Archive

Category Archives for "Networking"

US investigates Russia for attempting to hack the election

Intelligence and law enforcement agencies are reportedly investigating whether Russia has launched a broad, covert operation to disrupt the U.S. elections in November.Officials believe that Russia appears to be attempting to spread disinformation and hack into U.S. political systems in an effort to undermine confidence in the upcoming election, according to a report in the Washington Post. Investigators do not have "definitive" proof of a Russian operation, but there is "significant concern," the Post quoted an anonymous senior intelligence official as saying.To read this article in full or to leave a comment, please click here

US investigates Russia for attempting to hack the election

Intelligence and law enforcement agencies are reportedly investigating whether Russia has launched a broad, covert operation to disrupt the U.S. elections in November.Officials believe that Russia appears to be attempting to spread disinformation and hack into U.S. political systems in an effort to undermine confidence in the upcoming election, according to a report in the Washington Post. Investigators do not have "definitive" proof of a Russian operation, but there is "significant concern," the Post quoted an anonymous senior intelligence official as saying.To read this article in full or to leave a comment, please click here

Box unveils new Relay workflow tool in partnership with IBM

Companies that want to try simplifying the tangled mess of their internal workflows will be able to use a new tool from Box to help.Box Relay is a new product the enterprise storage company announced on Tuesday that's aimed at giving employees a way to manage and track the process of doing  repetitive work, like submitting expense reports and getting agreements approved.Using Relay, power users will be able to design workflows that they can then share with co-workers inside an organization and people from other companies who work with them. According to Chris Yeh, Box's senior vice president of product, Relay is aimed at making Box the system that people use to get work done together, in addition to storing files.To read this article in full or to leave a comment, please click here

BrandPost: Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

MacBook Battery Replacement Requires Admin Credentials?

Over the weekend, I investigated the possibility of Apple replacing the tired battery in my four year old rMBP13. Yes, they can do it. It’s $199 for that particular model. But they also require an admin-level username and password for the device. Here’s an excerpt from the chat session.


Apple support rep:

What is the Admin Name and password for your Mac?

Me:

Will not share. Definitely should not be required for a battery replacement.

Apple support rep:

It is required. When the Mac goes to the repair depot that is required. You can remove that information so there is just an automatic log in. And you can set it up again when you get it back. We do not ask for any information that is not required.

Me:

Okay, then we’re done here. Thanks very much for your help!


An automatic log in, while an improvement from a certain point of view, isn’t a fix. No, you don’t have to know the user/pass now to access the system now, but you’re still on the system with admin-level credentials. Anyone with admin equivalent credentials to the system can, with a minimum of effort, get into whatever part of the file system Continue reading

Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn't need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system.To read this article in full or to leave a comment, please click here

Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn't need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system.To read this article in full or to leave a comment, please click here

SSH Agent on OS X

There’s a lot of information on the intertoobs about getting ssh-agent “working” in OS X and even more articles about when and how the stock behavior of ssh-agent changed (mostly with respect to how ssh-agent interacted with the Keychain).

This article doesn’t cover or care about any of that.

This article is concerned with:

  • Enabling ssh-agent in such a way that I can “ssh-add” in one terminal window and that same agent (and the loaded keys) is available in all of my other terminal windows.
  • Enabling use of ssh-agent from MacPorts and/or Homebrew and not the older ssh-agent that OS X ships with in /usr/bin.
  • To avoid having to put my keys in the Keychain (just a matter of preference).

Compatibility

Beware, reader. There’s an awful lot of outdated, inaccurate information out there on how to modify ssh-agent behavior on OS X. Guess what? OS X changes from version to version! Many articles out there cater to older versions of the OS and are either no longer applicable (due to changes in OS X behavior) or plain don’t work (due to functional changes in the software).

The steps below have been tested with OS X El Capitan (10.11).

