iPhone 7 won’t include game-changing features, report claims

With WWDC now behind us, the next big event on Apple's schedule is its highly anticipated iPhone 7 unveiling. Likely to take place sometime this coming September, the iPhone 7 will be under a lot of pressure to boost sales. Of course, iPhone sales are still incredibly strong, but Apple in 2016 experienced its first year over year drop in iPhone sales in history. In other words, analysts and pundits will be looking at the iPhone 7 to deliver in a big way.That said, a recent report from The Wall Street Journal suggests that the iPhone 7 may not include any game-changing features. Specifically, the report relays that Apple's traditional schedule of implementing major design changes to the iPhone every two years will be adjusted ever so slightly.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

DockerCon 2016: Just Wow!

The Docker Community has continued to impress us with so much awesomeness packed in just a few days at DockerCon 2016!

Big thank you to all of the 141 confirmed speakers (not including Open Forum track sessions!), 100+ sponsors and over 4,000 attendees for helping us make such a big splash in Seattle.

We’ll post the recorded videos and slides soon starting with the general sessions but here is a brief recap of all of the news DockerCon 2016!
Continue reading

Why Russian hackers, not a lone wolf, were likely behind the DNC breach

Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here

Why Russian hackers, not a lone wolf, were likely behind the DNC breach

Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here

Financial services firm adopts agile for digital development

Financial services companies have traditionally shrunk from the notion of releasing applications that haven't been thoroughly baked and battled tested. But in today's digital world, companies that agonize over building the perfect app risk losing out to more nimble competitors. That's why many companies are turning to agile software development to push more products out the door and rescue other projects from oblivion. This is certainly true for Principal Financial Group, a provider of insurance, retirement planning and other asset management services for corporate employees. In 2013, the Des Moines, Iowa, (needed?) company was struggling to prioritize and complete software projects. One insurance business unit in hyper-growth mode couldn't get group benefits products to market fast enough. A services unit was slogging through a project that had gone on for too long and had no end in sight.To read this article in full or to leave a comment, please click here

Microsoft: Government’s data gag order practices worse than first thought

Microsoft has significantly upped the tally of U.S. government gag orders slapped on demands for customer information, according to court documents filed last week.In a revised complaint submitted to a Seattle federal court last Friday, Microsoft said that more than half of all government data demands were bound by a secrecy order that prevented the company from telling customers of its cloud-based services that authorities had asked it to hand over their information.The original complaint -- the first round in a lawsuit Microsoft filed in April against the U.S. Department of Justice (DOJ) and Attorney General Loretta Lynch -- had pegged the number of data demands during the past 18 months at 5,624. Of those, 2,576, or 46%, were tagged with secrecy orders that prevented Microsoft from telling customers it had been compelled to give up their information.To read this article in full or to leave a comment, please click here

Microsoft: Government’s data gag order practices worse than first thought

Microsoft has significantly upped the tally of U.S. government gag orders slapped on demands for customer information, according to court documents filed last week.In a revised complaint submitted to a Seattle federal court last Friday, Microsoft said that more than half of all government data demands were bound by a secrecy order that prevented the company from telling customers of its cloud-based services that authorities had asked it to hand over their information.The original complaint -- the first round in a lawsuit Microsoft filed in April against the U.S. Department of Justice (DOJ) and Attorney General Loretta Lynch -- had pegged the number of data demands during the past 18 months at 5,624. Of those, 2,576, or 46%, were tagged with secrecy orders that prevented Microsoft from telling customers it had been compelled to give up their information.To read this article in full or to leave a comment, please click here

Oracle will give cloud users first dibs on its next big database update

Oracle's namesake database may have been born on-premises, but the next big update to the software will make its debut in the cloud.Oracle Database 12c Release 2, also known as Oracle Database 12.2, is slated for release in the second half of this year. It will first be made available in the cloud, with an on-premises version arriving at some undefined point in the future.“We are committed to giving customers more options to move to the cloud because it helps them reduce costs and become more efficient and agile," Oracle said in a statement sent by email. "Oracle Database 12.2 will be available in the cloud first, but we will also make it accessible to all of our customers.”To read this article in full or to leave a comment, please click here

Armed with a new CEO, Panzura is ready to bring enterprises to the cloud

Panzura is a company that’s been around for eight years but two months ago brought in the first new CEO after founder Randy Chou left the business. LinkedIn Panzura CEO Patrick Harr  The new head honcho is Patrick Harr, an executive who formerly worked at VMware, Hewlett Packard Enterprise on its Helion Cloud Platform and Nirvanix – the now defunct public cloud storage company. He’s been brought in to scale the company’s growth, he says. And he’s got a clear plan of how to do it: He wants to bring enterprises to the cloud.To read this article in full or to leave a comment, please click here

Accessing ASA CLI in Firepower Threat Defence

I’ve recently loaded Firepower Threat Defense on an ASA5525 for my home Internet firewall. For those unfamiliar with FTD, it is basically a combination of critical ASA features and all of the Cisco Firepower features in a single image and execution space. So unlike Firepower Services, which runs separately inside the same ASA sheet metal,  FTD takes over the hardware. Once the image installed onto the hardware, the firewall is attached to and managed by a Firepower Management Console.

For those that still want to (or need to) get under the covers to understand the underpinnings or do some troubleshooting of the ASA features, it is still possible to access the familiar CLI. The process first requires an ssh connection to the management IP of the FTD instance, then access expert mode and enter the lina_cli command.

MacBook:~ paulste$ ssh [email protected]
Password:
Last login: Thu Jun 23 18:16:43 2016 from 192.168.1.48

Copyright 2004-2016, Cisco and/or its affiliates. All rights reserved.
Cisco is a registered trademark of Cisco Systems, Inc.
All other trademarks are property of their respective owners.

Cisco Fire Linux OS v6.0.1 (build 37)
Cisco ASA5525-X Threat Defense v6.0.1  Continue reading

GozNym Trojan turns its sight on business accounts at major US banks

A hybrid Trojan program created for financial fraud has started redirecting users of four large U.S. banks to rogue websites in order to hijack their accounts.GozNym is a relatively new threat, first discovered in April, and is based on the Nymaim malware dropper and the Gozi banking Trojan. Like most banking Trojans, GozNym can inject rogue code into banking websites displayed in local browsers in order to steal credentials and other sensitive information.However, in addition to this old technique, the cybercrime gang behind it has also built the necessary infrastructure to host rogue copies of banking websites, and they've started to redirect victims there.To read this article in full or to leave a comment, please click here

GozNym Trojan turns its sight on business accounts at major US banks

A hybrid Trojan program created for financial fraud has started redirecting users of four large U.S. banks to rogue websites in order to hijack their accounts.GozNym is a relatively new threat, first discovered in April, and is based on the Nymaim malware dropper and the Gozi banking Trojan. Like most banking Trojans, GozNym can inject rogue code into banking websites displayed in local browsers in order to steal credentials and other sensitive information.However, in addition to this old technique, the cybercrime gang behind it has also built the necessary infrastructure to host rogue copies of banking websites, and they've started to redirect victims there.To read this article in full or to leave a comment, please click here