WikiLeaker Assange’s internet access cut by a ‘state actor’

A "state actor" has cut off internet access for Julian Assange, the founder of WikiLeaks, the transparency activist organization said Monday.Assange's internet link has been "intentionally severed by a state party," WikiLeaks said in a Monday morning tweet."We have activated the appropriate contingency plans," the organization added.In recent days, WikiLeaks has published thousands of leaked emails from the account of John Podesta, chairman of U.S. presidential candidate Hillary Clinton's campaign. Clinton's campaign, along with President Barack Obama's administration, have accused WikiLeaks of cooperating with Russian hackers in an effort to raise questions about the legitimacy of the upcoming U.S. presidential election.To read this article in full or to leave a comment, please click here

OpenG Rap: Unlicensed to Ill

Indoor cell signal feels so wack! Do not worry though, MC Ruckus and the Dawgs (aka Ruckus OpenG engineers) will set you straight with this funky gold-teeth-laden introduction to new technology. We got your back, yo! #OpenG #WhatDidIJustWatch Read more...

IDG Contributor Network: Parking available! CloudParc uses IoT, machine vision to improve city parking

Finding a parking space is like a treasure hunt. Lots of aggravation for a few moments of joy.Parking is a challenge for city officials, too. How do you maximize both parking revenues and driver convenience?+ Also on Network World: Smart City Challenge: 7 proposals for the future of transportation +Is there a better way to mark parking spots without installing meters? How can drivers be charged automatically for parking? How can cities struggling with tight budgets afford such new services?To read this article in full or to leave a comment, please click here

Catch OpenG in the Wild

In partnership with Dell/EMC, Ruckus, now a Brocade company, will be showing its first live demo of OpenGTM at Dell EMC World this week. OpenG is a solution that greatly improves in-building cellular coverage and capacity at a much lower cost than DAS or traditional small cells. Because OpenG uses the newly-released US 3.5GHz CBRS coordinated shared radio spectrum, enterprises and venues can finally deploy a single in-building cellular solution to serve subscribers of all mobile operators.

Lawmakers question DOJ’s appeal of Microsoft Irish data case

Four U.S. lawmakers are questioning a Department of Justice decision to appeal a July court decision quashing a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland.Last Thursday, Preet Bharara, U.S. Attorney for the Southern District of New York, filed an appeal of the ruling by a three-judge panel of the U.S. Court of Appeals for the Second Circuit.To read this article in full or to leave a comment, please click here

Lawmakers question DOJ’s appeal of Microsoft Irish data case

Four U.S. lawmakers are questioning a Department of Justice decision to appeal a July court decision quashing a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland.Last Thursday, Preet Bharara, U.S. Attorney for the Southern District of New York, filed an appeal of the ruling by a three-judge panel of the U.S. Court of Appeals for the Second Circuit.To read this article in full or to leave a comment, please click here

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan program on the internet and it bears striking similarities to Dyre, a malware threat believed to have been dead for almost a year.The new Trojan is called TrickBot and first appeared in September, targeting users of banks in Australia. After a closer analysis, researchers from Fidelis Cybersecurity believe that it is a rewrite of the Dyre Trojan that plagued online banking users for over a year until the gang behind it was dismantled by Russian authorities.While TrickBot is still a work in progress and doesn't have all of Dyre's features, there are enough similarities in their components to suggest that at the very least one served as inspiration for the other. At the same time, there are also significant differences in how some functions have been implemented in the new Trojan, which also has more C++ code than its predecessor.To read this article in full or to leave a comment, please click here

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan program on the internet and it bears striking similarities to Dyre, a malware threat believed to have been dead for almost a year.The new Trojan is called TrickBot and first appeared in September, targeting users of banks in Australia. After a closer analysis, researchers from Fidelis Cybersecurity believe that it is a rewrite of the Dyre Trojan that plagued online banking users for over a year until the gang behind it was dismantled by Russian authorities.While TrickBot is still a work in progress and doesn't have all of Dyre's features, there are enough similarities in their components to suggest that at the very least one served as inspiration for the other. At the same time, there are also significant differences in how some functions have been implemented in the new Trojan, which also has more C++ code than its predecessor.To read this article in full or to leave a comment, please click here

Cisco bolsters Spark collaboration with Worklife acquisition

Cisco today said it bought Heroik Labs which does business as Worklife and sells collaborative software that helps companies more effectively run and manage online meetings.“With the Worklife team onboard, we see an opportunity to build on the virtual meeting experience that the Cisco Spark platform currently provides, and enhance meeting productivity across the board. For example, we can start offering additional tools, tightly integrated into Cisco Spark, to help users track calendars, create agenda templates, and collaborate on note-taking in real-time during a meeting,” wrote Rob Salvagno vice president of Cisco’s Corporate Business Development in a blog announcing the buy. “Worklife’s technology and talent builds on the success of Cisco’s previous collaboration software acquisitions such as Collaborate.com, Assemblage, Tropo, Acano and Synata.”To read this article in full or to leave a comment, please click here

