What’s the one thing Amazon will not manufacture? Guns

Amazon Web Services CEO Andy Jassy made some bold claims about the cloud computing market during a Q&A with the Wall Street Journal this week and left open the possibility for Amazon to enter almost any new market, except for one.In response to a question about if there’s anything Amazon would not make, Jassy reportedly responded: “Manufacturing guns.”+MORE AT NETWORK WORLD: What's behind Amazon, Microsoft and Google's aggressive cloud expansions? Check out our interactive map to find out +To read this article in full or to leave a comment, please click here

FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhones

The FBI today said it had arrested a group of men in connection with the theft of 23,000 Apple iPhones from a cargo area at the Miami International Airport in April.The stolen iPhones were worth approximately $6.7 million and the arrests of Yoan Perez, 33; Rodolfo Urra, 36; Misael Cabrera, 37; Rasiel Perez, 45; and Eloy Garcia, 42 were all made at the suspect’s residences throughout Miami Dade County, the FBI said. These subjects are in federal custody and are facing federal charges. Their initial appearances are expected to be in federal court in Miami.+More on Network World: US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here

FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhones

The FBI today said it had arrested a group of men in connection with the theft of 23,000 Apple iPhones from a cargo area at the Miami International Airport in April.The stolen iPhones were worth approximately $6.7 million and the arrests of Yoan Perez, 33; Rodolfo Urra, 36; Misael Cabrera, 37; Rasiel Perez, 45; and Eloy Garcia, 42 were all made at the suspect’s residences throughout Miami Dade County, the FBI said. These subjects are in federal custody and are facing federal charges. Their initial appearances are expected to be in federal court in Miami.+More on Network World: US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here

The PDF format finally reaches 2.0 release

Twenty-three years after Adobe Systems introduced the Portable Document Format (PDF), the format is finally getting a significant makeover. The new release will be available some time next year. So, what can expect after all this time? PDF was designed as a way to make formatted documents, such as contracts, available as electronic images without requiring them to be printed. What started as merely a static image when introduced in 1993 has grown into an industry standard that is modifyable, so people can PDF-fill forms on their computers, and capable of being generated by a wide variety of applications.A BPI Network report called "Dealing With Document Deluge and Danger" (available as a PDF, of course) states some 2.5 trillion PDFs are generated every year, and about 90 percent of survey respondents describe themselves and their co-workers as "PDF-dependent." So, PDF has become integral in the lives of many people and businesses. To read this article in full or to leave a comment, please click here

ARM Carves Path to IoT Driven Cloud Business

Chip design firm ARM is getting into the cloud business. The company whose designs power almost all of the world’s cell phones, has steadily pushed its designs into new ventures, including servers, as we have covered extensively. But on Tuesday it branched into something completely different.

It is selling cloud services to help a new breed of customers such as appliance makers connect devices to the internet of things in a secure fashion. The ARM mbed cloud is now available for customers that want to create a connected device that is easier to secure, track and get online.

The

ARM Carves Path to IoT Driven Cloud Business was written by Nicole Hemsoth at The Next Platform.

ARM Carves Path to IoT Driven Cloud Business

Chip design firm ARM is getting into the cloud business. The company whose designs power almost all of the world’s cell phones, has steadily pushed its designs into new ventures, including servers, as we have covered extensively. But on Tuesday it branched into something completely different.

It is selling cloud services to help a new breed of customers such as appliance makers connect devices to the internet of things in a secure fashion. The ARM mbed cloud is now available for customers that want to create a connected device that is easier to secure, track and get online.

The

ARM Carves Path to IoT Driven Cloud Business was written by Nicole Hemsoth at The Next Platform.

