Russian hacker group used phony Google login page to hack Clinton campaign

A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works. The attack targeted 108 hillaryclinton.com email addresses, and was carried out by a Russian group called Threat Group-4127 (TG-4127), according to Secure Works’ Counter Threat Unit (CTU) blog. CTU can’t directly link the spearphishing operation against the Clinton campaign with the hack of Democratic National Committee emails revealed June 14, but “CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network. “To read this article in full or to leave a comment, please click here

Russian hacker group used phony Google login page to hack Clinton campaign

A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works. The attack targeted 108 hillaryclinton.com email addresses, and was carried out by a Russian group called Threat Group-4127 (TG-4127), according to Secure Works’ Counter Threat Unit (CTU) blog. CTU can’t directly link the spearphishing operation against the Clinton campaign with the hack of Democratic National Committee emails revealed June 14, but “CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network. “To read this article in full or to leave a comment, please click here

Your robot doctor overlords will see you now

Seems the days of the annual trip to your doctor’s office may be fading in favor of a virtual healthcare provider. At least if you follow the research presented by Gartner this week which predicted by 2025, 50% of the population will rely on what it called virtual personal health assistants (VPHAs) for primary care, finding them more responsive and accurate than their human counterparts. +More on Network World: Gartner Top 10 strategic technology trends you should know for 2017To read this article in full or to leave a comment, please click here

Your robot doctor overlords will see you now

Seems the days of the annual trip to your doctor’s office may be fading in favor of a virtual healthcare provider. At least if you follow the research presented by Gartner this week which predicted by 2025, 50% of the population will rely on what it called virtual personal health assistants (VPHAs) for primary care, finding them more responsive and accurate than their human counterparts. +More on Network World: Gartner Top 10 strategic technology trends you should know for 2017To read this article in full or to leave a comment, please click here

Webinar Recap: Docker for Windows Server 2016

Last week, we held our first webinar on “Docker for Windows Server 2016” to a record number of attendees, showcasing the most exciting new Windows Server 2016 feature – containers powered by Commercially Supported Docker Engine.

Docker CS Engine and containers are now available natively on Windows and supported by Microsoft with Docker’s Commercially Supported (CS) Engine included in Windows Server 2016.Now developers and IT pros can begin the same transformation for Windows-based apps and infrastructure to reap the benefits they’ve seen with Docker for Linux: enhanced security, agility, and improved portability and freedom to run applications on bare metal, virtual or cloud environments.

Watch the on-demand webinar to learn more about the technical innovations that went into making Docker containers run natively on Windows and how to get started.

Webinar: Docker for Windows Server 2016

Here are just a few of the most frequently asked questions from the session.  We’re still sorting through the rest and will post them in a follow up blog.

Q: How do I get started?

A: Docker and Microsoft have worked to make getting started simple, we have some great resources to get you started whether you’re a developer or an IT pro:

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.The technique, developed by three researchers from State University of New York at Binghamton and the University of California in Riverside, can be used to bypass address space layout randomization (ASLR) and was presented this week at the 49th annual IEEE/ACM International Symposium on Microarchitecture in Taipei.ASLR is a security mechanism used by operating systems to randomize the memory addresses used by key areas of processes, so that attackers don't know where to inject their exploit shellcode.To read this article in full or to leave a comment, please click here

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.The technique, developed by three researchers from State University of New York at Binghamton and the University of California in Riverside, can be used to bypass address space layout randomization (ASLR) and was presented this week at the 49th annual IEEE/ACM International Symposium on Microarchitecture in Taipei.ASLR is a security mechanism used by operating systems to randomize the memory addresses used by key areas of processes, so that attackers don't know where to inject their exploit shellcode.To read this article in full or to leave a comment, please click here

Verizon may back out of Yahoo deal due to email snooping

The deal for Verizon to purchase struggling Yahoo became endangered thanks to reports of Yahoo spying on user email for the U.S. government, not to mention the lost data on 500 million accounts and a decline in revenue.Earlier this month, Verizon publicly declared it was looking for a $1 billion discount on the original $4.8 billion it offered to purchase Yahoo. Verizon sought the discount because of Yahoo’s enormous data breach and because of reports that Yahoo was under a court order to scan emails for terrorist chatter, according to the New York Post. To read this article in full or to leave a comment, please click here

