The Yahoo hackers weren’t state-sponsored, a security firm says

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday. Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.    The independent security firm found the alleged data as part of its investigation into "Group E," a team of five professional hackers believed to be from Eastern Europe.To read this article in full or to leave a comment, please click here

The Yahoo hackers weren’t state-sponsored, a security firm says

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday. Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.    The independent security firm found the alleged data as part of its investigation into "Group E," a team of five professional hackers believed to be from Eastern Europe.To read this article in full or to leave a comment, please click here

The Yahoo hackers weren’t state-sponsored, a security firm says

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday.Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.   The independent security firm found the alleged data as part of its investigation into "Group E," a team of five professional hackers believed to be from Eastern Europe.To read this article in full or to leave a comment, please click here

The Yahoo hackers weren’t state-sponsored, a security firm says

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday.Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.   The independent security firm found the alleged data as part of its investigation into "Group E," a team of five professional hackers believed to be from Eastern Europe.To read this article in full or to leave a comment, please click here

BrandPost: Meeting enterprise network demands with hybrid WANs

Frost & Sullivan recently declared that the “enterprise wide area networking (WAN) space is going through a major transformation”. As any enterprise IT and networking executive well knows, voice video and data are continuing to drive WAN demand, but there are even more challenging applications coming to the fore. As Frost & Sullivan notes, “the growing penetration of cloud computing, big data applications, and mobility applications are dictating new requirements on the enterprise.” So what’s needed to relieve pressure on the corporate network? According to the report, a hybrid VPN approach that leverages the best of Multiprotocol Label Switching (MPLS) VPNs and public internet-based IPSec VPNs is the direction enterprises are moving in or at least evaluating.To read this article in full or to leave a comment, please click here

BrandPost: High Security for Workers and Guests

Networking is difficult to manage, cost consuming and subject to huge security concerns. More and more administrators would just as soon pass off some of the core responsibilities for keep their networks operating properly and safely.The typical enterprise today is either managing or outsourcing a bewildering array of WAN hardware that includes switches, routers, load balancers, VPNs, accelerators and firewalls – essentially a separate device for each core network function.Recently, an IDG Research Services survey revealed that 75 percent of respondents would value the ability to offload installing, configuring, and running network hardware. That aligns with an overall trend to rely more on managed service providers for key business processes, which, according to research published by consulting and research firm Everest Group, now represents a global market of $1.5 billion .To read this article in full or to leave a comment, please click here

Some technical notes on the PlayPen case

In March of 2015, the FBI took control of a Tor onion childporn website ("PlayPen"), then used an 0day exploit to upload malware to visitors's computers, to identify them. There is some controversy over the warrant they used, and government mass hacking in general. However, much of the discussion misses some technical details, which I thought I'd discuss here.

IP address

In a post on the case, Orin Kerr claims:
retrieving IP addresses is clearly a search
He is wrong, at least, in the general case. Uploading malware to gather other things (hostname, username, MAC address) is clearly a search. But discovering the IP address is a different thing.

Today's homes contain many devices behind a single router. The home has only one public IP address, that of the router. All the other devices have local IP addresses. The router then does network address translation (NAT) in order to convert outgoing traffic to all use the public IP address.

The FBI sought the public IP address of the NAT/router, not the local IP address of the perp's computer. The malware ("NIT") didn't search the computer for the IP address. Instead the NIT generated network traffic, destined to the FBI's computers. Continue reading

Windows Server 2016: End Of One Era, Start Of Another

What constitutes an operating system changes with the work a system performs and the architecture that defines how that work is done. All operating systems tend to expand out from their initial core functionality, embedding more and more functions. And then, every once in a while, there is a break, a shift in technology that marks a fundamental change in how computing gets done.

It is fair to say that Windows Server 2016, which made it formal debut at Microsoft’s Ignite conference today and which starts shipping on October 1, is at the fulcrum of a profound change where an

Windows Server 2016: End Of One Era, Start Of Another was written by Timothy Prickett Morgan at The Next Platform.

Apple to call its next smartphone the iPhone 8, report claims

With the iPhone 7 now available in stores, it was only a matter of time before we began looking ahead towards Apple’s 2017 iPhone model. While Apple traditionally follows a tick-tock strategy for iPhone updates wherein they release a standalone numerical model and then follow it up with an ‘s’ model, there are rumblings that Apple’s iPhone next year will be called the iPhone 8.Rumors of Apple’s plan to call its 2017 iPhone the iPhone 8 as opposed to the iPhone 7s first emerged earlier this year. Now, a few months later, we now have even more evidence that Apple’s next-gen iPhone will be the iPhone 8.According to a report from Business Insider, an Apple employee at Apple’s offices in Herzilya, Israel relayed that they are already referring to the upcoming iPhone internally as the iPhone 8.To read this article in full or to leave a comment, please click here

Up To $65 In Digital Content When You Purchase Fire TV Stick With Alexa Control – Deal Alert

The next generation of the bestselling Fire TV Stick. The most powerful with the fastest Wi-Fi and most accurate voice search of any streaming media stick–now with the Alexa Voice Remote. Enjoy over 7,000 apps, games, and Alexa skills including Netflix, Hulu, HBO NOW, YouTube, Amazon Video, NBC, WatchESPN, Disney, and more. Launch and control content with the included Alexa Voice Remote. Simply say, “Play Game of Thrones” or “Launch Netflix” and Alexa will respond instantly. Plus, play music, find movie show times, order a pizza, and more—just ask. Activate your All-New Fire TV Stick with Alexa Voice Remote by October 31st and receive 1 month of Sling TV, 2 Months of Hulu, and a $10 Amazon Video Credit. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

