Archive

Category Archives for "Networking"

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while globally, 40 percent of them have paid the ransom, 97 percent of U.S. companies did not.Specifically, 75 percent of enterprise victims paid up in Canada, 58 percent in the U.K., and 22 percent in Germany, according to an Osterman Research survey of hundreds of senior executives in the U.S., Canada, German and the U.K.ALSO ON CSO: How to respond to ransomware threats This is partly due to the fact that, in the United States, the attacks were much more likely to hit lower-level employees. In the U.S., enterprises reported that 71 percent of lower-level staff were affected, compared to 29 percent in the U.K., 23 percent in Canada, and 14 percent in Germany.To read this article in full or to leave a comment, please click here

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while globally, 40 percent of them have paid the ransom, 97 percent of U.S. companies did not.Specifically, 75 percent of enterprise victims paid up in Canada, 58 percent in the U.K., and 22 percent in Germany, according to an Osterman Research survey of hundreds of senior executives in the U.S., Canada, German and the U.K.ALSO ON CSO: How to respond to ransomware threats This is partly due to the fact that, in the United States, the attacks were much more likely to hit lower-level employees. In the U.S., enterprises reported that 71 percent of lower-level staff were affected, compared to 29 percent in the U.K., 23 percent in Canada, and 14 percent in Germany.To read this article in full or to leave a comment, please click here

How to protect yourself from common hotel security threats

Hotels are digitally dangerous places these days. And that's not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years.Most of the earliest reports pointed to surgical strikes on high-profile executives or representatives of government agencies, but they could prove to be precursors for more wide-ranging attacks on the general public. Modern business travelers, with their treasure troves of files and personal information, will be prime targets, and they're also more likely to let their guard down after an exhausting journey.To read this article in full or to leave a comment, please click here

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.Another 6 percent saw six or more attacks.The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations. The malware, which can infect a computer and take the data hostage, can be bad for business. 34 percent of the victim corporations in the countries surveyed reported losing revenue because the ransomware had prevented access to important files.To read this article in full or to leave a comment, please click here

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.Another 6 percent saw six or more attacks.The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations. The malware, which can infect a computer and take the data hostage, can be bad for business. 34 percent of the victim corporations in the countries surveyed reported losing revenue because the ransomware had prevented access to important files.To read this article in full or to leave a comment, please click here

Wi-Fi, LTE-U enter new phase of coexistence debate

The long-running contretemps between the supporters of LTE-U and regular Wi-Fi, over the idea of the two wireless standards co-existing on the same frequencies, has moved into a new phase, as test plan parameters are expected to be rolled out at Wednesday’s coexistence workshop in San Jose.The workshop is a meeting of interested stakeholders from both parties. The LTE-U camp, primarily made up of Qualcomm, Ericsson and the major U.S. wireless telecoms, has long insisted that LTE-U technology will not interfere with existing Wi-Fi networks, despite using the same frequencies. Skeptics, which include the cable industry and many of the country’s biggest tech companies, including Google and Microsoft, are worried that the rosy coexistence picture presented by LTE-U’s backers is unrealistic.To read this article in full or to leave a comment, please click here

CloudFlare’s JSON-powered Documentation Generator

Everything that it's possible to do in the CloudFlare Dashboard is also possible through our RESTful API. We use the same API to power the dashboard itself.

In order to keep track of all our endpoints, we use a rich notation called JSON Hyper-Schema. These schemas are used to generate the complete HTML documentation that you can see at https://api.cloudflare.com. Today, we want to share a set of tools that we use in this process.

CC BY 2.0 image by Richard Martin

JSON Schema

JSON Schema is a powerful way to describe your JSON data format. It provides complete structural validation and can be used for things like validation of incoming requests. JSON Hyper-Schema further extends this format with links and gives you a way describe your API.

JSON Schema Example

{
  "type": "object",
  "properties": {
    "name": { "type": "string" },
    "age": { "type": "number" },
    "address": {
      "type": "object",
      "properties": {
        "street_address": { "type": "string" },
        "city": { "type": "string" },
        "state": { "type": "string" },
        "country": { "type" : "string" }
      }
    }
  }
}

Matching JSON

{
  "name": "John Doe",
  "age": 45,
  "address": {
    "street_address": "12433 State St NW",
    "city": "Atlanta",
    "state": "Georgia",
    "country":  Continue reading

Slideshow: LibreOffice ups its enterprise game in this major new release

A business-ready Office alternativeImage by LibreOfficeLibreOffice is a free and open source alternative to Microsoft's Office productivity software that boasts some 120 million users around the globe. Version 5.2 made its debut on Wednesday, and it's packed with new business features. Here's a look at what you'll find.To read this article in full or to leave a comment, please click here

