IDG Contributor Network: How algorithms change the way people see things

Allowing algorithms to curate our lives might have unintended consequences, an Australian researcher says.Algorithms are used throughout our interaction with technology. They range from those used by Facebook to tell us which friends we find most interesting, to Google’s Now product that reminds us of meetings we may care so little about that we’ve forgotten about them. The pictures we see in social media photo streams are dictated by algorithms, as are search results and the music we listen to on online radio stations.+ Also on Network World: 10 amazing algorithms +To read this article in full or to leave a comment, please click here

How to prevent potential HTTPS URL hijacking

When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser’s HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here

How to prevent potential HTTPS URL hijacking

When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser’s HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here

A new adventure…

As the title says, I’ll soon be starting off on a new adventure.  After almost 6 years working in various networking roles at United Health Group I’ve decided to move on.  The decision to leave wasn’t an easy one for me to make.  I’ve built lots of great relationships and had the opportunity to work with some truly gifted individuals.  Many of the people I worked with have had a profound impact on my development as a network engineer and architect.  While I can’t possibly list all of the names, I want to sincerely thank all the people that have motivated and supported me during my tenure with UHG.  There are countless people that gave me opportunities I couldn’t have had anywhere else and for that I am truly grateful. 

So while it’s hard for me to close out this chapter of my career, I’m anxiously looking forward to starting the next one.  In late August I’ll be starting in my new role as a network engineer at IBM within the Watson business unit.  I’m excited about the opportunity and literally can’t wait to dig in!

In other news, some of Continue reading

Threat actors: Who you should really worry about

At the Black Hat convention in Las Vegas, CSO’s Steve Ragan sits down with Lior Div, CEO and co-founder of Cybereason, about threat actors, their methods and motives. Instead of worrying about nation-state hackers like China or Russia, Div argues that companies prepare for low-level attacks that can escalate to larger ones, because the cost of entry for many of these attacks are constantly getting lower.

22% off Logitech C930e Business-Grade HD 1080p Webcam – Deal Alert

The C930e webcam from Logitech is business-grade, making a professional impression with full 1080p HD video at a smooth 30 frames per second. It's the first with H.264 UVC 1.5 encoding, which processes video on-camera and takes the burden off your PC. The C930e features full pan, tilt and 4X digital zoom capability. It has a wide 90-degree extended view, making it ideal for meeting rooms, whiteboard presentations, product demos, and more. Smooth autofocus keeps your video image razor sharp, even in close ups. And RightLight 2 technology automatically adjusts for low light or backlit situations so you’re always seen in just the right light. When not in use, a privacy screen easily conceals the lens for added security. Several mounting options are available. This webcam averages 4.5 out of 5 stars from 550 customers (read reviews). Its list price of $129.99 has been reduced 22% to $101.79, making it a reasonable option for all of your conference rooms. See the discounted item now on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: New Gartner Magic Quadrant shakes up the file sharing world

A common remark from me is frustration about the huge number of companies competing in the enterprise file sharing and synchronization (EFSS) space. Honestly, the number of companies that send pitches to me on a weekly basis claiming to be highly differentiated from all the others is frustrating.It must be all the more frustrating for enterprise organizations that need to chose an EFSS vendor. With so many in the market, it is a confusing and bewildering decision to make, which is, after all, why analyst firms exist. While Gartner, Forrester, IDC and their ilk receive much criticism around suggestions that they are both behind the times and commercially conflicted, the fact is they bring a degree of robustness to technology assessments.To read this article in full or to leave a comment, please click here

Black Hat: How to make and deploy malicious USB keys

USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016.Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but the victims then clicked on links in files that connected them to more malware, says Elie Burstzein, a Google researcher who presented the results.+More on Network World: Black Hat: 9 free security tools for defense & attacking | Follow all the stories from Black Hat 2016 +To read this article in full or to leave a comment, please click here

Black Hat: How to make and deploy malicious USB keys

USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016.Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but the victims then clicked on links in files that connected them to more malware, says Elie Burstzein, a Google researcher who presented the results.+More on Network World: Black Hat: 9 free security tools for defense & attacking | Follow all the stories from Black Hat 2016 +To read this article in full or to leave a comment, please click here

Black Hat: ATM spits out cash after chip and pin hack

We’ve been told that EMV (Europay, MasterCard and Visa) chip-equipped cards have an added layer of security, making them more secure and harder to clone than cards with only a magnetic stripe. But Rapid7 security research manager Tod Beardsley said, “The state of chip and pin security is that it’s a little oversold.”Black Hat USA attendees who watched an ATM spit out hundreds of dollars might tend to agree. The demonstration was part of Hacking Next-Gen ATMs: From Capture to Cashout which was presented by Rapid7’s Weston Hecker. The abstract of his talk said the system he devised could “cash out around $20,000/$50,000 in 15 minutes.”To read this article in full or to leave a comment, please click here

Black Hat: ATM spits out cash after chip and pin hack

We’ve been told that EMV (Europay, MasterCard and Visa) chip-equipped cards have an added layer of security, making them more secure and harder to clone that cards with only a magnetic stripe. But Rapid7 security research manager Tod Beardsley said, “The state of chip and pin security is that it’s a little oversold.”Black Hat USA attendees who watched an ATM spit out hundreds of dollars might tend to agree. The demonstration was part of Hacking Next-Gen ATMs: From Capture to Cashout which was presented by Rapid7’s Weston Hecker. The abstract of his talk said the system he devised could “cash out around $20,000/$50,000 in 15 minutes.”To read this article in full or to leave a comment, please click here