Receive alerts when your data is leaked with this tool

If you’re worried that your data might end up in the hands of a hacker, one site is offering a free service that can give you a head’s up.Baltimore-based Terbium Labs has come up with a product called Matchlight, which crawls the dark recesses of the internet, looking for stolen data that’s circulating on the black market.On Tuesday, Terbium Labs opened the product to the public. That means any user can sign up to have five of their personal records monitored for free.To read this article in full or to leave a comment, please click here

There are just 28 internet domains on North Korea’s DNS

The internet in North Korea is an unsurprisingly small and circumscribed place – there are just 28 TLDs on the entirety of the country’s .kp domain, compared to almost 335 million globally.A misconfiguration early Tuesday morning allowed outsiders to get a rare look into the hermit kingdom’s vestigial online infrastructure, which is connected to the broader internet via China. It was detected by the TLDR Project, an automated, ongoing effort to track all global zone transfer requests among DNS providers, and log them to GitHub.+ALSO ON NETWORK WORLD: Why this hospital is moving to Amazon’s cloud + Be careful not to fall for these ransomware situationsTo read this article in full or to leave a comment, please click here

Black Friday 2016 tech ads will be leaking before you know it

Black Friday 2016 is still about 2 months away, but the first ad leaks touting bargains on everything from the latest iPhones to tablets, TVs and PCs could surface by the end of next month. Look for Amazon to once again push the definition of Black Friday, with sales starting at the beginning of November (hey, they've already had Prime Day).FROM THE ARCHIVES: 40+ jaw dropping Black Friday 2015 tech dealsTo read this article in full or to leave a comment, please click here

Apple delivers free macOS Sierra upgrade

Apple today released Sierra, 2016's edition of the Mac's operating system. Sierra is the first under the "macOS" label Apple introduced in June when it retired the older "OS X" and synchronized the Mac's moniker with other operating systems from the Cupertino, Calif. company, like the iPhone's iOS and the Apple TV's tvOS. Also known as macOS 10.12, Sierra's launch followed the first "golden master," or GM build, by two weeks. Sierra was available Tuesday for free download from the Mac App Store. Although the upgrade was not immediately visible on the front page of the e-mart, a search using sierra quickly located the 4.8GB installation file.To read this article in full or to leave a comment, please click here

Oracle’s infrastructure business focuses on bare metal to go after AWS

Larry Ellison made a splash this week when he said that Oracle would give Amazon a run for its money in the cloud. Then, the company outlined the pillar of the tech titan's infrastructure offering: beefy, bare-metal servers running in the cloud. That's right: Oracle is going after a market that's full of virtualized workloads with servers that clock in with a whopping 36 physical CPU cores, according to Vice President of Engineering Don Johnson. Rather than starting from the low end of the infrastructure market and working its way up, Oracle is starting at the top and working its way down. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Data breaches: This time it’s more personal

Summer 2016 was not a good time for data breaches.First, news broke that the Democratic National Committee was hacked, leading to the resignation of DNC Chair Debbie Wasserman Schultz and driving a wedge between Democratic Party members.Later, the World Anti-Doping Agency (WADA) announced that Russian hackers had illegally accessed its Anti-Doping Administration and Management System (ADAMS) database, leaking confidential medical information for U.S. athletes, including Simone Biles and Serena Williams.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Data breaches: This time it’s more personal

Summer 2016 was not a good time for data breaches.First, news broke that the Democratic National Committee was hacked, leading to the resignation of DNC Chair Debbie Wasserman Schultz and driving a wedge between Democratic Party members.Later, the World Anti-Doping Agency (WADA) announced that Russian hackers had illegally accessed its Anti-Doping Administration and Management System (ADAMS) database, leaking confidential medical information for U.S. athletes, including Simone Biles and Serena Williams.To read this article in full or to leave a comment, please click here

Can I2RS Keep Up? (I2RS Performance)

What about I2RS performance?

The first post in this series provides a basic overview of I2RS; there I used a simple diagram to illustrate how I2RS interacts with the RIB—

rib-fib-remote-proxy

One question that comes to mind when looking at a data flow like this (or rather should come to mind!) is what kind of performance this setup will provide. Before diving into the answer to this question, though, perhaps it’s important to ask a different question—what kind of performance do you really need? There are (at least) two distinct performance profiles in routing—the time it takes to initially start up a routing peer, and the time it takes to converge on a single topology and/or route change. In reality, this second profile can be further broken down into multiple profiles (with or without an equal cost path, with or without a loop free alternate, etc.), but for our purposes I’ll just deal with the two broad categories here.

