Archive

Category Archives for "Networking"

DNC hacker calls on brethren to monitor US election

The hacker who claims to have breached the Democratic National Committee isn't done trying to influence this year's election. On Friday, Guccifer 2.0 warned that Democrats might try to rig the vote next Tuesday.Guccifer 2.0 wrote the statement in a new blog post as U.S. federal agencies are reportedly bracing for cyber attacks on election day.The U.S. has already blamed Russia for allegedly meddling with the upcoming election by hacking into political targets, including the DNC, and then leaking the sensitive documents to the public.To read this article in full or to leave a comment, please click here

Amazon Echo Dot, Order 5 and Get One for Free- Deal Alert

Echo Dot is a hands-free, voice-controlled device that uses Alexa to play & control music (either on its own, or through a connected speaker/receiver), control smart home devices, provide information, read the news, set alarms, and more. If you’re looking to buy them as gifts, or for different homes or rooms, Amazon will throw in a free one ($50 value) when you buy 5, or two free ones when you buy 10 (a $100 value). To take advantage of this limited time offer, select 6 or 12 in the quantity dropdown and add to your Shopping Cart. Enter promo code DOT6PACK or DOT12PACK at checkout where you will see the discount applied. The new Amazon Echo Dot comes in black, and now also white.  See the new Amazon Echo Dot now on Amazon.To read this article in full or to leave a comment, please click here

Securing the cloud endpoint

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In the quest for securing the cloud, one key aspect is often left out of the discussion: the security impact of the cloud endpoint – most notably the imperiled browser.As enterprises and individuals increasingly move computing to the cloud, security at the endpoint has been an escalating concern. Taking matters into their own hands, many enterprise consumers are going “direct to cloud” – avoiding enterprise IT practices that would otherwise protect endpoints, connectivity and data. Meanwhile, IT executives that once viewed cloud-based shared computing and storage infrastructure as their least trustworthy option now see the cloud as the safest choice.To read this article in full or to leave a comment, please click here

Securing the cloud endpoint

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

In the quest for securing the cloud, one key aspect is often left out of the discussion: the security impact of the cloud endpoint – most notably the imperiled browser.

As enterprises and individuals increasingly move computing to the cloud, security at the endpoint has been an escalating concern. Taking matters into their own hands, many enterprise consumers are going “direct to cloud” – avoiding enterprise IT practices that would otherwise protect endpoints, connectivity and data. Meanwhile, IT executives that once viewed cloud-based shared computing and storage infrastructure as their least trustworthy option now see the cloud as the safest choice.

To read this article in full or to leave a comment, please click here

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices.Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using the devices. They most likely didn't have time to thoroughly wipe sensitive personal data like credit card numbers or medical information.Samsung hasn't divulged what it plans to do with the Note7s that were turned in, and didn't respond this week to a query about how it plans to ensure customer data is kept confidential.The company said earlier this week that it is reviewing options for environmentally disposing of the Note7 phones after Greenpeace demanded Samsung find ways to reuse rare materials in the phones, such as gold and tungsten.To read this article in full or to leave a comment, please click here

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices.Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using the devices. They most likely didn't have time to thoroughly wipe sensitive personal data like credit card numbers or medical information.Samsung hasn't divulged what it plans to do with the Note7s that were turned in, and didn't respond this week to a query about how it plans to ensure customer data is kept confidential.The company said earlier this week that it is reviewing options for environmentally disposing of the Note7 phones after Greenpeace demanded Samsung find ways to reuse rare materials in the phones, such as gold and tungsten.To read this article in full or to leave a comment, please click here

Phishing scheme crimps El Paso for $3.2 million

If you ever wonder why phishing scammers continue to try myriad ways of ripping people off you need look no further than this.The El Paso Times this week reported that the city had been scammed out of $3.2 million through a phishing scheme that targeted municipality’s street car development program.+More on Network World: FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhonesTo read this article in full or to leave a comment, please click here

Phishing scheme crimps El Paso for $3.2 million

If you ever wonder why phishing scammers continue to try myriad ways of ripping people off you need look no further than this.The El Paso Times this week reported that the city had been scammed out of $3.2 million through a phishing scheme that targeted municipality’s street car development program.+More on Network World: FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhonesTo read this article in full or to leave a comment, please click here

Intel launches 500 drones for nighttime light show

Could hundreds or thousands of drones in the sky ever replicate the thrill we get from watching a fireworks display?Intel is hoping to reproduce a little of that magic with its Shooting Star drones. They're equipped with lights to provide a show in the night sky, and Intel is offering a whole fleet of them as a service to theme parks, entertainment companies, and cities.Last year, the company managed to get 100 of them flying in formation to produce patterns and, of course, the Intel logo. Now it's managed to synchronize 500 of the devices to display more ambitious and complex patterns (and yes, a better Intel logo).+ ALSO ON NETWORK WORLD Infographic: Commercial drones by the numbers +To read this article in full or to leave a comment, please click here

Democracy has died of dysentery: The Voter Suppression Trail

Despite a number of potential digital threats, voter fraud remains a mostly imaginary problem in this country, a specter raised by politicians seeking to justify ever-more stringent rules designed to suppress voter turnout in areas unfavorable to them.But in a largely post-truth political discourse, simply pointing out that this is a fact doesn’t seem to be enough. What is needed – and what the New York Times Op-Docs project has collaborated with the satirists at GOP Arcade to produce – is a video game.+ CAN THE ELECTIONS BE HACKED? Find out with Network World's package of stories +To read this article in full or to leave a comment, please click here

Our Shared Values

After this week’s news that the IP Networking assets of Brocade will be sold to a lucky buyer, I wanted to take the time to reflect on what we’ve achieved, our value as the Network Edge business unit of Brocade, and why we value our partners and customers and intend to continue delivering the quality products and customer service Ruckus is known for.

25% to 30% of users struggle with identifying phishing threats, study says

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Humans are often the weak link in any cybersecurity defense. People behave unpredictably because we are sometimes driven by emotion and by an innate desire to trust and please other people. Also, we tend to take the path of least resistance, even if that path inadvertently creates a cybersecurity risk. Attackers understand these human traits, which is why they are frequently successful in exploiting people to get around more predictable machine-based defenses. As an example, consider phishing. It’s estimated that globally, 8 million phishing email messages are opened every day, and of those, 800,000 recipients of the malicious messages click on the embedded links. Ten percent of the people who click on a link actually give their information, such as login credentials for personal applications or their employer’s applications.To read this article in full or to leave a comment, please click here

25% to 30% of users struggle with identifying phishing threats, study says

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Humans are often the weak link in any cybersecurity defense. People behave unpredictably because we are sometimes driven by emotion and by an innate desire to trust and please other people. Also, we tend to take the path of least resistance, even if that path inadvertently creates a cybersecurity risk. Attackers understand these human traits, which is why they are frequently successful in exploiting people to get around more predictable machine-based defenses. As an example, consider phishing. It’s estimated that globally, 8 million phishing email messages are opened every day, and of those, 800,000 recipients of the malicious messages click on the embedded links. Ten percent of the people who click on a link actually give their information, such as login credentials for personal applications or their employer’s applications.To read this article in full or to leave a comment, please click here