The year ransomware became one of the top threats to enterprises

On Feb. 5, employees at Hollywood Presbyterian Medical Center in Los Angeles, California, started having network access problems that prevented electronic communications. Over the next few days, they learned that the hospital was the victim of a ransomware attack that encrypted files on multiple computers.After several days during which staff had to resort to pen and paper for some record keeping, the hospital decided to pay the $17,000 ransom -- the equivalent of 40 bitcoins that the attackers had requested. It was deemed to be the fastest way to restore the affected files and systems.This was to be the first in a string of ransomware attacks that affected multiple healthcare organizations in the U.S. over the following months, including the Chino Valley Medical Center, the Desert Valley Hospital and Methodist Hospital in Henderson, Kentucky.To read this article in full or to leave a comment, please click here

The year ransomware became one of the top threats to enterprises

On Feb. 5, employees at Hollywood Presbyterian Medical Center in Los Angeles, California, started having network access problems that prevented electronic communications. Over the next few days, they learned that the hospital was the victim of a ransomware attack that encrypted files on multiple computers.After several days during which staff had to resort to pen and paper for some record keeping, the hospital decided to pay the $17,000 ransom -- the equivalent of 40 bitcoins that the attackers had requested. It was deemed to be the fastest way to restore the affected files and systems.This was to be the first in a string of ransomware attacks that affected multiple healthcare organizations in the U.S. over the following months, including the Chino Valley Medical Center, the Desert Valley Hospital and Methodist Hospital in Henderson, Kentucky.To read this article in full or to leave a comment, please click here

Web-scale networking with Cumulus Linux — announcing 3.2

We are pleased to announce that Cumulus Linux 3.2 is now available for installation. The priority of this release was our operators: how can we make web-scale networking with Cumulus Linux easier, faster and more efficient for operators coming from all types of engineering backgrounds.

As more and more organizations are adopting a cloud environment for various uses, web-scale IT principles become an increasingly relevant tool for building efficient, automatable and scalable data centers. This release offers our customers a path to web-scale networking that is simple and user friendly.

Over the next several days, we’ll be posting several blog posts that go into detail about some of our 3.2 features. In the meantime, here is the overview.

Cumulus Linux 3.2 includes:

  • NCLU: Network Command Line Utility (NCLU) provides users one central point where they can manually drive the system. This new feature both enables network engineers from all backgrounds and retains all the benefits of standardizing on Linux to achieve significant operational efficiency. Learn more about NCLU.
  • PIM: Protocol-Independent Multicast enables efficient data distribution over Internet Protocol (IP). With the availability of PIM, you can now build networks utilizing web-scale networking ethos.
  • System Snapshots Continue reading

Fraud detection firm outs $1b Russian ad-fraud gang and its robo-browsing Methbot

A $1 billion Russia-based criminal gang has been bilking online advertisers by impersonating high-profile Web sites like ESPN, Vogue, CBS Sports, Fox News and the Huffington Post and selling phony ad slots, but that’s about to end.Online fraud-prevention firm White Ops is releasing data today that will enable online advertisers and ad marketplaces to block the efforts of the group, which is cashing in on its intimate knowledge of the automated infrastructure that controls the buying and selling of video ads.The group has been ramping up its activities since October so that it now reaps roughly $3 million to $5 million per day from unsuspecting advertisers and gives them nothing in return, says White Ops, which discovered the first hints of the scam in September.To read this article in full or to leave a comment, please click here

Google’s biggest hits, misses, and WTF moments of 2016

Hardware and AI lead the wayImage by Martyn WilliamsWith last year’s corporate restructuring out of the way, 2016 was a year of rebuilding for Google and its parent company Alphabet.This year, Google got much more serious about hardware, while placing big bets on artificial intelligence as the heart of its software. Products that fit this mission got revamped, while those that didn’t got axed or ignored. Read on for a review of what went right and wrong at Google in 2016.To read this article in full or to leave a comment, please click here

Q&A: Hortonworks CTO unfolds the big data road map

Hortonworks has built its business on big data and Hadoop, but the Hortonworks Data Platform provides analytics and features support for a range of technologies beyond Hadoop, including MapReduce, Pig, Hive, and Spark. Hortonworks DataFlow, meanwhile, offers streaming analytics and uses technologies like Apache Nifi and Kafka.InfoWorld Executive Editor Doug Dineley and Editor at Large Paul Krill recently spoke with Hortonworks CTO Scott Gnau about how the company sees the data business shaking out, the Spark vs. Hadoop face-off, and Hortonworks' release strategy and efforts to build out the DataFlow platform for data in motion.To read this article in full or to leave a comment, please click here