26% off American Red Cross Blackout Buddy, The Emergency Nightlight – Deal Alert

Just leave the slim and trim Blackout Buddy in your wall socket and you’ll never be in the dark. It automatically turns on when the power goes out so that you can easily locate it. Then, fold away the prongs and you've got yourself a flashlight. A very bright idea from the American Red Cross. Flip a switch and the Blackout Buddy also doubles as an LED nightlight, so you can keep your kids' rooms, hallways, or kitchen always illuminated. The Blackout Buddy keeps itself charged and provides up to 4 hours of light when needed. It averages 4.5 out of 5 stars from over 1,300 people on Amazon (read reviews). Its typical list price of $17.50 has been reduced 26% to just $13.01.To read this article in full or to leave a comment, please click here

Why bots are poised to disrupt the enterprise

The proliferation of robots completing manual tasks traditionally done by humans suggests we have entered the machine automation age. And while nothing captures the imagination like self-directing machines shuttling merchandise around warehouses, most automation today comes courtesy of software bots that perform clerical tasks such as data entry.Here’s the good news: Far from a frontal assault on cubicle inhabitants, these software agents may eventually net more jobs than they consume, as they pave the way for companies to create new knowledge domain and customer-facing positons for employees, analysts say.The approach, known as robotic process automation (RPA), automates tasks that office workers would normally conduct with the assistance of a computer, says Deloitte LLP Managing Director David Schatsky, who recently published research on the topic. RPA's potential will grow as it is combined with cognitive technologies to make bots more intelligent, ideally increasing their value to businesses. Globally, the RPA market will grow to $5 billion by 2020 from just $183 million in 2013, predicts Transparency Market Research.To read this article in full or to leave a comment, please click here

Quiet rumblings but few fireworks at LTE-U gathering

A Washington, D.C. think tank on Wednesday hosted the first event to feature representatives from both sides of the LTE-U debate since a contentious agreed testing framework was created several weeks ago.The panelists included representatives from Broadcom, Verizon, Comcast, T-Mobile and consumer advocate Public Knowledge. The event was moderated by the director of the wireless future project at New America’s Open Technology Institute, Michael Calabrese, and kicked off with presentations from Josh Breitbart, a senior adviser for broadband to New York Mayor Bill DeBlasio, and Kevin Robinson, vice president of marketing for the Wi-Fi Alliance.+ALSO ON NETWORK WORLD: Nutanix CEO skewers box-based hyperconvergence rivals + BlackBerry stops making hardware, but BlackBerry phones live onTo read this article in full or to leave a comment, please click here

Federal court backs ballot selfies

Just in time for the biggest election in the history of democracy, a three-judge federal appeals court has told the state of New Hampshire that it cannot prevent voters from taking a selfie with their completed ballot.News of the decision comes via a tweet from executive editor of the Manchester Union-Leader: In August 2015, a different judge had overturned New Hampshire’s ban on ballot selfies, but the elected officials of the “Live Free or Die” state inexplicably decided to appeal that decision to a higher court. Their argument is that ballot selfies encourage vote buying by allowing the selfie-taker to provide evidence that he or she voted as the buyer instructed.To read this article in full or to leave a comment, please click here

Image2Docker: A New Tool for Prototyping Windows VM Conversions

Docker is a great tool for building, shipping, and running your applications. Many companies are already moving their legacy applications to Docker containers and now with the introduction of the Microsoft Windows Server 2016, Docker Engine can not run containers  natively on Windows.To make it even easier, there’s a new prototyping tool for Windows VMs that shows you how to replicate a VM Image to a container.

Docker Captain Trevor Sullivan recently released the Image2Docker tool, an open source project we’re hosting on GitHub. Still in it’s early stages, Image2Docker is a Powershell module that you can point at a virtual hard disk image, scan for common Windows components and suggest a Dockerfile. And to make it even easier, we’re hosting it in the Powershell Gallery to make it easy to install and use.

In Powershell, just type:

Install-Module -Name Image2Docker

And you’ll have access to Get-WindowsArtifacts and ConvertTo-Dockerfile. You can even select which discovery artifacts to search for.

Powershell.png

Currently Image2Docker supports VHD, VHDK, and WIM images. If you have a VMDK, Microsoft provides a great conversion tool to convert VMDK images to VHD images.

And as an open source project, lead by a Docker Captain, it’s easy Continue reading

AMD has its eyes on Las Vegas with Polaris GPUs

AMD wants its new Polaris GPUs to dazzle gamblers in Las Vegas using electronic devices.Qualcomm, meanwhile, wants its embedded Snapdragon chips to be installed in robots, drones, and smart devices used in homes and for commercial applications.For both chipmakers, the internet of things market is becoming too big to ignore. The companies this week announced CPUs and GPUs adapted from PCs and mobile devices for use in IoT devices.AMD adapted its Polaris GPU architecture, which is used in discrete GPUs and PC chips, for the IoT sector. Qualcomm's new Snapdragon 600E and 410E are compact chips originating from the company's mobile processor designs.To read this article in full or to leave a comment, please click here

25% off Fizzics Revolutionary Beer System – Deal Alert

Crowdfunded on Indiegogo, the revolutionary Fizzics System improves the flavor and taste of ordinary canned, bottled and growler beer (accommodates up to a full 64oz growler). Fizzics technology enhances the carbonation and aroma of beer while providing a smooth, creamy, full-body flavor and taste without the use of additives or chemicals. The device enhances the flavor and taste of all beer styles, including IPAs, Pilsners, Brown Ales, Stouts, Porters, Lagers, and more. It promises to deliver fresh from the tap taste, anytime, anywhere. The Fizzics beer system averages 4 out of 5 stars on Amazon (read reviews) and its typical list price of $200 is currently reduced 25% to $150. Learn more about the Fizzics system, or buy it now, on Amazon.To read this article in full or to leave a comment, please click here