Best Deals of the Week, August 15-19 – Deal Alert

Best Deals of the Week, August 15-19 - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of August 15th. All items are highly rated, and dramatically discounted!34% off Lumsing 5 Port 40W USB Charging Station, with Quick Charge PortInexpensive, highly rated and discounted. That's the situation with this Lumsing charging station. This compact device will be the central charging hub in your dorm room, kitchen, bedroom, etc, and can charge up to 5 devices simultaneously. It currently averages 4 out of 5 stars on Amazon from 900+ people (read reviews) and its list price of $29 has been reduced to $19.To read this article in full or to leave a comment, please click here

Best Deals of the Week, August 15-19 – Deal Alert

Best Deals of the Week, August 15-19 - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of August 15th. All items are highly rated, and dramatically discounted!34% off Lumsing 5 Port 40W USB Charging Station, with Quick Charge PortInexpensive, highly rated and discounted. That's the situation with this Lumsing charging station. This compact device will be the central charging hub in your dorm room, kitchen, bedroom, etc, and can charge up to 5 devices simultaneously. It currently averages 4 out of 5 stars on Amazon from 900+ people (read reviews) and its list price of $29 has been reduced to $19.To read this article in full or to leave a comment, please click here

Microsoft announces Insider program for Visio on iPad

Microsoft announced it plans to launch its charting and diagramming app Visio on the iPad, and with it an Insider Program for users to get a chance to try out the app before it launches.Amazing how creative companies are at avoiding the word "beta."The company is looking for 2,000 Insiders, and in a break from its usual English-only Insider programs, Microsoft is supporting multiple languages this time: English, Chinese, French, German, Russian and Spanish.The program will run on all iPads, including iPad Mini and iPad Pro, that are capable of running iOS 9.0 or later, which basically means iPad third generation or later. Microsoft plans to roll out the first feature update around August or September.  To read this article in full or to leave a comment, please click here

Smartphone sales jump 4% in Q2, Gartner says

Global smartphone sales jumped 4.3% in the second quarter compared to a year ago, but iPhone sales declined for the third straight quarter, market research firm Gartner said today.Gartner’s figures for second-quarter smartphone growth were more optimistic than numbers reported by Strategy Analytics and Canalys recently. Both had reported modest growth of no more than 3% in smartphone shipments.IDC last month reported second-quarter shipments were flat, growing just 0.3%.To read this article in full or to leave a comment, please click here

macOS Sierra’s beta cadence points to October launch

Apple's macOS Sierra has been on a slower tempo of preview releases than last year's El Capitan, hinting that the upgrade will launch in October. macOS Sierra's release tempo of developer preview builds (in green) is about two weeks behind the 2015 timetable of El Capitan (in red), hinting at a later launch this year, perhaps around mid-October. Although Apple has been somewhat more transparent in its development process -- earlier this year it launched a new preview program for the Safari browser -- the Cupertino, Calif. company still does not publicly mark release dates on a calendar.To read this article in full or to leave a comment, please click here

Keep using password managers — bugs and all

Bugs in several password managers, including the vulnerabilities discovered in LastPass in late July, have scared away some users. But such fears go too far. Millions of users rely on password managers to keep track of passwords for applications and online services, and by all indications, they work better than trying to do it on your own.Security victories should be embraced -- including password managers, which automatically generate complex strings of characters as passwords and deploy a unique password for each site or application. Password managers solve several authentication problems, including easily-cracked passwords and password reuse.To read this article in full or to leave a comment, please click here

Keep using password managers — bugs and all

Bugs in several password managers, including the vulnerabilities discovered in LastPass in late July, have scared away some users. But such fears go too far. Millions of users rely on password managers to keep track of passwords for applications and online services, and by all indications, they work better than trying to do it on your own.Security victories should be embraced -- including password managers, which automatically generate complex strings of characters as passwords and deploy a unique password for each site or application. Password managers solve several authentication problems, including easily-cracked passwords and password reuse.To read this article in full or to leave a comment, please click here

