Archive

Category Archives for "Networking"

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

The Future of SharePoint is All About You

This morning (May 4, 2016), I had the pleasure of being in San Francisco for Microsoft’s “Future of SharePoint” event, which coincided with the general availability date for SharePoint 2016. This is the second time I’ve been in San Francisco for a major SharePoint event. The last time was in 2003, for the launch of SharePoint 2003. It’s amazing how far things have come in the past 13 years! The future of SharePoint is now – and the future is all about you and me – and making it easier to connect and collaborate and get work done in a way that brings the information we need to make key decisions to the places we need it, in the format we need it in, and on the device we are currently using. The future of SharePoint is all about people – and there should be no doubt that Microsoft is continuing to invest in providing great people experiences with SharePoint. While I am super focused on user experiences in SharePoint, and Microsoft has shown users a whole lotta love in the announcements today, developers are going to be pretty happy too – along with the folks focused on security and Continue reading

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

iPhone the most influential gadget of all time

When Steve Jobs first introduced the iPhone in 2007, he boldly exclaimed that it was a leapfrog product that was five years ahead of anything else on the market. And though Jobs was sometimes prone to hyperbole, his remarks about the iPhone were spot-on.Looking back, it's fair to say that Android didn't come close to reaching parity with the iPhone until about 2011 or 2012. Suffice it to say, the iPhone was a revolutionary device that completely changed the way the world interacts with technology.Not only did it quite literally put the internet in the pockets of millions of consumers, but it also ushered in the era of mobile apps—yet again changing the way consumers interact with technology. Today, I can use my iPhone to play games, listen to music, write reports, email with friends, pay for items at any number of stores, order food, track my exercise and much, much more. To read this article in full or to leave a comment, please click here

Star Wars Day special: “Jedi” jumps in job descriptions since Force Awakens released

The Star Wars Day (May the forth...) pitches this week have been mercifully few, but one that did catch my eye was job site Indeed's revelation that the word "Jedi" has increasingly been showing up in job descriptions since the movie Star Wars: The Force Awakens debuted in December.Indeed, which published a blog post today about the history of weird job titles/descriptions, claims to have seen a 328% growth in appearances of "Jedi" either in job titles or descriptions since the movie came out. Indeed MORE: Cool ways to celebrate Star Wars Day | 4 of the best and 4 of the worst Star Wars video gamesTo read this article in full or to leave a comment, please click here

Zombie servers will kill you

You thought it was buried. You forgot. Someone didn’t document it. A ping sweep didn’t find it. It lay there, dead. No one found it. But there was a pulse:It’s still running, and it’s alive. And it’s probably unpatched.Something probed it long ago. Found port 443 open. Jacked it like a Porsche 911 on on Sunset Boulevard on a rainy Saturday night. How did it get jacked? Let me count the ways.Now it’s a zombie living inside your asset realm.It doesn’t matter that it’s part of your power bill. It’s slowly eating your lunch.It doesn’t matter that you can’t find it because it’s finding you.It’s listening quietly to your traffic, looking for the easy, unencrypted stuff. It probably has a few decent passwords to your router core. That NAS share using MSChapV2? Yeah, that was easy to digest. Too bad the password is the same as the one for every NAS at every branch from the same vendor. Too bad the NAS devices don’t encrypt traffic.To read this article in full or to leave a comment, please click here

Zombie servers will kill you

You thought it was buried. You forgot. Someone didn’t document it. A ping sweep didn’t find it. It lay there, dead. No one found it. But there was a pulse:It’s still running, and it’s alive. And it’s probably unpatched.Something probed it long ago. Found port 443 open. Jacked it like a Porsche 911 on on Sunset Boulevard on a rainy Saturday night. How did it get jacked? Let me count the ways.Now it’s a zombie living inside your asset realm.It doesn’t matter that it’s part of your power bill. It’s slowly eating your lunch.It doesn’t matter that you can’t find it because it’s finding you.It’s listening quietly to your traffic, looking for the easy, unencrypted stuff. It probably has a few decent passwords to your router core. That NAS share using MSChapV2? Yeah, that was easy to digest. Too bad the password is the same as the one for every NAS at every branch from the same vendor. Too bad the NAS devices don’t encrypt traffic.To read this article in full or to leave a comment, please click here

Zombie servers will kill you

You thought it was buried. You forgot. Someone didn’t document it. A ping sweep didn’t find it. It lay there, dead. No one found it. But there was a pulse:It’s still running, and it’s alive. And it’s probably unpatched.Something probed it long ago. Found port 443 open. Jacked it like a Porsche 911 on on Sunset Boulevard on a rainy Saturday night. How did it get jacked? Let me count the ways.Now it’s a zombie living inside your asset realm.It doesn’t matter that it’s part of your power bill. It’s slowly eating your lunch.It doesn’t matter that you can’t find it because it’s finding you.It’s listening quietly to your traffic, looking for the easy, unencrypted stuff. It probably has a few decent passwords to your router core. That NAS share using MSChapV2? Yeah, that was easy to digest. Too bad the password is the same as the one for every NAS at every branch from the same vendor. Too bad the NAS devices don’t encrypt traffic.To read this article in full or to leave a comment, please click here

May the Fourth be with you: 4 of the best & 4 of the worst Star Wars video games

Star Wars video gamesStar Wars, as an enormous building block of nerd culture, and one that got popular right when home computing was really taking off, has an unsurprisingly huge number of video games set in its universe. Some of them are very good, and some are the opposite of very good. Here’s a look at four of the former, and four of the latter.RELATED: Cool ways to celebrate Star Wars DayTo read this article in full or to leave a comment, please click here

May the Fourth be with you: 4 of the best & 4 of the worst Star Wars video games

Star Wars video gamesStar Wars, as an enormous building block of nerd culture, and one that got popular right when home computing was really taking off, has an unsurprisingly huge number of video games set in its universe. Some of them are very good, and some are the opposite of very good. Here’s a look at four of the former, and four of the latter.RELATED: Cool ways to celebrate Star Wars DayTo read this article in full or to leave a comment, please click here