If your first instinct is to say that initial convergence time doesn’t matter, go back and review the recent Delta Airlines outage carefully. If you are still not convinced initial convergence time matters, go back and reread what you can Continue reading

TLS 1.3 gets early adoption boost through CloudFlare

Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers.The TLS (Transport Layer Security) 1.3 specification is yet to be finalized by the Internet Engineering Task Force (IETF), the body that develops internet standards. However, the protocol is already supported in beta versions of Google Chrome and Mozilla Firefox, and it's being hailed as an important step forward in securing internet communications.TLS 1.3 removes some cryptographic algorithms present in TLS 1.2 that are known to be vulnerable. This makes it easier for server administrators to deploy secure-by-default HTTPS configurations. HTTPS (HTTP Secure) is a mix between HTTP and TLS.To read this article in full or to leave a comment, please click here

TLS 1.3 gets early adoption boost through CloudFlare

Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers.The TLS (Transport Layer Security) 1.3 specification is yet to be finalized by the Internet Engineering Task Force (IETF), the body that develops internet standards. However, the protocol is already supported in beta versions of Google Chrome and Mozilla Firefox, and it's being hailed as an important step forward in securing internet communications.TLS 1.3 removes some cryptographic algorithms present in TLS 1.2 that are known to be vulnerable. This makes it easier for server administrators to deploy secure-by-default HTTPS configurations. HTTPS (HTTP Secure) is a mix between HTTP and TLS.To read this article in full or to leave a comment, please click here

Stanford researchers invent tech workaround to net neutrality fights

Engineers at Stanford University have invented a new technology that would give broadband customers more control over their pipes and, they say, possibly put an end to a stale net neutrality debate in the U.S.The new technology, called Network Cookies, would allow broadband customers to decide which parts of their network traffic get priority delivery and which parts are less time sensitive. A broadband customer could then decide video from Netflix should get preferential treatment over email messages, for example.The technology could put an end to the current net neutrality debate focused on whether broadband providers are allowed to prioritize some network traffic and block or degrade other traffic, said the researchers, Professors Nick McKeown and Sachin Katti and electrical engineering grad student Yiannis Yiakoumis.To read this article in full or to leave a comment, please click here

Stanford researchers invent tech workaround to net neutrality fights

Engineers at Stanford University have invented a new technology that would give broadband customers more control over their pipes and, they say, possibly put an end to a stale net neutrality debate in the U.S.The new technology, called Network Cookies, would allow broadband customers to decide which parts of their network traffic get priority delivery and which parts are less time sensitive. A broadband customer could then decide video from Netflix should get preferential treatment over email messages, for example.The technology could put an end to the current net neutrality debate focused on whether broadband providers are allowed to prioritize some network traffic and block or degrade other traffic, said the researchers, Professors Nick McKeown and Sachin Katti and electrical engineering grad student Yiannis Yiakoumis.To read this article in full or to leave a comment, please click here

What to expect from Google’s big Oct. 4 hardware event

Get ready for a Google hardware-palooza.The company is set to not only unveil a pair of smartphones during its just-announced Oct. 4 event in San Francisco, but we also may also see some other gear that will surely make it onto the holiday wish list of anyone that’s a fan of Google services.The story behind the story: Late Monday, the company sent out a press invite and a playful tweet that takes you to a not-so-subtle teaser site. It’s clearly a phone and the URL of madeby.google.com tells us that instead of this being just another Nexus partnership, Google is more fully in control of its latest smartphones. To read this article in full or to leave a comment, please click here

SanDisk reveals world’s first 1TB SD card

SanDisk today showcased its upcoming 1TB SDXC card prototype at a European trade show for photo and video professionals."There is no definitive timing for availability as of now," a company spokesperson said in an email to Computerworld. "Western Digital plans to monitor industry trends and demands, and introduce the card in retail accordingly. Price would depend on market conditions at the time it’s released." Amazon SanDisk's current 512GB SD card retails for $345.77 on Amazon.com.To read this article in full or to leave a comment, please click here

Cisco CEO: Spin-in technologies aren’t dead at Cisco

The spin-in culture that developed some major innovations and once shaped a ton of advanced technologies at Cisco isn’t dead but it sure is unrecognizable.That’s because the notions of innovation and developing new ways of bringing cutting-edge technology to the networking arena at least from Cisco has changed.+More on Network World: Cisco unearths its inner startup culture via companywide innovation contest; Cisco names winners of Innovate Everywhere Challenge+ To read this article in full or to leave a comment, please click here

Cisco CEO: Spin-in technologies aren’t dead at Cisco

The spin-in culture that developed some major innovations and once shaped a ton of advanced technologies at Cisco isn’t dead but it sure is unrecognizable.That’s because the notions of innovation and developing new ways of bringing cutting-edge technology to the networking arena at least from Cisco has changed.+More on Network World: Cisco unearths its inner startup culture via companywide innovation contest; Cisco names winners of Innovate Everywhere Challenge+ To read this article in full or to leave a comment, please click here

Data hoarding site represents the dark side of data breach monitoring

A site that's been warning the public about data breaches might actually be doing more harm than good.Enter LeakedSource, a giant repository online that can potentially make hacking easier. Your email address and the associated Internet accounts -- including the passwords -- is probably in it.In fact, the giant repository is made up of stolen databases taken from LinkedIn, Myspace, Dropbox, and thousands of other sites. It bills itself as a data breach monitoring site and for months now, it's been collecting details on hacks, both old and new, and alerting the media about them.To read this article in full or to leave a comment, please click here