Ford remains wary of Tesla-like autonomous driving features

At a time when Tesla has already rolled out advanced autonomous driving features in its cars, Ford is proceeding more cautiously because it believes the industry is not ready to hand over such features to consumers.On Tuesday, Ford announced that by 2021 it plans to offer a fully self-driving (autonomous) vehicle for multi-passenger shuttles and ride-hailing services such as Uber. The vehicle will be manufactured with no steering wheel, no gas or brake pedal. In other words, no driver necessary.Well before 2021, Ford will be testing prototypes on U.S. roadways of those fully-autonomous vehicles, according to Randy Visintainer, director of Autonomous Vehicles at Ford. The automaker hopes a fleet of self-driving vehicle shuttles and ride-hailing services can tap into a market that includes the elderly, infirm or young who are not able to drive.To read this article in full or to leave a comment, please click here

The 15 most exciting PC games still coming in 2016

The best of what's to comeFeel that chill breeze in the air? Okay, maybe not—it’s still August, after all. But fall will be here soon enough, and with it the vaunted “Holiday Season,” aka the four-month span wherein every publisher releases its most promising video games at the same time in some sort of ridiculous consumer gladiator match.Despite some high-profile games slipping into 2017 already (damn it, Mass Effect Andromeda), there’s still quite a bit to be excited about in 2016. We’ve gone ahead and picked the 15 titles we’re looking forward to most—from Deus Ex (August 23) to South Park (December 6) and everything in between.To read this article in full or to leave a comment, please click here

Twitter suspends 360,000 accounts for terrorist ties

Twitter continues to fight to keep terrorist groups and sympathizers from using its service. The social network announced today that in the last six months it has suspended 235,000 accounts for violating its policies related to the promotion of terrorism. In February, Twitter reported that it had suspended 125,000 accounts since mid-2015 for terrorist-related reasons. That means Twitter has suspended 360,000 accounts since the middle of last year. "Since that [February] announcement, the world has witnessed a further wave of deadly, abhorrent terror attacks across the globe," the company wrote in a blog post. "We strongly condemn these acts and remain committed to eliminating the promotion of violence or terrorism on our platform."To read this article in full or to leave a comment, please click here

Sample Ansible Networking Playbooks on Github

I spent the last week creating numerous scenarios using Ansible networking modules for my upcoming Network Automation workshop. The scenarios use Cisco IOS and Nexus OS modules as I used VIRL for network simulation, but you could easily adapt them to other networking devices.

All the scenarios I’m covering in the workshop are available in my Github repository; to get the them explained you’ll have to attend the workshop. Enjoy!

Eddie Bauer is latest retailer to be hit by point-of-sale malware

Clothing retailer Eddie Bauer has informed customers that point-of-sale systems at its stores were hit by malware, enabling the theft of payment card information. All the retailer’s stores in the U.S. and Canada, numbering about 350, were affected, a company spokesman disclosed Thursday. He added that the retailer is not disclosing the number of customers affected. The card information harvested included cardholder name, payment card number, security code and expiration date. The retailer said that information of payment cards used at its stores on various dates between Jan. 2 and July 17, 2016 may have been accessed, but added that not all cardholder transactions were affected. Payment card information that was used for online purchases at its website was not affected.To read this article in full or to leave a comment, please click here

Eddie Bauer is latest retailer to be hit by point-of-sale malware

Clothing retailer Eddie Bauer has informed customers that point-of-sale systems at its stores were hit by malware, enabling the theft of payment card information. All the retailer’s stores in the U.S. and Canada, numbering about 350, were affected, a company spokesman disclosed Thursday. He added that the retailer is not disclosing the number of customers affected. The card information harvested included cardholder name, payment card number, security code and expiration date. The retailer said that information of payment cards used at its stores on various dates between Jan. 2 and July 17, 2016 may have been accessed, but added that not all cardholder transactions were affected. Payment card information that was used for online purchases at its website was not affected.To read this article in full or to leave a comment, please click here

