Ashley Madison to pay $1.6M settlement related to data breach

The company behind Ashley Madison, the adultery enabling website, has agreed to pay a US$1.6 million settlement related to a major data breach last year that exposed account details of 36 million users.Ashley Madison's operator, Toronto-based Ruby, is making the settlement for failing to protect the account information and for creating fake user profiles to lure in prospective customers, the U.S. Federal Trade Commission said on Wednesday.In July 2015, a hacking group called Impact Team managed to steal the account details and then post them online a month later -- potentially damaging the reputation of the customers using the adultery website.To read this article in full or to leave a comment, please click here

NASA embraces IBM’s Watson for future space, aerospace technology development

IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system. The forthcoming movie Hidden Figures in fact shows some of the earliest IBM and NASA computing interactions. Hidden Figures follows a group of African-American female mathematicians who calculated flight trajectories on IBM computers for John Glenn's first orbital flight in 1962.To read this article in full or to leave a comment, please click here

NASA embraces IBM’s Watson for future space, aerospace technology development

IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system.+More on Network World: NASA: Top 10 space junk missions+Watson uses machine learning and natural language and image recognition to develop all manner of intelligent answers to tough challenges. The system has been successfully deployed in the healthcare industry where the system has become a trusted adviser to hospitals and research centers working for people fighting cancer. The CBS news program “60 Minutes” recently devoted a large segment on Watson and the success it has had in this battle (See more here).To read this article in full or to leave a comment, please click here

Ask High Scalability: How to build anonymous blockchain communication?

This question came in over the Internets. If you have any ideas please consider sharing them if you have the time...

I am building a 2 way subscription model I am working on a blockchain project where in I have to built a information/data portal where in I will have 2 types of users data providers and data recievers such that there should be anonimity between both of these.

Please guide me how can I leverage blockchain (I think Etherium would be useful in this context but not sure) so that data providers of my system can send messages to data receivers anonymously and vice versa data receivers can request for data through my system to data providers.

I believe, it work if we can create a system where in if a user has data, it will send description to the server, The system will host this description about data without giving the data provider details.

Simultaneously server will store info which user has the data. When data receiver user logs in to system and wants and sees the description of data and wants to analyze that data, it will send request to server for that data. This request is Continue reading

Analysis of CryptFile2 Ransomware Server

Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and Win32/Filecoder.HydraCrypt.C) ransomware, an ongoing threat since at least mid-March of 2016. This report reveals TTP’s (tactics, techniques, procedures) of […]

Analysis of CryptFile2 Ransomware Server

Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and Win32/Filecoder.HydraCrypt.C) ransomware, an ongoing threat since at least mid-March of 2016. This report reveals TTP’s (tactics, techniques, procedures) of threat actors, including insight derived from limited interactions via e-mail. […]

IDG Contributor Network: Stanford researchers attempt vodka-based Internet messaging

Sending Internet of Things, or IoT messages using liquids, such as vodka or glass cleaner, could replace light as the next go-to network carrier for the Internet.Pulses of liquid chemicals, replicating the ones-and-zeros of traditional electron-based data streams are better than copper wires, wireless or fiber because they’re cheaper, and aren’t susceptible to the same kind of interference, claim the inventors from Stanford University. Wireless signals, for example, can run into problems among large masses of metals.Vodka was the liquid of choice for the first of the pH-based messaging tests run by the school, but amusingly failed due to the receiving computer getting “too saturated with vodka to receive more messages,” according to fellow Nariman Farsad, who has been working on the concept.To read this article in full or to leave a comment, please click here

Is The Rise Of SD-WAN Thanks To Ethernet?

Ethernet

SD-WAN has exploded in the market. Everywhere I turn, I see companies touting their new strategy for reducing WAN complexity, encrypting data in flight, and even doing analytics on traffic to help build QoS policies and traffic shaping for critical links. The first demo I ever watched for SDN was a WAN routing demo that chose best paths based on cost and time-of-day. It was simple then, but that kind of thinking has exploded in the last 5 years. And it’s all thanks to our lovable old friend, Ethernet.

Those Old Serials

When I started in networking, my knowledge was pretty limited to switches and other layer 2 devices. I plugged in the cables, and the things all worked. As I expanded up the OSI model, I started understanding how routers worked. I knew about moving packets between different layer 3 areas and how they controlled broadcast storms. This was also around the time when layer 3 switching was becoming a big thing in the campus. How was I supposed to figure out the difference between when I should be using a big router with 2-3 interfaces versus a switch that had lots of interfaces and could route just as Continue reading

An Early Look at Ansible Container v0.3.0

ansible-container-blog-header.png

The Ansible Container project is targeting mid-January for its next release, and so we thought now would be a good time to check in and look at the features actively under development and anticipated to ship.

With only a glance at the roadmap page, the casual visitor may think it seems a bit smallish, having only three items. However, the items represent features that are important to the project, and require a level of effort that’s anything but small, as we’ll see.

Building container images

The first item up is an image build cache. Building container images is of course a core function of the tool, and having a caching mechanism can improve the speed at which images are built.

If you’re not familiar with container images and how they’re built, think of an image as a tall building with dozens of floors, where each floor is layered on top of the previous floor, starting with the building’s foundation, and adding one floor or layer at a time until you reach the top. In the same way, a container image is a file system built in layers.

The build process starts with a base image, say Fedora 25, Continue reading

Datanauts 64: Advancing Your IT Career

Todays Datanauts episode is about how to advance your IT career. We talk with trainer Neil Anderson about developing a plan & get insights from a survey of CTOs & HR leaders about what theyre looking for in IT employees The post Datanauts 64: Advancing Your IT Career appeared first on Packet Pushers.

Lessons learned from the 7 major cyber security incidents of 2016

Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet. These incidents reveal technical flaws that can be addressed and failure to employ best practices that might have prevented some of them from happening. +More on Network World: Gartner Top 10 technology trends you should know for 2017+To read this article in full or to leave a comment, please click here

Lessons learned from the 7 major cyber security incidents of 2016

Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet. These incidents reveal technical flaws that can be addressed and failure to employ best practices that might have prevented some of them from happening. +More on Network World: Gartner Top 10 technology trends you should know for 2017+To read this article in full or to leave a comment, please click here

Know your (cyber) enemy

Picture this: Your company's network is facing a DDoS attack, but you have no idea who is responsible or what their motivation might be. Without this knowledge, you can't tell if they want money in exchange for stopping the attack or if the attack is a diversion to occupy your security team while your network is being penetrated and commercial secrets are stolen.In the aftermath of a network breach it can also be incredibly useful to know some information about the likely attackers. That's because knowing who they were — or just where they were from — can help you carry out a more accurate damage assessment exercise.  This knowledge can guide you where to look for signs of data compromise, and what other specifics (such as exploit kits or Trojans that may have been left behind) to search for.To read this article in full or to leave a comment, please click here