Trump’s tariff threat may speed cloud adoption

President-elect Donald Trump’s threat to impose tariffs on goods manufactured in Mexico and offshore may accelerate the movement to cloud computing, analysts said.IT managers may seek to protect their companies from higher hardware or capital expenditure costs by shifting more of their IT spending to services. This shift is well underway, and the new administration may push it along, even before Trump takes office next month.At this point, industry analysts are uncertain as to what Trump has planned. His statements regarding tariffs are short, vague and sometimes delivered by tweets.To read this article in full or to leave a comment, please click here

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof."In cryptography, subtle mistakes can have catastrophic consequences, and mistakes in open source cryptographic software libraries repeat too often and remain undiscovered for too long," Google security engineers Daniel Bleichenbacher and Thai Duong, wrote in a post announcing the project on the Google Security blog.To read this article in full or to leave a comment, please click here

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof."In cryptography, subtle mistakes can have catastrophic consequences, and mistakes in open source cryptographic software libraries repeat too often and remain undiscovered for too long," Google security engineers Daniel Bleichenbacher and Thai Duong, wrote in a post announcing the project on the Google Security blog.To read this article in full or to leave a comment, please click here

Microsoft announces multiple location-based services deals

Microsoft announced a series of partnerships with location-based services in the hopes of creating what it calls a "world graph," covering all kinds of locations and objects and how they work together. The first was a multi-year deal to use HERE mapping data across a number of its own services, such as Cortana and Bing Maps. Audi, BMW and Daimler purchased HERE from Nokia last year for €2.8 billion and use it in their GPS systems. Microsoft also announced a partnership with a number of mapping technology leaders, including HERE, TomTom and EsriI, to create what it describes as a "world graph" that details "a new data index of physical places, objects and devices and their interconnectivity." To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT could be our downfall

The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones to see who’s at the front door, even when we're at the office. The potential applications are endless. There are already more than 6 billion connected "things," and that's set to rise to more than 20 billion by 2020, according to Gartner. But the enthusiasm for all things IoT has blinded us to the potential risks. Too many companies, keen to gain a foothold in the market, have rushed out products that lack basic security protocols. The risks here are enormous.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT could be our downfall

The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones to see who’s at the front door, even when we're at the office. The potential applications are endless. There are already more than 6 billion connected "things," and that's set to rise to more than 20 billion by 2020, according to Gartner. But the enthusiasm for all things IoT has blinded us to the potential risks. Too many companies, keen to gain a foothold in the market, have rushed out products that lack basic security protocols. The risks here are enormous.To read this article in full or to leave a comment, please click here

How to tell if the Trump administration is serious about tech innovation

Last week’s tech news cycle was dominated by coverage of the high-profile meeting between the incoming Trump administration and a star-studded roster of tech leaders. Apple’s Tim Cook, Facebook’s Sheryl Sandberg, Alphabet’s (Google)’s Larry Page, Tesla’s Elon Musk, Amazon’s Jeff Bezos, Microsoft’s Satya Nadella, Oracle’s Sasha Catz,, IBM’s Ginny Rommety and others were summoned to Trump Tower for a heavily hyped sitdown that provided some amazing optics. (Who can forget the meme of Bezos, Page, and Sandberg looking incredibly glum at the table?) To read this article in full or to leave a comment, please click here

How to get more from your security budget

Infosec budgets. They are small, they largely come from IT, and CISOs/CSOs often complain they are not nearly big enough.It’s a constant subject of debate and rightly so; a security budget will indirectly influence how well a CISO protects their business and its assets - and frankly, how well they do their job (which, in turn, will determine how long they stay in it).This isn’t meant to be all doom and gloom however; clever CISOs/CSOs and CIOs understand they have to resource more carefully in today’s economically challenging times. For CISOs, that involves using money effectively, and making do with solutions they already have, in order to protect the assets they truly care about. It can also involve upskilling staff, and rolling out cost effective security awareness campaigns.To read this article in full or to leave a comment, please click here(Insider Story)

CI Please Build—How to build your oVirt project on-demand

All projects in oVirt CI are built today post merge, using the 'build-artifacts' stage from oVirt's CI standards. This ensures that all oVirt projects are built and deployed to oVirt repositories and can be consumed by CI jobs, developers or oVirt users.

However, on some occasions a developer might need to build his project from an open patch. Developers need this capability in order to to examine the effects of their changes on a full oVirt installation before merging those changes. On some cases developers may even want to hand over packages based on un-merged patches to the QE team to verify that a given change will fix some complex issue or to preview a new feature on its early stages of development.

The Current Build Option

Until now, to build rpms from a patch, a developer needed to use a custom Jenkins job, which was only available to ovirt-engine and only for master branch. Another option was to try and build it locally using standard CI 'mock runner.sh' script which will use the same configuration as in CI. For full documentation on how to use 'mock-runner', checkout the Standard CI page.

The New Build Option

To ease Continue reading