Are your fragile packages safe? Ask Intel’s tiny IoT chip

Tags on a fragile packages may someday be able to say whether the goods are riding safely in the back of a truck or bouncing around in a hazardous way.If Intel follows through on an IoT research project it demonstrated at Intel Developer Forum this week, those tags could report on shipping conditions in real time without needing a battery to stay powered. After the package is delivered, the label might even be disposable. Stephen Lawson Intel demonstrated a prototype "smart tag" for packages at Intel Developer Forum in San Francisco on Aug. 16, 2016. The tag could detect motion and show it on a chart in real time.To read this article in full or to leave a comment, please click here

The NSA’s hoard of cyber weapons makes some experts nervous

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.Security researchers have been poring over a sample set of hacking tools that may have been stolen from the NSA.An anonymous group called the Shadow Brokers has posted the samples online and is auctioning off the rest, claiming they contain cyber weapons that rival the Stuxnet computer worm.Experts say the whole matter points to the danger of the NSA hoarding cyber weapons: they could fall into the wrong hands.To read this article in full or to leave a comment, please click here

The NSA’s hoard of cyber weapons makes some experts nervous

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.Security researchers have been poring over a sample set of hacking tools that may have been stolen from the NSA.An anonymous group called the Shadow Brokers has posted the samples online and is auctioning off the rest, claiming they contain cyber weapons that rival the Stuxnet computer worm.Experts say the whole matter points to the danger of the NSA hoarding cyber weapons: they could fall into the wrong hands.To read this article in full or to leave a comment, please click here

IPv6 Performance – Revisited

Every so often I hear the claim that some service or other has deliberately chosen not to support IPv6, and the reason cited is not because of some technical issue, or some cost or business issue, but simply because the service operator is of the view that IPv6 offers an inferior level service as compared to IPv4, and by offering the service over IPv6 they would be exposing their clients to an inferior level of performance of the service. But is this really the case?

EQGRP tools are post-exploitation

A recent leak exposed hackings tools from the "Equation Group", a group likely related to the NSA TAO (the NSA/DoD hacking group). I thought I'd write up some comments.

Despite the existence of 0days, these tools seem to be overwhelmingly post-exploitation. They aren't the sorts of tools you use to break into a network -- but the sorts of tools you use afterwards.

The focus of the tools appear to be about hacking into network equipment, installing implants, achievement permanence, and using the equipment to sniff network traffic.

Different pentesters have different ways of doing things once they've gotten inside a network, and this is reflected in their toolkits. Some focus on Windows and getting domain admin control, and have tools like mimikatz. Other's focus on webapps, and how to install hostile PHP scripts. In this case, these tools reflect a methodology that goes after network equipment.

It's a good strategy. Finding equipment is easy, and undetectable, just do a traceroute. As long as network equipment isn't causing problems, sysadmins ignore it, so your implants are unlikely to be detected. Internal network equipment is rarely patched, so old exploits are still likely to work. Some tools appear to target Continue reading

Intel’s new Atom chips bring 4K video to VR headsets, robots

In 2009, Apple CEO Tim Cook memorably trashed Atom-based netbooks for being "junky" hardware that underperformed. Intel's Atom chips have come a long way since, with the latest generation code-named Broxton boasting the most impressive improvements.The new Atom T5500 and 5700 chips have features found in low-end PC processors, but the chips are instead targeted at robots, drones, wearables, and smart home devices.A standout feature is 4K decoding and encoding capabilities, which could allow the chips to be used in virtual reality and augmented reality headsets.Intel showed smart glasses, a bartending robot, and a smart motorcycle helmet with the Broxton chips at the Intel Developer Forum this week. Intel also said the chips could be used be in storage or media servers.To read this article in full or to leave a comment, please click here