PQ Show 89: Implementing EVPN for Enterprise DCI

This week, the Priority Queue gets into the weeds on EVPN with the specific use-case of DCI. Join Ethan Banks as he interviews double JNCIE Clay Haynes on setting up BGP adjacencies, creating EVPN address families, interpreting BGP output containing EVPN NLRIs, handling VTEPs, walking a packet through end to end, and useful commands to know. The post PQ Show 89: Implementing EVPN for Enterprise DCI appeared first on Packet Pushers.

IoT is now growing faster than smartphones

If there were any doubt that IoT is for real, one fact ought to dispel it: For the first time, U.S. mobile operators are adding IoT connections to their networks faster than they’re adding phones.In fact, cars alone are getting connected to cellular networks faster than anything else, according to statistics compiled by Chetan Sharma Consulting for the second quarter of this year. Counting all U.S. carriers, about 1.4 million cars got connected to cellular networks in the quarter, compared with 1.2 million phones and less than 900,000 tablets.The second quarter, between April and June, isn’t a high point for new phone sales like the fourth quarter, when holiday shopping hits and new iPhone models roll out. But IoT growth has been a long-term trend.To read this article in full or to leave a comment, please click here

Rant: American broadband, what’s wrong with you?

During a typical week, I attend five to 10 video calls, typically using Google Hangouts or Skype. Frequently, these calls are international. Video collaboration is preferable because the other participants’ expression and attentiveness can be observed and data or code can be shared. Except in the United States, where often the group of video callers turns off the video stream due to bandwidth limitations.The high quality of international video calls compared to choppy domestic video calls has me wavering between anger and the verge of total despair. I admit that my story and data are personal and anecdotal, but I don’t think I’m alone because I’ve had many people turn down offers to connect with a video call in favor of plain old telephone service (POTS) calls.To read this article in full or to leave a comment, please click here

In terms of spam, Donald Trump is beating Hillary Clinton hands down

As the U.S. presidential election nears, Donald Trump is emerging as the clear winner -- at least when it comes to having his name used in spam messages.Spammers and cyber attackers are using Trump's name far more than Hillary Clinton's in emails pushing get rick quick schemes or phishing for personal information, according to an analysis from Proofpoint.The security firm scanned the subject line of emails received by its customers in June and July looking for occurrences of "trump" or "clinton," and found that the Republican nominee appeared in 169 times as many emails as his Democratic opponent.To read this article in full or to leave a comment, please click here

In terms of spam, Donald Trump is beating Hillary Clinton hands down

As the U.S. presidential election nears, Donald Trump is emerging as the clear winner -- at least when it comes to having his name used in spam messages.Spammers and cyber attackers are using Trump's name far more than Hillary Clinton's in emails pushing get rick quick schemes or phishing for personal information, according to an analysis from Proofpoint.The security firm scanned the subject line of emails received by its customers in June and July looking for occurrences of "trump" or "clinton," and found that the Republican nominee appeared in 169 times as many emails as his Democratic opponent.To read this article in full or to leave a comment, please click here

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.That's the key finding of a research study that's scheduled to be presented Wednesday at the USENIX Security Symposium in Austin, Texas.The TCP weakness, identified by researchers from the University of California at Riverside, enables attackers to hijack users’ internet communications completely remotely. It could be used to launch targeted attacks that track users’ online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee of anonymity networks such as Tor, the researchers said.To read this article in full or to leave a comment, please click here

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.That's the key finding of a research study that's scheduled to be presented Wednesday at the USENIX Security Symposium in Austin, Texas.The TCP weakness, identified by researchers from the University of California at Riverside, enables attackers to hijack users’ internet communications completely remotely. It could be used to launch targeted attacks that track users’ online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee of anonymity networks such as Tor, the researchers said.To read this article in full or to leave a comment, please click here