A different kind of technology recycling

You can find plenty of examples of sustainability on a quick spin around Wellesley College in suburban Boston, where solar panels shimmer above the athletic fields and Wells on Wheels supply water in an effort to dissuade disposable bottled water use. But when Wellesley College CIO Ravi Ravishanker blogged this past week about the "Creative (Re)Uses of Technologies," he focused less on environmental green and more on maximizing the green spent on various technologies.Ravishanker touted, for example, his team's resourcefulness in finding fresh uses for a drone acquired for teaching and learning -- and in fact, it was used by a college research team to film archeological sites in Greece. But since then, the drone has also been employed to map the school's Nehoiden golf course, and plans are to post the data online and maybe even work in some virtual reality technology to let people play a round remotely.To read this article in full or to leave a comment, please click here

Fun in the Lab: Setting up 3 Phones – Part 1 Prep Work

For those of you who know me I always kid that I’m afraid of UC.  But a few things conspired together to make me decide to attempt the plunge.

 

  • IWAN PreBuilt ReBuilt  ?  I completely tore down and destroyed the original IWAN PreBuilt Testbed so I could rebuild it.  Which meant I also lost my CallMgr and my voice/video phone setup I had inherited.
  • Voice/Video is typically in either 1st place or 2nd place as the most business critical application for the majority of customers i talk with.
  • NBAR2 interests me and I’d like to learn about and play some with QoS classification based on NBAR2 application recognition coming in.  Just finished reviewing a QoS chapter for the upcoming CiscoPress IWAN book and I just want to see, touch, and play.  ?
  • Documentation – I’m so incredibly tired of not knowing how to do this.  Voice/Video is such a perfect application and visual to help me knowledge share with co-workers and customer so very many concepts – QoS, AV, AVC, Application Recognition, business critical traffic, impairment avoidance… the list goes on and on.  I need to know how to build up a simple and Continue reading

Bitcoin exchange Bitfinex apparently loses $63 million to hackers

A digital currency exchange in Hong Kong has suspended trading after a security breach in which thieves made off with an apparent $63 million worth of bitcoin.The exchange, Bitfinex, reported the intrusion on Tuesday and said it was working with law enforcement.“We are investigating the breach to determine what happened, but we know that some of our users have had their bitcoins stolen,” the exchange said.Its statement doesn't say how many bitcoins are missing, but Zane Tackett, the site's director of community and product development, said on Reddit that the losses stand at 119,756 bitcoins. Bitfinex didn't immediately respond to a request to confirm that figure.To read this article in full or to leave a comment, please click here

Bitcoin exchange Bitfinex apparently loses $63 million to hackers

A digital currency exchange in Hong Kong has suspended trading after a security breach in which thieves made off with an apparent $63 million worth of bitcoin.The exchange, Bitfinex, reported the intrusion on Tuesday and said it was working with law enforcement.“We are investigating the breach to determine what happened, but we know that some of our users have had their bitcoins stolen,” the exchange said.Its statement doesn't say how many bitcoins are missing, but Zane Tackett, the site's director of community and product development, said on Reddit that the losses stand at 119,756 bitcoins. Bitfinex didn't immediately respond to a request to confirm that figure.To read this article in full or to leave a comment, please click here

85% off Business Intelligence & Data Science Online Course Bundle – Deal Alert

Become Your Office's Data Analytics Hero with These 4 Interactive Courses, discounted 85% for a limited time, from $276 down to just $39. Successful businesspeople make the most out of the numbers available to them. If you're to succeed in the business world, you're going to need how to crunch and effectively analyze data. This course bundle teaches you how to interpret critical data, walks you through exercises, shows you how to present complex data to business and customer stakeholders, gives you access to professional spreadsheet models, and much more. To read this article in full or to leave a comment, please click here

85% off Business Intelligence & Data Science Online Course Bundle

Become Your Office's Data Analytics Hero with These 4 Interactive Courses, discounted 85% for a limited time, from $276 down to just $39. Successful businesspeople make the most out of the numbers available to them. If you're to succeed in the business world, you're going to need how to crunch and effectively analyze data. This course bundle teaches you how to interpret critical data, walks you through exercises, shows you how to present complex data to business and customer stakeholders, gives you access to professional spreadsheet models, and much more. To read this article in full or to leave a comment, please click here

27% off TotalMount Apple TV Mount – Deal Alert

Apple TV is an amazing product, but it's hard to find the right place for it. Its cables are often not long enough, or look messy when exposed. And routing them through the wall isn't an easy task. This Apple TV mount from TotalMount is unique in that it mounts your Apple TV to the back of your TV, out of site. Once mounted, your Apple TV remote functions normally, simply bouncing its signal off your ceiling. It may sound too good to be true, but the mount averages 4.5 out of 5 stars on Amazon from over 550 customers (read reviews), who indicate that it's simple to install and works as promised. This mount is compatible with all versions of Apple TV except generation 4 (the newest model). Its typical list price of $19.95 has been reduced 27% to $14.50.To read this article in full or to leave a comment, please click here