Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.The vulnerabilities were discovered by senior security consultant Tao Sauvage from IOActive and independent security researcher Antide Petit while working together to analyze the Linksys EA3500 Smart Wi-Fi wireless router.The two researchers found a total of 10 vulnerabilities that affect not only the EA3500, but two dozen different router models from Linksys' Smart Wi-Fi, WRT and Wireless-AC series. Even though these devices are marketed as consumer products, it's not unusual to find them running in small business and home office environments.To read this article in full or to leave a comment, please click here

Facebook diversifies VR development with JavaScript framework React VR

If Rodney Dangerfield were an engineer, he would insult tool makers because inventors get respect, but tool makers none. Everyone remembers Thomas Edison for the invention of the light bulb and phonograph, but no one remembers Edison’s tool maker, Thomas Watson, except that Edison once recorded beckoning him on a phonograph cylinder.Like Watson, web development tool JavaScript gets no respect from some people who consider themselves serious developers. Nevertheless, JavaScript persists because it is the core to responsive web pages and because it is the most widely understood and used programming language in the world outside of the enterprise. It has also proved extensible, adapting to new uses faster than its critics can disparage it.To read this article in full or to leave a comment, please click here

Bose accused of spying on users, illegal wiretapping via Bose Connect app

Those high-dollar Bose headphones? A lawsuit filed in Chicago contends Bose has been spying on users via the Bose Connect app, which enables users to remotely control their Bose headphones, and violating their privacy rights by selling the information about what they listen to without permission. Furthermore, Kyle Zak accused Bose of illegal wiretapping.The lawsuit claims the app also has a data miner called Segment.io. Segment, the company behind the data miner, advertises, “Collect all of your customer data and send it anywhere.”To read this article in full or to leave a comment, please click here

Bose accused of spying on users, illegal wiretapping via Bose Connect app

Those high-dollar Bose headphones? A lawsuit filed in Chicago contends Bose has been spying on users via the Bose Connect app, which enables users to remotely control their Bose headphones, and violating their privacy rights by selling the information about what they listen to without permission. Furthermore, Kyle Zak accused Bose of illegal wiretapping.The lawsuit claims the app also has a data miner called Segment.io; Segment, the company behind the data miner, advertises, “Collect all of your customer data and send it anywhere.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

ARDA 1.0: A pulse meter for Africa’s peering and interconnection landscape

Do you want to understand more about how the Internet is connected in Africa?  Today we are pleased to announce the African Route-collectors Data Analyzer (ARDA) system. This new systems aims to present data collected at African IXPs in ways that can be easily extrapolated into practical business, policy, developmental, technical, or research opportunities for everyone involved in the peering and interconnection ecosystem.

Michuki Mwangi
Roderick Fanou

Administravia 20170420

A couple of minor items for this week. First, I’ve removed the series page, and started adding subcategories. I think the subcategories will be more helpful in finding the material you’re looking for among the 700’ish posts on this site. I need to work through the rest of the posts here to build more subcategoies, but what is there is a start. Second, I’ve changed the primary domain from rule11.us to rule11.tech, and started using the rule 11 reader name more than the ‘net Work name. rule11.us will still work to reach this site, eventually ntwrk.guru will time out and die. Finally, I’ve put it on my todo list to get a chronological post page up at some point.

Happy Reading!

The post Administravia 20170420 appeared first on rule 11 reader.

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)