Archive

Category Archives for "Networking"

Annual Security Survey – Call for Participation

It’s that time again! Arbor Networks is opening its 12th annual Worldwide Infrastructure Security Report survey. Findings from this survey are compiled and analyzed to provide insights on a comprehensive range of issues from threat detection and incident response to staffing, budgets and partner relationships.  A copy of the report will be sent to all participants. We […]

LEGO builds on its Mac project

The old way of doing IT at The LEGO Group was very much “we decide how you work,” said Michael Loft Mikkelsen. But things are changing at the family-owned company based in Billund, Denmark. One big change is the growing number of Mac users among the 17,000 worldwide LEGO employees. Driving the change is LEGO’s corporate mission.“We have one overarching mission: to inspire and develop the builders of tomorrow. That’s our single most important goal,” said Loft Mikkelsen, infrastructure engineer at LEGO. “To create these fantastic products, we need an IT infrastructure that’s agile, scalable and robust enough to keep up with our development and growth.”To read this article in full or to leave a comment, please click here

The Lost Year: Back to Work

2015 was tough just no getting around it.  I started the year working with an amazing team as the CTO of a company I really believed in and the COO of the company that was supposed to be my future.  By the end of 2015 I had been through 3 jobs (all of my own …

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead of taking advantage of a physical design weakness in RAM chips. The attack technique could also affect other ARM and x86-based devices and computers.The attack stems from the push over the past decade to pack more DRAM (dynamic random-access memory) capacity onto increasingly smaller chips, which can lead to memory cells on adjacent rows leaking electric charges to one another under certain conditions.For example, repeated and rapid accessing of physical memory locations -- an action now dubbed "hammering" -- can cause the bit values from adjacent locations to flip from 0 to 1 or the other way around.To read this article in full or to leave a comment, please click here

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness in RAM chips. The attack technique could also affect other ARM and x86-based devices and computers. The attack stems from the push over the past decade to pack more DRAM (dynamic random-access memory) capacity onto increasingly smaller chips, which can lead to memory cells on adjacent rows leaking electric charges to one another under certain conditions. For example, repeated and rapid accessing of physical memory locations -- an action now dubbed "hammering" -- can cause the bit values from adjacent locations to flip from 0 to 1 or the other way around.To read this article in full or to leave a comment, please click here

66% off KMASHI 15000mAh External Battery Power Bank – Deal Alert

KMASHI's 15,000mAh power bank can charge any 2 smartphones, tablets or USB devices simultaneously at high speed, and several times over without needing to be recharged. It currently averages 4 out of 5 stars on Amazon from over 7,700 customers (read reviews). With the current 66% discount you can buy it on Amazon for just $17. See it now on Amazon.To read this article in full or to leave a comment, please click here

Chinese firm recalls camera products linked to massive DDOS attack

A Chinese electronics component maker is recalling 4.3 million internet-connected camera products from the U.S. market amid claims they may have played a role in Friday's massive internet disruption.On Monday, Hangzhou Xiongmai Technology said it was recalling earlier models of four kinds of cameras due to a security vulnerability that can make them easy to hack."The main security problem is that users aren't changing the device's default passwords," Xiongmai said in a Chinese-language statement posted online.To read this article in full or to leave a comment, please click here

Chinese firm recalls camera products linked to massive DDOS attack

A Chinese electronics component maker is recalling 4.3 million internet-connected camera products from the U.S. market amid claims they may have played a role in Friday's massive internet disruption.On Monday, Hangzhou Xiongmai Technology said it was recalling earlier models of four kinds of cameras due to a security vulnerability that can make them easy to hack."The main security problem is that users aren't changing the device's default passwords," Xiongmai said in a Chinese-language statement posted online.To read this article in full or to leave a comment, please click here

Despite concerns, analysts expect an OK for AT&T-Time Warner deal

Prominent U.S. politicians quickly raised concerns about the proposed $85.4 billion merger of AT&T and Time Warner, but some analysts expect it to pass regulatory muster after a lengthy review."The big question is how a new presidential administration will try to make a mark with its handling of the deal, but I expect whoever is elected will essentially wave [in approval] as it goes by," said Bill Menezes, an analyst at Gartner.Republican presidential nominee Donald Trump and his Democratic rival, Hillary Clinton, both voiced concerns about the deal, while a Senate Judiciary subcommittee has already vowed to hold a hearing on the matter in November.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco and the circle of corporate life

On numerous recent occasions, Cisco Executive Chairman John Chambers has acted as a harbinger for dramatic changes he and others say face the world because of the pace of technology change.In a video recorded at a recent International Monetary Fund event Chambers says technology “will transform every business model that we see,” predicting that “40 percent of the companies in America, Asia, Europe … will disappear in the next decade.”As dramatic as these predictions may seem, they are not unprecedented in business history. In fact, many of the dynamics at play, although happening at a more accelerated pace today, are in part responsible for the success of the company that Chambers led from 1995 to 2006. In this post, I’ll look at two examples from business history, companies whose fates were intertwined with that of Cisco Systems, and compare to the forces at work today.To read this article in full or to leave a comment, please click here

I2RS and Remote Triggered Black Holes

In our last post, we looked at how I2RS is useful for managing elephant flows on a data center fabric. In this post, I want to cover a use case for I2RS that is outside the data center, along the network edge—remote triggered black holes (RTBH). Rather than looking directly at the I2RS use case, however, it’s better to begin by looking at the process for creating, and triggering, RTBH using “plain” BGP. Assume we have the small network illustrated below—

bgp-rtbh-01

In this network, we’d like to be able to trigger B and C to drop traffic sourced from 2001:db8:3e8:101::/64 inbound into our network (the cloudy part). To do this, we need a triggering router—we’ll use A—and some configuration on the two edge routers—B and C. We’ll assume B and C have up and running eBGP sessions to D and E, which are located in another AS. We’ll begin with the edge devices, as the configuration on these devices provides the setup for the trigger. On B and C, we must configure—

  • Unicast RPF; loose mode is okay. With loose RPF enabled, any route sourced from an address that is pointing to a null destination in the routing table will Continue reading

Media fails to tell consumers about device flaws in Friday’s internet outage

Hacked cameras, DVRs and other internet-connected consumer devices were conscripted by perpetrators who installed botnet malware, causing last Friday’s internet outages. The national media reported the event, but it failed to tell consumers what they need to know about buying those types of devices. For example, before making a purchase, consumers need to ask: Does the manufacturer routinely update this device with security patches? Can I change the default passwords when I install the device? The national media could have talked to someone who has first-hand experience with this type of attack, such as Brian Krebs, former Washington Post journalist and now one of the leading security industry bloggers, who would have repeated what he posted on Friday:To read this article in full or to leave a comment, please click here