HP pushes for AR at work with its Elite x3 phone and HoloLens

HP wants to add augmented reality to its Elite x3 smartphone, and it's looking at Microsoft's HoloLens as one way to do it.The Elite x3, which runs Windows 10 Mobile, was scheduled to ship last month starting at US$699.99 but has been delayed. HP believes the smartphone has the horsepower to be a PC in a pinch. It might also become an AR device that could be used in enterprises.Universal Windows applications made for the HoloLens AR headset will work on smartphones, and they could be used on the Elite x3, said Michael Park, vice president and general manager of mobility at HP.The Elite x3 won't do AR right out of the starting gate, but it will eventually, Park said.To read this article in full or to leave a comment, please click here

Bugs & Bugs: DARPA, bug bounties & thousands of bees

Black Hat & Def Con provided plenty of fodder for our new installment of Bugs & Bugs, as seen in our Facebook Live stream on the latest news about computer bugs and real insects.Network World's Bob Brown and Tim Greene discussed, as you can see in the saved edition of the video below, new research that shows affluent communities tend to attract more different species of insects and other arthropods -- and that's a good thing. We also explored the DARPA Cyber Grand Challenge that took place in Las Vegas on the eve of Def Con and resulted in a $2M first prize for the grand winner of this computer-on-computer Capture the Flag contest.To read this article in full or to leave a comment, please click here

Bugs & Bugs: DARPA, bug bounties & thousands of bees

Black Hat & Def Con provided plenty of fodder for our new installment of Bugs & Bugs, as seen in our Facebook Live stream on the latest news about computer bugs and real insects.Network World's Bob Brown and Tim Greene discussed, as you can see in the saved edition of the video below, new research that shows affluent communities tend to attract more different species of insects and other arthropods -- and that's a good thing. We also explored the DARPA Cyber Grand Challenge that took place in Las Vegas on the eve of Def Con and resulted in a $2M first prize for the grand winner of this computer-on-computer Capture the Flag contest.To read this article in full or to leave a comment, please click here

8% to 20% off Multiple Fitbit Tracker Models – Deal Alert

Fitbit trackers come in various models and fitting each individuals fitness needs. Discounts are now being offered for many of these models.  Below are several of the models that are currently discounted on Amazon.Fitbit Flex—a slim, stylish device that tracks all-day activity like steps, distance, calories burned and active minutes. See how every day stacks up with LEDs that light up like a scoreboard as you get closer to your goal. Then wear it at night to measure your sleep quality and wake with a silent, vibrating alarm. Currently available on Amazon at the discounted price of $79.95To read this article in full or to leave a comment, please click here

A new $500,000 iOS bug bounty beats Apple’s offer

A security firm is offering up to US$500,000 for information on zero-day vulnerabilities in iOS, surpassing Apple's bug bounty just days after it was announced.On Tuesday, Texas-based Exodus Intelligence said it will give between $5,000 and $500,000 for zero-day vulnerabilities relating to iOS version 9.3 and higher. These zero-days are software flaws that have gone undetected by Apple, making them potentially very valuable, especially for cyber criminals who can use them to hack iPhones. To read this article in full or to leave a comment, please click here

Windows Secure Boot: Insecure by design and mostly likely can’t be fixed

Encryption backdoors don’t work; the latest proof of that was discovered by security researchers Slipstream and MY123. This time, the security flub-up involves “golden keys” which can unlock Windows devices allegedly protected by Secure Boot.The researchers sounded the alarm, saying Microsoft messed up and accidentally leaked the security key which is supposed to protect Windows devices from attackers as a box boots up. This same flaw could be used by the machine’s owner to jailbreak a locked box and run a different OS like Linux – anything really, so long as it is cryptographically signed.To read this article in full or to leave a comment, please click here

Windows Secure Boot: Insecure by design and mostly likely can’t be fixed

Encryption backdoors don’t work; the latest proof of that was discovered by security researchers Slipstream and MY123. This time, the security flub-up involves “golden keys” which can unlock Windows devices allegedly protected by Secure Boot.The researchers sounded the alarm, saying Microsoft messed up and accidentally leaked the security key which is supposed to protect Windows devices from attackers as a box boots up. This same flaw could be used by the machine’s owner to jailbreak a locked box and run a different OS like Linux – anything really, so long as it is cryptographically signed.To read this article in full or to leave a comment, please click here