Gartner sees 2.9 percent growth in IT spending in 2017

Worldwide IT spending should rebound in 2017 with a 2.9 percent increase over 2016, after a slight decrease this year, according to Gartner projections.Spending on software and IT services should drive the 2017 growth in global IT spending to US$3.49 trillion, the market research group said Wednesday. Gartner projects IT spending will drop by 0.3 percent between 2015 and 2016, with the U.K.'s Brexit vote to leave the European Union swinging IT spending from a modest increase to negative numbers.Driving the spending growth in 2017 will be businesses' efforts to expand, John-David Lovelock, Garter's research vice president, said by email. To read this article in full or to leave a comment, please click here

Dell EMC aims for a converged, custom fit in an off-the-rack world

It may be a cloud world, but Dell EMC is still invested in on-premises systems, in particular converged systems. At VMworld 2016 in late August, the company took the wraps off a new product line called Validated System for Virtualization, which reflects a significant shift in the company’s converged systems portfolio.The new solution, according to Dell EMC, represents what it calls “service-defined infrastructure” by incorporating a wide range of form-factors, technology choices and deployment options, all designed to fit the needs of a customer ranging from midsized to the Fortune 10.Converged systems, a recent trend in hardware, combine compute, storage, networking and the software workload all into one fully integrated system rather than piecing it together. They are designed for easy installation and use by customers.To read this article in full or to leave a comment, please click here

What is it really like to work for Apple

What's it really like to work for Apple?The work culture at Cupertino isn't like that of other companies. Apple is famously secretive (more so, even, than most tech companies), and employees are expected to do the best work of their lives. Apple is very effective at keeping secrets, and that includes what it's like to work there.Even so, there are many sources of great information about what it's like to work for Apple. In this article we're going to look at what ex-employees, their friends and family, and people who've researched the company have to say about what it's like to be an Apple employee.Read next: How to work for Apple | How to get a job at AppleTo read this article in full or to leave a comment, please click here

Thoughts on the Tomahawk II

Broadcom released some information about the new Tomahawk II chip last week in a press release. For those who follow hardware, there are some interesting points worth considering here.

First, the chip supports 256x25g SERDES. Each pair of 25G SERDES can be combined into a single 50g port, allowing the switch to support 128 50g ports. Sets of four SERDES can be combined into a single 100g port, allowing the switch to support 64 100g ports.

Second, there is some question about the table sizes in this new chip. The press release notes the chip has “Increased On-Chip Forwarding Databases,” but doesn’t give any precise information. Information from vendors who wrap sheet metal around the chipset to build a complete box don’t seem to be too forthcoming in their information about this aspect of the new chip, either. The Tomahawk line has long had issues with its nominal 100,000 forwarding table entry limit, particularly in large scale data center fabrics and applications such as IX fabrics. We’ll simply have to wait to find out more about this aspect of the new chip, it seems.

Third, there is some question about the forwarding buffers available on the chip. Again, the Tomahawk Continue reading

T-Mobile to pay $48 million in settlement over throttling customers with heavy data usage

Call it the “Un-fine.” Perhaps that’s how T-Mobile, the self-described uncarrier, will spin Wednesday’s settlement with the FCC. The nation’s third-largest wireless network will pay $48 million total including customer benefits, education donations, and a fine as part of an agreement reached with the FCC. Good settlement with FCC today. @TMobile believes more info is best for customers. #themoreyouknow https://t.co/XFY6dHPfN6To read this article in full or to leave a comment, please click here

T-Mobile to pay $48 million in settlement over throttling customers with heavy data usage

Call it the “Un-fine.” Perhaps that’s how T-Mobile, the self-described uncarrier, will spin Wednesday’s settlement with the FCC. The nation’s third-largest wireless network will pay $48 million total including customer benefits, education donations, and a fine as part of an agreement reached with the FCC. Good settlement with FCC today. @TMobile believes more info is best for customers. #themoreyouknow https://t.co/XFY6dHPfN6To read this article in full or to leave a comment, please click here

