Archive

Category Archives for "Networking"

IDG Contributor Network: Paper to be an IoT-connected device

Regular paper, of the kind one writes and prints on, can be embedded with radio frequency tags, researchers say. That could ultimately allow internet connectivity.Not only could the internet paper be manufactured with tags added at the mill, but an end user could actually draw the tagged antennas on by hand using conductive ink in a school or the workplace.By responding to commands via gestures, the paper can be made to “do anything from controlling music using a paper baton to live polling in a classroom,” the University of Washington says in a press release.To read this article in full or to leave a comment, please click here

Microsoft is joining the tech cry for Britain to stay in the EU

Microsoft has come out against a proposal for the U.K. to leave the European Union, joining other tech giants that oppose the controversial measure.The so-called Brexit (Britain exit) referendum will ask U.K. voters on June 23 whether the country should leave the 28-state EU. Proponents say membership in the union has hurt Britain’s economy and opens the country up to too much immigration.Boris Johnson, London’s colorful former mayor, has compared the EU to Hitler. Polls suggest the vote may be tight.IBM, Cisco Systems, and Hewlett Packard Enterprise also oppose Brexit. As multinational companies, they often rely on flows of capital and employees across borders.To read this article in full or to leave a comment, please click here

New F5 software addresses the needs of an increasingly digital world

Digital has become the way. Look through any business publication or trade magazine, and you’ll see a plethora of articles about digital transformation. A digital business is highly dependent on the underlying infrastructure to enable new services that can give it a competitive advantage. The underlying technology not only needs to seamlessly deliver the services, but also provide the highest levels of security, orchestration capabilities and many other requirements unique to this era of business. + Also on Network World: Why 2015 was the year of the cloud, and 2016 will be too +To read this article in full or to leave a comment, please click here

SAP seeks to simplify IT with a beefier new version of Hana

SAP has updated its flagship Hana in-memory computing platform with a raft of new features designed to make IT simpler while giving organizations a better handle on their data.The updates, announced Tuesday at the company's annual Sapphire Now conference in Florida, include a new hybrid data management service in the cloud and a new version of the company's Hana Edge edition for SMBs."We’ve taken an already rock solid platform and further hardened security, enhanced availability, unified the development and administration experience, and expanded advanced analytic capabilities," Michael Eacrett, vice president of product management for SAP, wrote in a blog post detailing the new release.To read this article in full or to leave a comment, please click here

Thinking about side channel attacks

When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?

Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.

security-netThe first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading

FCC’s ‘relentless regulatory assault’ threatens cable industry

BOSTON -- The head of the leading cable trade group feels like the federal government is trying to pick winners and losers.Michael Powell, president and CEO of NCTA, the organization representing firms like Comcast and Cox in Washington, argues that federal regulators have been pursuing policies that would create a two-tier regulatory regime that favors Internet firms over the telecom providers that deliver broadband and cable access services."What I believe is most troubling is an emerging government view that the communication market is bifurcated and should be regulated differently -- Internet companies are nurtured and allowed to run free, but network providers are disparagingly labeled 'gatekeepers' that should be shackled," Powell said in a keynote address at NCTA's annual Internet and TV conference. "The implications of this world view go far beyond how it affects one industry."To read this article in full or to leave a comment, please click here

FCC’s ‘relentless regulatory assault’ threatens cable industry

BOSTON -- The head of the leading cable trade group feels like the federal government is trying to pick winners and losers.Michael Powell, president and CEO of NCTA, the organization representing firms like Comcast and Cox in Washington, argues that federal regulators have been pursuing policies that would create a two-tier regulatory regime that favors Internet firms over the telecom providers that deliver broadband and cable access services."What I believe is most troubling is an emerging government view that the communication market is bifurcated and should be regulated differently -- Internet companies are nurtured and allowed to run free, but network providers are disparagingly labeled 'gatekeepers' that should be shackled," Powell said in a keynote address at NCTA's annual Internet and TV conference. "The implications of this world view go far beyond how it affects one industry."To read this article in full or to leave a comment, please click here

iPhone 7 said to be ‘more complex’ than previous models

In a general sense, it appears that Apple's effort to double down on product secrecy is paying off. The fact is, it's already mid-May, and we truthfully don't know all that much about the iPhone 7. Sure, we've seen a few reports pass through the rumor mill, but many of those reports seemingly contradict one another, a situation that inevitably brings us back to square one.While it's widely assumed that the iPhone 7 will sport the same form factor as the iPhone 6s and won't be a blockbuster device, a new report out of Taiwan via CNBC intimates that Apple's next-gen iPhone may be more interesting than most people anticipate.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How IoT with bio-mimicry reduces indoor air pollution

