Archive

Category Archives for "Networking"

Spearphishing attacks target boards

With great power comes great responsibility -- and also a great big target painted on your head. At least, that's the case lately with corporate boards of directors and cybercriminals launching spearphishing attacks."Since the beginning of the year we have serviced about 350 different clients that have had spearphishing attacks," said Michael Bruemmer, vice president for data breach resolution at Experian Information Solutions. "About a third were specifically targeted at board members."Board members get emails asking them for tax information or requesting bank transfers, which they typically forward to the company employee who is responsible and asking them to take care of it.To read this article in full or to leave a comment, please click here

Acer online store breached, 34,000 customer credit cards stolen over the last year

If you live in the U.S. or Canada and purchased an Acer device from the company within the last year from its online store, then your credit card information is likely in the hands of cyber thugs. According to a sample breach notification letter sent to the California Attorney General’s office, Acer said, “We recently identified a security issue involving the information of certain customers who used our ecommerce site between May 12, 2015 and April 28, 2016, which resulted in unauthorized access by a third party.” Acer Mark Groveunder, Acer’s vice president of customer service, warned affected customers that the data stolen included names, addresses, credit card numbers as well the associated expiration date and three-digit CVV security code.To read this article in full or to leave a comment, please click here

Acer online store breached, 34,000 customer credit cards stolen over the last year

If you live in the U.S. or Canada and purchased an Acer device from the company within the last year from its online store, then your credit card information is likely in the hands of cyber thugs. According to a sample breach notification letter sent to the California Attorney General’s office, Acer said, “We recently identified a security issue involving the information of certain customers who used our ecommerce site between May 12, 2015 and April 28, 2016, which resulted in unauthorized access by a third party.” Acer Mark Groveunder, Acer’s vice president of customer service, warned affected customers that the data stolen included names, addresses, credit card numbers as well the associated expiration date and three-digit CVV security code.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 8 tips to secure those IoT devices

As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush for convenience, our privacy and safety is often an afterthought. Leaving them unsecured is the digital equivalent of leaving the back door unlocked.INSIDER: 5 ways to prepare for Internet of Things security threats There are 5.5 million new things getting connected every day in 2016, as we head toward more than 20 billion by 2020, according to Gartner. That’s an awful lot of devices. They might bring all sorts of handy new features, but, whether it’s the latest cutting-edge baby monitor or a wireless doorbell camera that links to your phone, it’s also a network-connected computer and should be treated as such. Here are eight tips to help you secure those IoT devices.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Platform9 is the latest to ease the container deployment woes

The Docker initiative has been an amazing thing to watch.Over only a few short years, Docker has taken a pre-existing technology (the concept of Linux containers) and built a massive ecosystem around it. In the process, Docker (the company, as distinct from the open source project) has built itself an incredible valuation that it needs to try and live up to.+ Also on Network World: How Docker can transform your development teams +But that valuation, and attempt to justify it, are somewhat countered by the fact that Docker also relies on an ecosystem of vendors that all try to justify their existence. Thus the challenge remains: what should Docker (the company) do for itself, and what should it leave for third-party vendors to resolve?To read this article in full or to leave a comment, please click here

SDNSkills Plan Moving Forward

Hi to those of you subscribing and following. For those of you who have been watching of late, this is a brief note to let you know what’s going on, and what my plan is for ramping back up with writing posts here in this blogspace. Short version: I expect to be back to normal by August sometime, and I may post a few items here and there in the mean time.

Continue reading

Riding the new Wi-Fi wave (part 1)

Wireless mesh networking has been around for many years with business-level products and services, but it’s been pretty scarce in the home network space. The most famous user of a wireless mesh network (in which Wi-Fi clients talk to access nodes that can talk to other nodes, instead of a single router) is the wireless audio provider Sonos. But for the most part, improvements in Wi-Fi meant you still bought a singular router that you’d connect to a modem (or you have a combination modem/router given to you by your broadband provider). If you wanted to extend your network or improve coverage in parts of your house, you would need to buy a repeater/extender, which created an extra “hop” for network traffic (not optimal for services/apps that have a need for speed).To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fictiv aims to reinvent prototyping

I have a particular interest in the manufacturing of physical goods. For close to 25 years, I have been involved with a boutique, New Zealand-based manufacturer of backpacks and workwear. Cactus Equipment has been designing and making its own products for years.As opposed to the regular model of spec'ing a product from Far Eastern design and manufacturing houses, Cactus designs in house and then manufacturers in its own New Zealand factory, as well as a number of outsourced but still New Zealand-based facilities. So, the realities of trying to get a product designed and prototyped is something I'm well aware of. The design and sourcing combined with the difficulty in accessing resources makes product engineering a difficult task.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mobile broadband satellite breakthrough: Vehicles stay connected while on the move

Despite a slew of new broadband satellite projects up and running and in the pipeline, there’s a still a drawback to mobile satellite Internet compared to traditional wireless mobile networks. One big problem with satellite has always been that it’s hard to stay locked onto the transmission beam when you’re moving.Airlines get away with it for their cabins because the aircraft moves in a relatively stable manner, making it easier to point the antenna and grab the signal. But automobiles don’t move like that, explains the Fraunhofer Institute for Integrated Circuits in a press release.To read this article in full or to leave a comment, please click here

Where Is the Explosion of Overlay Virtual Networks

Three years ago I was speaking with one of the attendees of my overlay virtual networking workshop @ Interop Las Vegas and he asked me how soon I thought the overlay virtual networking technologies would be accepted in the enterprise networks.

My response: “you might be surprised at the speed of the uptake.” Turns out, I was wrong (again). Today I’m surprised at the lack of that speed.

Read more ...

Tech pros share advice for new computer science graduates

Computer science graduates are in demand. Last year, 76% of computer science graduates were working full time within six months of finishing school -- the highest full-time employment rate among new college graduates and well above the 58% average across all majors, according to a new report from the National Association of Colleges and Employers (NACE).But as veterans in the tech world know, earning a degree is just the beginning of a new professional’s education. To help this year’s newcomers navigate the transition from academic life to the professional world, we asked tech pros to share their best advice for computer science graduates entering the workforce. Here’s what they had to say.To read this article in full or to leave a comment, please click here

Tech pros share advice for new computer science graduates

Computer science graduates are in demand. Last year, 76% of computer science graduates were working full time within six months of finishing school -- the highest full-time employment rate among new college graduates and well above the 58% average across all majors, according to a new report from the National Association of Colleges and Employers (NACE).But as veterans in the tech world know, earning a degree is just the beginning of a new professional’s education. To help this year’s newcomers navigate the transition from academic life to the professional world, we asked tech pros to share their best advice for computer science graduates entering the workforce. Here’s what they had to say.To read this article in full or to leave a comment, please click here

New products of the week 6.20.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BetterCloud WorkflowsKey features: BetterCloud Workflows automate user provisioning, deprovisioning and access management within Google for Work applications, giving IT greater control over data, costs and time in the modern, cloud-first workplace. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.20.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BetterCloud WorkflowsKey features: BetterCloud Workflows automate user provisioning, deprovisioning and access management within Google for Work applications, giving IT greater control over data, costs and time in the modern, cloud-first workplace. More info.To read this article in full or to leave a comment, please click here