Samy Kamkar hacks IoT security camera to show exploitable dangers to enterprise

ForeScout Technologies released an “IoT Enterprise Risk Report” (pdf) which identified seven IoT devices that can be hacked in as little as three minutes: IP-connected security systems, smart HVACs and energy meters, VoIP phones, connected printers, video conferencing systems, smart light bulbs and smart refrigerators. Although the hack might only take a few minutes to pull off, it might take weeks to find and fix.Other “key findings” of the report include: Should any of these devices become infected, hackers can plant backdoors to create and launch an automated IoT botnet DDoS attack. Cybercriminals can leverage jamming or spoofing techniques to hack smart enterprise security systems, enabling them to control motion sensors, locks and surveillance equipment. With VoIP phones, exploiting configuration settings to evade authentication can open opportunities for snooping and recording of calls. Via connected HVAC systems and energy meters, hackers can force critical rooms (e.g. server rooms) to overheat critical infrastructure and ultimately cause physical damage. Potential scenarios for after an IoT device is hacked include using compromised smart video conferencing systems for spying via camera and microphone, disabling security cameras to allow physical break-ins, snooping on calls via VoIP phones and snagging private company Continue reading

Samy Kamkar hacks IoT security camera to show exploitable dangers to enterprise

ForeScout Technologies released an “IoT Enterprise Risk Report” (pdf) which identified seven IoT devices that can be hacked in as little as three minutes: IP-connected security systems, smart HVACs and energy meters, VoIP phones, connected printers, video conferencing systems, smart light bulbs and smart refrigerators. Although the hack might only take a few minutes to pull off, it might take weeks to find and fix.Other “key findings” of the report include: Should any of these devices become infected, hackers can plant backdoors to create and launch an automated IoT botnet DDoS attack. Cybercriminals can leverage jamming or spoofing techniques to hack smart enterprise security systems, enabling them to control motion sensors, locks and surveillance equipment. With VoIP phones, exploiting configuration settings to evade authentication can open opportunities for snooping and recording of calls. Via connected HVAC systems and energy meters, hackers can force critical rooms (e.g. server rooms) to overheat critical infrastructure and ultimately cause physical damage. Potential scenarios for after an IoT device is hacked include using compromised smart video conferencing systems for spying via camera and microphone, disabling security cameras to allow physical break-ins, snooping on calls via VoIP phones and snagging private company Continue reading

Cybersecurity Isn’t Always a “Boardroom Issue”

We’ve all heard or read the rhetoric that “cybersecurity has become a boardroom issue.”  I certainly agree that we are trending in this direction but is this true today or nothing more than marketing hype?ESG recently published a new research report in collaboration with the Information Systems Security Association (ISSA) titled, The State of Cyber Security Professional Careers, to ask a number of questions and truly capture the voice of cybersecurity professionals. As part of this project, cybersecurity professionals were asked if their CISO’s (or similar role) participation with executive management (i.e. CEO, board of directors, etc.) was at an adequate level.  Just over (56%) half answered “yes,” but 16% thought the level of CISO participation with executive management should increase somewhat while another 12% believe that the CISO’s level of participation with executive management should increase significantly.  The remaining 16% responded, “don’t know” (note: I am an ESG employee).   To read this article in full or to leave a comment, please click here

Cybersecurity Isn’t Always a “Boardroom Issue”

We’ve all heard or read the rhetoric that “cybersecurity has become a boardroom issue.”  I certainly agree that we are trending in this direction but is this true today or nothing more than marketing hype?ESG recently published a new research report in collaboration with the Information Systems Security Association (ISSA) titled, The State of Cyber Security Professional Careers, to ask a number of questions and truly capture the voice of cybersecurity professionals. As part of this project, cybersecurity professionals were asked if their CISO’s (or similar role) participation with executive management (i.e. CEO, board of directors, etc.) was at an adequate level.  Just over (56%) half answered “yes,” but 16% thought the level of CISO participation with executive management should increase somewhat while another 12% believe that the CISO’s level of participation with executive management should increase significantly.  The remaining 16% responded, “don’t know” (note: I am an ESG employee).   To read this article in full or to leave a comment, please click here

Issuing Junos Commands Using Ansible raw Module

If you want to issue something quick on a lot of devices, you don’t need to write a whole Ansible playbook to do that.  In fact you don’t really need the Junos module installed.