What’s Continue reading

How blockchain will disrupt your business

Like mobile and cloud, blockchain — first implemented in the original source code of bitcoin in 2009 — stands poised to profoundly disrupt business. If it lives up to its promise, it won't just be financial institutions that are disrupted."If you can transfer money or something of value through the internet just like another form of data, what else can you do with it? It provides a way to establish trust in the digital world," says Angus Champion de Crespigny, Financial Services Blockchain and Distributed Infrastructure Strategy Leader, Ernst & Young. "How do you ensure something is the original copy of something on the internet? Prior to blockchain technology, you couldn't."To read this article in full or to leave a comment, please click here

5 tips to better understand millennial managers

Millennials are now the largest generation in the U.S. workforce, which means they're quickly infiltrating every rank in corporate America -- especially middle management. While millennials want much of the same things as previous generations, they also have different values and expectations for their employers.To read this article in full or to leave a comment, please click here

7 tips for making a good impression at your new job

The first month in a new job is arguably one of the most critical, as it can set the tone for your entire tenure with the company. Your actions and reactions can make or break your reputation at your new company and can impact your entire career, says Todd Dean, co-founder and CMO of mobile employment app Wirkn. Here are Dean's six tips for making your first month at a new role one of your best.To read this article in full or to leave a comment, please click here(Insider Story)

How to control your privacy in Chromebooks vs. Windows 10

When it comes to privacy, both Google’s Chrome OS and Microsoft’s Windows 10 take an “opt-out” stance.By default, both platforms collect a variety of data about your usage, but the way they go about it is often different. While Microsoft presents users with a long list of privacy-related toggles, Google’s controls are less granular. Both companies, however, make you jump through additional hoops to disable the kind of personalized ads that help them turn a profit.PCWorld recently broke down all the ways Microsoft grabs at your data in Windows 10, so it’s only fair we compare that to Google’s computing platform. Here’s how Chrome OS and Windows 10 measure up on privacy and data collection.To read this article in full or to leave a comment, please click here

Essential certifications for smart security pros

If you’re pursuing a career in IT security, certifications can only help you. Certification-critics often say a certification means nothing, and acumen and experience are the true differentiators, but as a holder of dozens of IT security certifications, I beg to differ. So do employers.To read this article in full or to leave a comment, please click here(Insider Story)

Essential certifications for smart security pros

If you’re pursuing a career in IT security, certifications can only help you. Certification-critics often say a certification means nothing, and acumen and experience are the true differentiators, but as a holder of dozens of IT security certifications, I beg to differ. So do employers.A particular certification is often the minimum hurdle to getting an one-on-one in-person job interview. If you don’t have the cert, you don’t get invited. Other times, having a particular certification can give you a leg up on competing job candidates who have similar skill sets and experience.[ Deep Dive: How to rethink security for the new world of IT. | Discover how to secure your systems with InfoWorld's Security newsletter. ] Every certification I’ve gained took focused, goal-oriented study -- which employers view favorably, as they do with college degrees. More important, I picked up many new skills and insights in IT security while studying for each certification test. I also gained new perspectives on even familiar information I thought I had already mastered. I became a better employee and thinker because of all the certifications I have studied for and obtained. You will too.To read this article in full or to Continue reading

How to create a data-centric security infrastructure

Data everywhere Image by ThinkstockFirewalls, APT protection, antivirus, etc., are all necessary to protect an organization’s integrity. But when you get down to the nitty gritty, it’s about the data – the intellectual property, the customer PII, the M&A info, your customer data and all the information that keeps the business running. With today’s multiplatform environment, your sensitive information may no longer completely be under your control. It could be on any device, shared in unauthorized locations, or accessed by the right people the wrong way. You need to manage every facet of what is being accessed, by whom, when, where, and how.To read this article in full or to leave a comment, please click here

How to create a data-centric security infrastructure

Data everywhere Image by ThinkstockFirewalls, APT protection, antivirus, etc., are all necessary to protect an organization’s integrity. But when you get down to the nitty gritty, it’s about the data – the intellectual property, the customer PII, the M&A info, your customer data and all the information that keeps the business running. With today’s multiplatform environment, your sensitive information may no longer completely be under your control. It could be on any device, shared in unauthorized locations, or accessed by the right people the wrong way. You need to manage every facet of what is being accessed, by whom, when, where, and how.To read this article in full or to leave a comment, please click here

New Wi-Fi features in Windows 10 Anniversary Update

Last month Microsoft debuted its first major update to Windows 10, technically called version 1607 but generally known as the Anniversary Update. You may have seen stories around the web delving into the update's general improvements including a smarter Cortana, Edge extensions and Windows Ink, but rarely have the Anniversary Update's new Wi-Fi and networking features and interfaces been discussed.To read this article in full or to leave a comment, please click here(Insider Story)