Archive

Category Archives for "Networking"

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness in RAM chips. The attack technique could also affect other ARM and x86-based devices and computers. The attack stems from the push over the past decade to pack more DRAM (dynamic random-access memory) capacity onto increasingly smaller chips, which can lead to memory cells on adjacent rows leaking electric charges to one another under certain conditions. For example, repeated and rapid accessing of physical memory locations -- an action now dubbed "hammering" -- can cause the bit values from adjacent locations to flip from 0 to 1 or the other way around.To read this article in full or to leave a comment, please click here

66% off KMASHI 15000mAh External Battery Power Bank – Deal Alert

KMASHI's 15,000mAh power bank can charge any 2 smartphones, tablets or USB devices simultaneously at high speed, and several times over without needing to be recharged. It currently averages 4 out of 5 stars on Amazon from over 7,700 customers (read reviews). With the current 66% discount you can buy it on Amazon for just $17. See it now on Amazon.To read this article in full or to leave a comment, please click here

Chinese firm recalls camera products linked to massive DDOS attack

A Chinese electronics component maker is recalling 4.3 million internet-connected camera products from the U.S. market amid claims they may have played a role in Friday's massive internet disruption.On Monday, Hangzhou Xiongmai Technology said it was recalling earlier models of four kinds of cameras due to a security vulnerability that can make them easy to hack."The main security problem is that users aren't changing the device's default passwords," Xiongmai said in a Chinese-language statement posted online.To read this article in full or to leave a comment, please click here

Chinese firm recalls camera products linked to massive DDOS attack

A Chinese electronics component maker is recalling 4.3 million internet-connected camera products from the U.S. market amid claims they may have played a role in Friday's massive internet disruption.On Monday, Hangzhou Xiongmai Technology said it was recalling earlier models of four kinds of cameras due to a security vulnerability that can make them easy to hack."The main security problem is that users aren't changing the device's default passwords," Xiongmai said in a Chinese-language statement posted online.To read this article in full or to leave a comment, please click here

Despite concerns, analysts expect an OK for AT&T-Time Warner deal

Prominent U.S. politicians quickly raised concerns about the proposed $85.4 billion merger of AT&T and Time Warner, but some analysts expect it to pass regulatory muster after a lengthy review."The big question is how a new presidential administration will try to make a mark with its handling of the deal, but I expect whoever is elected will essentially wave [in approval] as it goes by," said Bill Menezes, an analyst at Gartner.Republican presidential nominee Donald Trump and his Democratic rival, Hillary Clinton, both voiced concerns about the deal, while a Senate Judiciary subcommittee has already vowed to hold a hearing on the matter in November.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

I2RS and Remote Triggered Black Holes

In our last post, we looked at how I2RS is useful for managing elephant flows on a data center fabric. In this post, I want to cover a use case for I2RS that is outside the data center, along the network edge—remote triggered black holes (RTBH). Rather than looking directly at the I2RS use case, however, it’s better to begin by looking at the process for creating, and triggering, RTBH using “plain” BGP. Assume we have the small network illustrated below—

bgp-rtbh-01

In this network, we’d like to be able to trigger B and C to drop traffic sourced from 2001:db8:3e8:101::/64 inbound into our network (the cloudy part). To do this, we need a triggering router—we’ll use A—and some configuration on the two edge routers—B and C. We’ll assume B and C have up and running eBGP sessions to D and E, which are located in another AS. We’ll begin with the edge devices, as the configuration on these devices provides the setup for the trigger. On B and C, we must configure—

  • Unicast RPF; loose mode is okay. With loose RPF enabled, any route sourced from an address that is pointing to a null destination in the routing table will Continue reading

Media fails to tell consumers about device flaws in Friday’s internet outage

Hacked cameras, DVRs and other internet-connected consumer devices were conscripted by perpetrators who installed botnet malware, causing last Friday’s internet outages. The national media reported the event, but it failed to tell consumers what they need to know about buying those types of devices. For example, before making a purchase, consumers need to ask: Does the manufacturer routinely update this device with security patches? Can I change the default passwords when I install the device? The national media could have talked to someone who has first-hand experience with this type of attack, such as Brian Krebs, former Washington Post journalist and now one of the leading security industry bloggers, who would have repeated what he posted on Friday:To read this article in full or to leave a comment, please click here

Media fails to tell consumers about device flaws in Friday’s internet outage

Hacked cameras, DVRs and other internet-connected consumer devices were conscripted by perpetrators who installed botnet malware, causing last Friday’s internet outages. The national media reported the event, but it failed to tell consumers what they need to know about buying those types of devices. For example, before making a purchase, consumers need to ask: Does the manufacturer routinely update this device with security patches? Can I change the default passwords when I install the device? The national media could have talked to someone who has first-hand experience with this type of attack, such as Brian Krebs, former Washington Post journalist and now one of the leading security industry bloggers, who would have repeated what he posted on Friday:To read this article in full or to leave a comment, please click here

Not robocop, but robojudge? AI learns to rule in human rights cases

An artificial intelligence system designed to predict the outcomes of cases at the European Court of Human Rights would side with the human judges 79 percent of the time.Researchers at University College London and the University of Sheffield in the U.K., and the University of Pennsylvania in the U.S., described the system in a paper published Monday by the Peer Journal of Computer Science."We formulated a binary classification task where the input of our classifiers is the textual content extracted from a case and the target output is the actual judgment as to whether there has been a violation of an article of the convention of human rights," wrote the paper's authors, Nikolaos Aletras, Dimitrios Tsarapatsanis, Daniel Preoţiuc-Pietro and Vasileios Lampos.To read this article in full or to leave a comment, please click here

Where to find the world’s best programmers

Donald Knuth, Ken Thompson, Dennis Ritchie, Grace Hopper: The United States has produced some of the greatest software engineers who have ever lived.But outside the United States computer technology and education have become far more accessible over the last 20 years or so, and that means that in China and many other less developed countries there are now plenty of young minds that have been trained to become skilled programmers.So which countries produce the best coders is an interesting question to ask. Perhaps more importantly why do some countries lead the way? [ Also on CIO.com: The 13 developer skills you need to master now ]To read this article in full or to leave a comment, please click here