Ansible expects there to be Python on the managed device.  As you can read in this PacketPushers blog, it pushes the module out to the device and tries to execute it there.  Junos is going to get on-box Python at some point, but right now that’s roadmap (or SOPD if you must).

Suppose you want to find out what version of software you have on a your lab device, here’s a quick way to do that.

$ ansible 192.168.30.20 -m raw -a "show version" -u username -k
SSH password:
192.168.30.20 | SUCCESS | rc=0 >>
fpc0:
--------------------------------------------------------------------
Model: ex2200-24t-4g
JUNOS Base OS boot [12.3R12.4]
JUNOS Base OS Software Suite [12.3R12.4]
JUNOS Kernel Software Suite [12.3R12.4]
JUNOS Crypto Software Suite [12.3R12.4]
JUNOS Online Documentation [12.3R12.4]
JUNOS Enterprise Software Suite [12.3R12.4]
JUNOS Packet Forwarding Engine Enterprise Software Suite [12.3R12.4]
JUNOS Routing Software Suite [12.3R12.4]
JUNOS Web Management  Continue reading

39% off Behringer Xenyx 802 Premium 8-Input 2-Bus Mixer, for Podcasting or Musicians – Deal Alert

This premium 8 input 2 bus mixer lets you mix multiple audio sources in real time, and output them to you computer, making it ideal for podcasting, live music, and more. Take your podcast to the next level by taking calls over Skype. Studio grade compressors let you mix vocals and instrumentals with professional grade sound. Good for a live show at a coffee shop, a kareoke party, even a simple public announcement and everything in between. The combinations are endless and the built-in studio-grade, phantom-powered XENYX Mic Preamps and ultra-musical “British” channel EQ will make even the simplest setup sound great. Comes with free audio recording, editing and podcasting software plus 150 instrument/effect plug-ins downloadable. This #1 Amazon best seller averages 4.5 out of 5 stars from over 600 people (read reviews) and its list price of $97.99 is currently discounted 39% to just $59.81. To read this article in full or to leave a comment, please click here

How Cloudflare’s Architecture Allows Us to Scale to Stop the Largest Attacks

The last few weeks have seen several high-profile outages in legacy DNS and DDoS-mitigation services due to large scale attacks. Cloudflare's customers have, understandably, asked how we are positioned to handle similar attacks.

While there are limits to any service, including Cloudflare, we are well architected to withstand these recent attacks and continue to scale to stop the larger attacks that will inevitably come. We are, multiple times per day, mitigating the very botnets that have been in the news. Based on the attack data that has been released publicly, and what has been shared with us privately, we have been successfully mitigating attacks of a similar scale and type without customer outages.

I thought it was a good time to talk about how Cloudflare's architecture is different than most legacy DNS and DDoS-mitigation services and how that's helped us keep our customers online in the face of these extremely high volume attacks.

Analogy: How Databases Scaled

Before delving into our architecture, it's worth taking a second to think about another analogous technology problem that is better understood: scaling databases. From the mid-1980s, when relational databases started taking off, through the early 2000s the way companies thought of scaling Continue reading

Google Fiber puts expansion plans on hold to review strategy

Google Fiber has paused plans to roll out fiber optic cables across a number of U.S. cities, as the company reevaluates its strategy to presumably use mainly wireless to provide high-speed Internet service.Work on Google Fiber is to continue in in the cities where it has been launched or is under construction, wrote Craig Barratt, senior vice president at Alphabet and CEO of its Access unit, of which Google Fiber is a part. In the “potential Fiber cities” where  Google Fiber was still at the stage of exploratory discussions, the project will pause operations.To read this article in full or to leave a comment, please click here