Archive

Category Archives for "Networking"

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.The flaws were found by security company Zimperium, which also unearthed the original Stagefright flaws in April.In an advisory Monday, Google said it didn't appear that attackers have started exploiting the vulnerabilities yet.The latest flaws are only slightly less dangerous than their predecessors, which allowed a device to be compromised merely by sending a specially crafted multimedia message (MMS). An attacker needed only to know the victim's phone number.To read this article in full or to leave a comment, please click here

A Few Points About VMware EVO SDDC Networking

A Packet Pushers listener that heard us chatting about VMware's EVO SDDC solution raised a few concerns about the networking functionality in the current version of EVO SDDC. I was able to talk briefly with Krish Sivakumar, Director of Product Marketing, EVO SDDC & Ven Immani, Senior Technical Marketing Engineer, EVO SDDC at VMware to help clarify some of the issues.

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.+More on Network World: Gartner: Get onboard the algorithm train!+The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.To read this article in full or to leave a comment, please click here

1 More Reason To Be Wary of Sky High Drones (See Video)

Even wireless LANs located many stories from the ground in skyscraper offices might not be safe from hackers -- if the hackers are armed with drones. So say researchers in Singapore, a country where skyscrapers are plentiful.In this video, researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology And Design, show how attackers could infiltrate a wireless printer using a personal drone and an Android phone outfitted with a special app.MORE: New super-precise drones could win over wireless carriersTo read this article in full or to leave a comment, please click here

IDG Contributor Network: More data breaches caused by lost devices than malware or hacking, Trend Micro says

Prices are dropping for Personally Identifiable Information (PII) on the Dark Web. One likely reason is a surplus of the data; cybercriminals have been too successful gathering the stuff. Criminals can now purchase PII for $1 a line — that's down from $4 just a year ago, Trend Micro reported in its new research paper. Each line contains a name, a full address, a date of birth, a Social Security number, and other information. Criminals only need a few lines to clone an identity.Studying stolen data Trend Micro analyzed a decade's worth of data breach information in its new report, "Follow the Data, Dissecting Data Breaches and Debunking the Myths' (PDF).To read this article in full or to leave a comment, please click here

AT&T adds Juniper SDN controller

AT&T has added Juniper Networks’ controller to its SDN. Juniper’s Contrail controller will provide SDN control of AT&T’s Integrated Cloud infrastructure.AT&T will use Contrail to help automate and virtualize the network for deployment of new services. AT&T is also using Brocade’s Vyatta controller in its Network on Demand service.Juniper says Contrail is based on its Open Contrail open source software, and allows AT&T to incorporate new capabilities into its network while decreasing development time and cost.To read this article in full or to leave a comment, please click here

Gartner: Get onboard the algorithm train!

ORLANDO -- Algorithms are hot and will be a major driver in the future of IT and business. That was the driving thought from the opening keynote session at this week’s Gartner Symposium/IT Expo.In five years 1 million new devices will come online every hour and these devices will create billions of new relationships. These relationships are not driven solely by data but algorithms, said Peter Sondergaard senior vice president of research withGartner.+More on Network World: Gartner: Top 10 Technology Trends for 2015 IT can’t ignore+To read this article in full or to leave a comment, please click here

Network Design Best Practices – Simplicity

Network Design should be simple.Simplicity is the first of the network design best practices which I want you to remember. If you are in the field for enough time, you probably heard the KISS principle. If you are a good follower of my blog , you maybe heard SUCK principle as well. KISS stands for… Read More »

The post Network Design Best Practices – Simplicity appeared first on Network Design and Architecture.