You may be better off not inhaling—especially when you consider all the airborne pollutants indoors.The EPA estimates that there are over 65,000 chemicals releasing pollutants into the air that are often too small for regular air filters to catch. Mold, flame retardants on carpets, and vapors from synthetic materials are just some of the sources of this type of pollution. For people with breathing difficulties, children, and the elderly, the impact is especially hazardous.Biome's solution is based on bio-mimicry: "innovation that seeks sustainable solutions to human challenges by emulating nature’s time-tested patterns and strategies.The goal is to create products, processes, and policies—new ways of living—that are well-adapted to life on earth over the long haul. The core idea is that nature has already solved many of the problems we are grappling with. Animals, plants, and microbes are the consummate engineers." To read this article in full or to leave a comment, please click here

Cybercriminals are increasingly embracing a sophisticated business-model approach

Cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and sell exploit kits and compromised data and others who serve as middlemen in anonymous transactions, says The Business of Hacking white paper from Hewlett Packard Enterprise.To read this article in full or to leave a comment, please click here

Cybercriminals are increasingly embracing a sophisticated business-model approach

Cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and sell exploit kits and compromised data and others who serve as middlemen in anonymous transactions, says The Business of Hacking white paper from Hewlett Packard Enterprise.To read this article in full or to leave a comment, please click here

Quaker Oats threatens to sue actual Quakers for trademark infringement

A gray hat replacing the Locky ransomware payload with a PSA, Windows 10 to double the number of ads after the Anniversary Update, and Quaker Oats threatening to sue actual Quakers for trademark infringement are some of the varied bits and bytes which caught my attention today.New Locky ransomware PSAThe command and control servers for Locky ransomware were previously hacked to show a “Stupid Locky” message instead of locking a victim’s machine, but F-Secure researcher Sean Sullivan discovered “a similar grey hat hack” that delivers a PSA to would-be Locky victims.To read this article in full or to leave a comment, please click here

Quaker Oats threatens to sue actual Quakers for trademark infringement

A gray hat replacing the Locky ransomware payload with a PSA, Windows 10 to double the number of ads after the Anniversary Update, and Quaker Oats threatening to sue actual Quakers for trademark infringement are some of the varied bits and bytes which caught my attention today.New Locky ransomware PSAThe command and control servers for Locky ransomware were previously hacked to show a “Stupid Locky” message instead of locking a victim’s machine, but F-Secure researcher Sean Sullivan discovered “a similar grey hat hack” that delivers a PSA to would-be Locky victims.To read this article in full or to leave a comment, please click here

Stealthy malware Skimer helps hackers easily steal cash from ATMs

Security researchers have found a new version of a malware program called Skimer that's designed to infect Windows-based ATMs and can be used to steal money and payment card details.Skimer was initially discovered seven years ago, but it is still actively used by cybercriminals and has evolved over time. The latest modification, found by researchers from Kaspersky Lab at the beginning of May, uses new techniques to evade detection.Upon installation, the malware checks if the file system is FAT32 or NTFS. If it's FAT32 it drops a malicious executable file in the C:WindowsSystem32 directory, but if it's NTFS, it will write the file in the NTFS data stream corresponding to Microsoft's Extension for Financial Services (XFS) service.To read this article in full or to leave a comment, please click here

Stealthy malware Skimer helps hackers easily steal cash from ATMs

Security researchers have found a new version of a malware program called Skimer that's designed to infect Windows-based ATMs and can be used to steal money and payment card details.Skimer was initially discovered seven years ago, but it is still actively used by cybercriminals and has evolved over time. The latest modification, found by researchers from Kaspersky Lab at the beginning of May, uses new techniques to evade detection.Upon installation, the malware checks if the file system is FAT32 or NTFS. If it's FAT32 it drops a malicious executable file in the C:WindowsSystem32 directory, but if it's NTFS, it will write the file in the NTFS data stream corresponding to Microsoft's Extension for Financial Services (XFS) service.To read this article in full or to leave a comment, please click here

911 emergency services ripped by HBO’s John Oliver

It’s definitely a service that’s taken for granted but HBO’s John Oliver this week pointed out that there’s a lot to be concerned about over the nation’s 911 emergency service.On Oliver’s Last Week Tonight HBO show, Oliver said 911 emergency call centers are antiquated, disjointed and in desperate need of funding and new technology. He said everyone should Google “understaffed 911 dispatch and [your town name]” to get an idea of problems near you and nationwide.Watch: The watchdogs at the Government Accountability Office in 2013 wrote about 911 technologies: “The continuing evolution of communications technologies and wireless phones has implications for 911 services. Since 911 call centers predominantly use older, analog-based infrastructure and equipment, the current E911 system is not designed to accommodate emergency communications from the range of new technologies in common use today, including text and picture messaging and Voice-over-Internet Protocol (VoIP) telephony (e.g., Skype). In response to changing technologies, the Department of Transportation (DOT) launched the Next Generation 911 (NG911) Initiative, which has focused on the research required to develop an NG911 system. With NG911 services, the public could reach 911 callTo read this article in full or to leave a comment, please click here