Archive

Category Archives for "Networking"

Much ado about the ransomware scourge

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. New forms of ransomware encrypt files of website operators, threatening not only their files containing stored data, but the very files needed to operate their websites. Other variants of ransomware are now targeting files on mobile devices,” the FTC wrote.To read this article in full or to leave a comment, please click here

Much ado about the ransomware scourge

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. New forms of ransomware encrypt files of website operators, threatening not only their files containing stored data, but the very files needed to operate their websites. Other variants of ransomware are now targeting files on mobile devices,” the FTC wrote.To read this article in full or to leave a comment, please click here

Much ado about the ransomware scourge

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. New forms of ransomware encrypt files of website operators, threatening not only their files containing stored data, but the very files needed to operate their websites. Other variants of ransomware are now targeting files on mobile devices,” the FTC wrote.To read this article in full or to leave a comment, please click here

IBM’s big cloud win

IBM today announced that Workday, the popular SaaS-based enterprise application company, will use the SoftLayer cloud as its primary development platform for new applications as part of a multi-year deal worth an undisclosed amount.The move is significant because it comes on the heels of another major SaaS vendor – Salesforce.com – announcing it chose Amazon Web Services as its development partner earlier this year. SaaS vendors are buddying up with IaaS providers to help build out their future applications.+MORE AT NETWORK WORLD: Why Salesforce linking up with Amazon is a big deal in the cloud +To read this article in full or to leave a comment, please click here

12% off Texas Instruments TI-84 Plus Graphics Calculator – Deal Alert

If a graphic calculator is somewhere on your list, consider this 12% discount on the Texas Instruments TI-84 Plus graphing calculator. Building on the hugely popular TI-83 Plus, which is perhaps the best-selling calculator of all time, the TI-84 Plus is completely compatible with its predecessor. From that well-established platform, this new model adds more speed (a processor that's 2.5 times faster), more memory (24 KB RAM and 480 KB of Flash ROM), an enhanced high-contrast display (eight lines by 16 characters), and more Apps. Newly added "USB on the go" feature lets you share with other calculators, or connect to a PC or presentation tool. Ideal for middle school through college. The TI-84 Plus currently averages 4.5 out of 5 stars on Amazon from over 2,900 customers (read reviews). Save 12% off the regular $100 list price on Amazon, and buy it now for $88. Oh, and it might not hurt to drop this in your cart while you're there: Ti-84 Plus Graphing Calculator For Dummies. To read this article in full or to leave a comment, please click here

snaproute Go BGP Code Dive (8): Moving to Open

Last week we left off with our BGP peer in connect state after looking through what this code, around line 261 of fsm.go in snaproute’s Go BGP implementation—

func (st *ConnectState) processEvent(event BGPFSMEvent, data interface{}) {
  switch event {
  ....
    case BGPEventConnRetryTimerExp:
      st.fsm.StopConnToPeer()
      st.fsm.StartConnectRetryTimer()
      st.fsm.InitiateConnToPeer()
....

What we want to do this week is pick up our BGP peering process, and figure out what the code does next. In this particular case, the next step in the process is fairly simple to find, because it’s just another case in the switch statement in (st *ConnectState) processEvent

case BGPEventTcpCrAcked, BGPEventTcpConnConfirmed:
  st.fsm.StopConnectRetryTimer()
  st.fsm.SetPeerConn(data)
  st.fsm.sendOpenMessage()
  st.fsm.SetHoldTime(st.fsm.neighborConf.RunningConf.HoldTime,
    st.fsm.neighborConf.RunningConf.KeepaliveTime)
  st.fsm.StartHoldTimer()
  st.BaseState.fsm.ChangeState(NewOpenSentState(st.BaseState.fsm))
....