Cisco bolsters Spark collaboration with Worklife acquisition

Cisco today said it bought Heroik Labs which does business as Worklife and sells collaborative software that helps companies more effectively run and manage online meetings.“With the Worklife team onboard, we see an opportunity to build on the virtual meeting experience that the Cisco Spark platform currently provides, and enhance meeting productivity across the board. For example, we can start offering additional tools, tightly integrated into Cisco Spark, to help users track calendars, create agenda templates, and collaborate on note-taking in real-time during a meeting,” wrote Rob Salvagno vice president of Cisco’s Corporate Business Development in a blog announcing the buy. “Worklife’s technology and talent builds on the success of Cisco’s previous collaboration software acquisitions such as Collaborate.com, Assemblage, Tropo, Acano and Synata.”To read this article in full or to leave a comment, please click here

Cybersecurity Canon book review: There Will Be Cyberwar

Given it’s national cybersecurity awareness month, I hope all cybersecurity professionals are familiar with the Cybersecurity Canon. For those who are not, the goal of the cybersecurity canon is as follows: To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.To read this article in full or to leave a comment, please click here

Cybersecurity Canon book review: There Will Be Cyberwar

Given it’s national cybersecurity awareness month, I hope all cybersecurity professionals are familiar with the Cybersecurity Canon. For those who are not, the goal of the cybersecurity canon is as follows: To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.To read this article in full or to leave a comment, please click here

Cybersecurity Canon Book Report: There Will Be Cyberwar

Given that it’s national cybersecurity awareness month, I hope that all cybersecurity professionals are familiar with the Cybersecurity Canon.  For those that are not, the goal of the cybersecurity canon is as follows:To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.                To read this article in full or to leave a comment, please click here

Consumer PCs: Ailing, but not dead yet

Personal computer shipments again contracted in the third quarter, research firms said this week, as consumers continued to refuse to buy replacements for their aged machines. IDC pegged the PC downturn at 4% for the quarter ending September 30, while rival Gartner said shipments shrank 6% from the same period the year before. Gartner blamed consumers for the two-year slump, the longest decline in the industry's history. "According to our 2016 personal technology survey, the majority of consumers own, and use, at least three different types of devices in mature markets," said Gartner analyst Mikako Kitagawa in a statement. "Among these devices, the PC is not a high priority device for the majority of consumers, so they do not feel the need to upgrade their PCs as often as they used to."To read this article in full or to leave a comment, please click here

US bans Samsung Galaxy Note7 from all flights

The U.S. government has issued an emergency ban of Samsung's exploding Galaxy Note7 devices from all airline flights, urging users to take advantage of the company's exchange and refund offers.Owners of Galaxy Note7s may not transport the devices on their person, in carry-on baggage, or in checked luggage, Department of Transportation and the Federal Aviation Administration said. The smartphones also cannot be shipped as air cargo under the ban, which goes into effect Saturday at noon Eastern Time.Passengers who attempt to evade the ban by packing their phone in checked luggage are "increasing the risk of a catastrophic incident," the agencies said in a press release. Anyone violating the ban could face criminal prosecution and fines.To read this article in full or to leave a comment, please click here

7 chronic browser bugs plaguing the web

Web browsers are amazing. If it weren’t for browsers, we wouldn’t be able to connect nearly as well with users and customers by pouring our data and documents into their desktops, tablets, and phones. Alas, all of the wonderful content delivered by the web browser makes us that much more frustrated when the rendering isn’t as elegant or bug-free as we would like.When it comes to developing websites, we’re as much at the mercy of browsers as we are in debt to them. Any glitch on any platform jumps out, especially when it crashes our users’ machines. And with design as such a premium for standing out or fitting in, any fat line or misapplied touch of color destroys the aesthetic experience we’ve labored to create. Even the tiniest mistake, like adding an extra pixel to the width of a line or misaligning a table by a bit, can result in a frustrating user experience, not to mention the cost of discovering, vetting, and working around it.To read this article in full or to leave a comment, please click here

5 tools for making sense of system logs

Log management software helps IT managers understand and act on the flood of log data spewing from IT systems — to investigate security problems, prevent outages and improve the online customer experience. In essence, logs are a specialized source of business intelligence, while also providing an audit trail for regulatory compliance.Five of the top log management software products are Splunk, LogRhythm, AlienVault, HPE ArcSight Logger and SevOne, according to online reviews by enterprise users in the IT Central Station community. Those users say that the most important criteria to consider when choosing log management software are speed, stability, ease of use, and robust search capabilities.To read this article in full or to leave a comment, please click here(Insider Story)

5 tools for making sense of system logs

Log management software helps IT managers understand and act on the flood of log data spewing from IT systems — to investigate security problems, prevent outages and improve the online customer experience. In essence, logs are a specialized source of business intelligence, while also providing an audit trail for regulatory compliance.To read this article in full or to leave a comment, please click here(Insider Story)

Get ready for the bot revolution

For today's overworked, time-strapped IT employees, bots are more than simply apps that perform automated tasks, like delivering weather reports or taking pizza orders. Rather, they're a respite from endless help-desk calls, constant software updates and tedious server maintenance jobs.To read this article in full or to leave a comment, please click here(Insider Story)