Apple is fed up with counterfeit cables and chargers on Amazon

Amazon is full of knockoff products, but if you’re buying genuine Apple-branded cables and chargers sold directly by Amazon and not a third party, you should be OK, right? Well, maybe not.Patently Apple dug up a lawsuit filed by Apple against Mobile Star LLC, which Amazon identified as the manufacturer of counterfeit cables and power adapters that had been sold as being made by Apple. The complaint says that Apple had purchased the items from Amazon, and tested them interally to determine they were counterfeit. The complaint also cites an Amazon.com customer review claiming one of the adapters caught fire.To read this article in full or to leave a comment, please click here

Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates

ORLANDO, Fla. -- A person who had access to the nation's deepest secrets, Robert Gates, the former CIA chief and U.S. Secretary of Defense from 2006 to 2011, is lot more open in retirement.Gates had the crowd at the Gartner Symposium/ITxpo laughing over his observations about IT and applauding at some of the things he believes in.On stage here, for instance, Gartner analyst Richard Hunter fired off questions, asking at one point whether Edward Snowden, the former security contract employee who in 2010 took thousands of classified documents, was a "traitor or hero?"To read this article in full or to leave a comment, please click here

Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates

ORLANDO, Fla. -- A person who had access to the nation's deepest secrets, Robert Gates, the former CIA chief and U.S. Secretary of Defense from 2006 to 2011, is lot more open in retirement.Gates had the crowd at the Gartner Symposium/ITxpo laughing over his observations about IT and applauding at some of the things he believes in.On stage here, for instance, Gartner analyst Richard Hunter fired off questions, asking at one point whether Edward Snowden, the former security contract employee who in 2010 took thousands of classified documents, was a "traitor or hero?"To read this article in full or to leave a comment, please click here

Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates

ORLANDO, Fla. -- A person who had access to the nation's deepest secrets, Robert Gates, the former CIA chief and U.S. Secretary of Defense from 2006 to 2011, is lot more open in retirement.Gates had the crowd at the Gartner Symposium/ITxpo laughing over his observations about IT and applauding at some of the things he believes in.On stage here, for instance, Gartner analyst Richard Hunter fired off questions, asking at one point whether Edward Snowden, the former security contract employee who in 2010 took thousands of classified documents, was a "traitor or hero?"To read this article in full or to leave a comment, please click here

44% off First Alert Dual Photoelectric and Ionization Sensor Smoke Alarm – Deal Alert

The BRK 3120B smoke detector from First Alert contains technology that many experts are now recommending -- dual sensors. A photoelectric sensor detects slow and smoldering fires, while an ionization sensor can detect often fast moving open flames. Your current detectors may have only one or the other, so if you're due (or overdue) for new ones, it might be something to consider. This model is hardwired with a battery backup (see below for non-hardwired model), so all units interconnect. When an alarm is triggered, indicator lights let you know which detector was the initiator, so there's no guessing. If being used in a public area, the BRK 3120B also has locking features that prevent theft of the battery or the unit itself. It averages 4.5 out of 5 stars from over 230 people (read reviews) and you can buy it now on Amazon for $21.82.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wi-Fi, LTE ambient signals to replace, augment GPS

Future self-driving cars and up-and-coming commercial drone aviation are behind a mad scramble to find a better solution for location services than the satellite Global Positioning System (GPS).Advances in Signals of Opportunity (SOP), along with software-defined radios, could be the solution.GPS isn’t ideal. Firstly, it’s a free service made available by the U.S. government out of the kindness of its heart, and the civilian element could conceivably be switched off in times of national crisis—there are no contracts with smartphone makers, for example.Secondly, GPS wasn’t really designed for non-military applications such as civilian automobile navigation—it’s a weak signal and prone to interference, including that from space weather. It’s also not secure at the civilian level. It’s completely unencrypted and open to spoofing, in fact. Further, GPS jamming could bring existing satellite-based systems to a standstill.To read this article in full or to leave a comment, please click here