This looks like the right place—we’re looking at events that occur while in the connect state, and the result seems to be sending an open message. Before we move down this path, however, I’d like to be certain I’m chasing the right call chain, or logical thread. How can I do this? This code is called when (st *ConnectState) processEvent is called with an event Continue reading

Cisco uncovers security threat in industrial control system

Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC).The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.   Rockwell Automation Rockwell Automation’s MicroLogix systemTo read this article in full or to leave a comment, please click here

Cisco uncovers security threat in industrial control system

Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC).The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.   Rockwell Automation Rockwell Automation’s MicroLogix systemTo read this article in full or to leave a comment, please click here

Your next 10 security pain points

Going to security conferences always stimulates my imagination. It makes me think outside of the box and remove the cruff that develops when I sit inside my lab too long—staring at vCenter monitors, 10 open bash sessions, security consoles, and emails from colleagues swallowing Xanax.+ Also on Network World: Cyber attacks are on the rise +If advanced persistent threats (APTs), certificate authorities (CAs) with IQs of 77, vendor patches bordering on oxymoronic, and hyper-aggressive agile development weren’t enough, I’ll summarize what I believe are your next 10 security pain points.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Blockchain ripe for IoT security and monetization

Both the securing of the Internet of Things, as well as the monetizing of it, are roles for blockchain technology, experts say.In one developing case, the Isle of Man, a self-governing British dependency located just off the U.K. mainland, is testing the use of a blockchain prototype to try to preemptively see-off IoT hacking, according to Financial News, which wrote about the island’s efforts.The island is a financial center and is looking to expand its offerings through fintech. It’s already involved in digital currency.To read this article in full or to leave a comment, please click here

Pokemon GO ransomware creates Windows backdoor account, spreads to all other drives

If you build it and it’s popular, they will come; it being an app and they being cyber criminals. This time it’s Pokemon GO ransomware which goes the extra mile by adding a hidden backdoor Windows admin account, spreading to other drives and creating network shares.Michael Gillespie discovered Hidden Tear ransomware disguised as a Pokemon Go app on a Windows Phone. But it’s not the standard ransomware. Bleeping Computer explained, “This developer has put in extra time to include features that are not found in many, if any, other ransomware variants.”To read this article in full or to leave a comment, please click here

Pokémon Go ransomware creates Windows backdoor account, spreads to all other drives

If you build it and it’s popular, they will come; it being an app, and they being cyber criminals. This time it’s Pokémon Go ransomware, which goes the extra mile by adding a hidden backdoor Windows admin account, spreading to other drives and creating network shares.Michael Gillespie discovered Hidden Tear ransomware disguised as a Pokémon Go app on a Windows Phone. But it’s not the standard ransomware. Bleeping Computer explained, “This developer has put in extra time to include features that are not found in many, if any, other ransomware variants.”To read this article in full or to leave a comment, please click here

Pokémon Go ransomware creates Windows backdoor account, spreads to all other drives

If you build it and it’s popular, they will come; it being an app, and they being cyber criminals. This time it’s Pokémon Go ransomware, which goes the extra mile by adding a hidden backdoor Windows admin account, spreading to other drives and creating network shares.Michael Gillespie discovered Hidden Tear ransomware disguised as a Pokémon Go app on a Windows Phone. But it’s not the standard ransomware. Bleeping Computer explained, “This developer has put in extra time to include features that are not found in many, if any, other ransomware variants.”To read this article in full or to leave a comment, please click here

Back to school stuff for the discerning techie (or techie-in-training)

Techify and Geekify those school supplies!It’s back-to-school time, and that means getting ready by stocking up on new clothes, school supplies (probably the only time you’ll be shopping for colored pencils and glue sticks) and finding the coolest backpack. But these days, it also means picking up new tech, as schooling relies on tech more than ever. To read this article in full or to leave a comment, please click here

South China Sea conflict could be IT’s Black Swan

The vast majority of the world’s electronics -- its servers, PCs, mobile phones -- are now manufactured in China. This means any inadvertent escalation over the on-going South China Sea territorial dispute could do more than raise geopolitical tensions.It could easily disrupt electronics manufacturing for the world.About 84% of the world’s electronics are made in Asia, and about 85% of those goods are made in China, said Michael Palma, an analyst at IDC. “All that product flows through the South China Sea,” said Palma.China is claiming much of the South China Sea as its own territory after building artificial islands in the Spratly archipelago -- and it's ignoring a recent international tribunal ruling against its territorial claims, further stirring regional tensions.To read this article in full or to leave a comment, please click here