toolbar update feature to place a dropper/uploader into the browsers of several customers of security firm Red Canary.Once installed, the dropper would bring in secondary malware including banking Trojans and other online-fraud code, says Keith McCammon, CSO of Red Canary. The secondary payloads varied, and some of the dozen or so compromised machines his team found had downloaded more than one kind, he says.To read this article in full or to leave a comment, please click here

Virgin Galactic, start-up Boom tout supersonic passenger jet

Supersonic travel may indeed become a reality (again) if Sir Richard Branson’s Virgin group and start-up Boom Supersonic have their way.Boom this week showed off its XB-1 Supersonic Demonstrator, or Baby Boom, a subscale prototype of what is to be the Boom supersonic passenger airliner which Boom says will be “the world’s first independently developed supersonic jet and the fastest civil aircraft ever made.” The two-seat prototype aircraft is expected to make its first flight in late 2017 with a commercial passenger plane perhaps coming in few years, the company said.+More on Network World: TSA: Keep grandma’s gravy at home but the turducken can fly+To read this article in full or to leave a comment, please click here

Visibility In Networking – Quick Thoughts from Networking Field Day

nfd-logo

I’m at Networking Field Day 13 this week. You can imagine how much fun I’m having with my friends! I wanted to drop some quick thoughts on visibility for this week on you all about what we’re hearing and raise some interesting questions.

I Can See Clearly Now

Visibility is a huge issue for companies. Seeing what’s going on is hard for people. Companies like Ixia talk about the need to avoid dropping any packets to make sure we have complete knowledge of the network. But that requires a huge amount of hardware and design. You’re always going to need traditional monitoring even when everything is using telemetry and other data models. Make sure you size things right.

Forward Networks told us that there is an increasing call for finding a way to monitor both the underlay network and the overlay network. Most overlay companies give you a way to tie into their system via API or other telemetry. However, there is no visibility into the underlay because of the event horizon. Likewise, companies like Forward Networks are focusing on the underlay with mapping technologies and modeling software but they can’t pass back through the event horizon to see into Continue reading

UK mobile operator loses phones following data breach

In a twist, thieves in the U.K. hacked personal data to steal high-end smartphones, rather than hacking phones to steal personal data.The thefts came to light after mobile network operator Three noticed a recent increase in levels of handset fraud, the company said Friday.By accessing the system Three uses to manage handset upgrades, the perpetrators were able to intercept new high-end handsets on the way to the operator's customers.Three, however, said only eight devices have been illegally obtained through the upgrade activity -- compared to 400 stolen from its retail stores over the past four weeks.The company sought to reassure customers concerned that their personal information may have been accessed in the attempt to steal the upgrade phones.To read this article in full or to leave a comment, please click here

UK mobile operator loses phones following data breach

In a twist, thieves in the U.K. hacked personal data to steal high-end smartphones, rather than hacking phones to steal personal data.The thefts came to light after mobile network operator Three noticed a recent increase in levels of handset fraud, the company said Friday.By accessing the system Three uses to manage handset upgrades, the perpetrators were able to intercept new high-end handsets on the way to the operator's customers.Three, however, said only eight devices have been illegally obtained through the upgrade activity -- compared to 400 stolen from its retail stores over the past four weeks.The company sought to reassure customers concerned that their personal information may have been accessed in the attempt to steal the upgrade phones.To read this article in full or to leave a comment, please click here

45% off Bestrix Universal Tablet Car Headrest Cradle – Deal Alert

Road trip this holiday season? The Bestrix universal headrest tablet mount provides an easy solution for using your tablet while mobile. It's designed for easy installation and removal, and instantly turn your car’s backseat into an entertainment center without blocking any of your tablet’s buttons or jacks. The mount can hold all tablets including all versions of Apple iPads, Samsung Tab and all tablets up to 11’’. Its 360 degree rotation feature allows all users to have a perfect view of the tablet from various or changing positions in the car. It currently averages 4.5 out of 5 stars from nearly 200 people on Amazon (see reviews) where its typical list price of $36 has been reduced 45% to $20. See the discounted Bestrix headrest tablet mount on Amazon.To read this article in full or to leave a comment, please click here

Hyper convergence leads to humanless datacenters: Nutanix CEO Pandey

An enterprise cloud platform company, Nutanix helps companies thread the path of hyper converged infra. ComputerWorld India had an extensive chat with Dheeraj Pandey, Co-founder & CEO, Nutanix on hyper convergence, IPO debut, and competitive landscape. "Hyper convergence is a pit stop in the true journey towards an invisible infrastructure for companies. One can spin up a firewall or storage array through a written code than buy the hardware for the humans to rack and stack it," said Pandey during his recent India visit.Edited Excerpts:Tech OEMs, big or small, end-to-end or niche, are all hitching a ride on the hyper converged Infra bandwagon. How do you demystify `hyper converged' for enterprises?To read this article in full or to leave a comment, please click here

Hyper convergence leads to humanless datacenters: Nutanix CEO Pandey

An enterprise cloud platform company, Nutanix helps companies thread the path of hyper converged infra. ComputerWorld India had an extensive chat with Dheeraj Pandey, Co-founder & CEO, Nutanix on hyper convergence, IPO debut, and competitive landscape. "Hyper convergence is a pit stop in the true journey towards an invisible infrastructure for companies. One can spin up a firewall or storage array through a written code than buy the hardware for the humans to rack and stack it," said Pandey during his recent India visit.Edited Excerpts:Tech OEMs, big or small, end-to-end or niche, are all hitching a ride on the hyper converged Infra bandwagon. How do you demystify `hyper converged' for enterprises?To read this article in full or to leave a comment, please click here

‘Wireless security at its finest’

The person who submitted the above photo to Reddit’s section devoted to IT rants presumably does not believe it depicts wireless security at its finest. In fact, the sarcasm oozes.However, not everyone in the forum held such a dim view.“There is nothing wrong with this,” writes another user. “It is public wi-fi. It has a slight security advantage over an open network in that it makes it more difficult to eavesdrop. The (would-be) attacker also has to capture the handshake when a client associates.”There were supportive variations on that theme.To read this article in full or to leave a comment, please click here

‘Wireless security at its finest’

The person who submitted the above photo to Reddit’s section devoted to IT rants presumably does not believe it depicts wireless security at its finest. In fact, the sarcasm oozes.However, not everyone in the forum held such a dim view.“There is nothing wrong with this,” writes another user. “It is public wi-fi. It has a slight security advantage over an open network in that it makes it more difficult to eavesdrop. The (would-be) attacker also has to capture the handshake when a client associates.”There were supportive variations on that theme.To read this article in full or to leave a comment, please click here