Black Hat: Be wary of HTTP/2 on Web servers

Researchers at Black Hat describe finding four flaws – now fixed - in the way the major server vendors implemented HTTP/2, but warn that the year-old Web protocol remains fertile ground for hackers seeking weaknesses in the way it’s rolled out.+More on Network World: IRS warns on super summer scam scourge | Follow all the coverage from Black Hat +A team at security vendor Imperva says they found nothing vulnerable about the protocol itself, but that they created distributed denial-of-service attacks that took advantage of openings left by how servers support the protocol.To read this article in full or to leave a comment, please click here

Black Hat: Be wary of HTTP/2 on Web servers

Researchers at Black Hat describe finding four flaws – now fixed - in the way the major server vendors implemented HTTP/2, but warn that the year-old Web protocol remains fertile ground for hackers seeking weaknesses in the way it’s rolled out.+More on Network World: IRS warns on super summer scam scourge | Follow all the coverage from Black Hat +A team at security vendor Imperva says they found nothing vulnerable about the protocol itself, but that they created distributed denial-of-service attacks that took advantage of openings left by how servers support the protocol.To read this article in full or to leave a comment, please click here

FAA authorizes private robotic space shot to the moon

The Federal Aviation Administration this week granted permission to a privately-held space firm to launch a robotic spacecraft to the moon. Moon Express expects to launch its MX-1 spacecraft on a two-week mission to the lunar surface in 2017.   The MX-1, which is about as large as a suitcase will include instruments and a camera to explore the moon’s surface. +More on Network World: NASA: Top 10 space junk missions+ “The MX-1E is a spacecraft/lander capable of transfer from Earth orbit to the Moon, making a soft landing on the lunar surface, and performing post-landing relocations through propulsive ‘hops,’” the FAA stated. The FAA Office of Commercial Space Transportation holds controlling powers over space launches and their payloads.To read this article in full or to leave a comment, please click here

FAA authorizes private robotic space shot to the moon

The Federal Aviation Administration this week granted permission to a privately-held space firm to launch a robotic spacecraft to the moon. Moon Express expects to launch its MX-1 spacecraft on a two-week mission to the lunar surface in 2017.   The MX-1, which is about as large as a suitcase will include instruments and a camera to explore the moon’s surface. +More on Network World: NASA: Top 10 space junk missions+ “The MX-1E is a spacecraft/lander capable of transfer from Earth orbit to the Moon, making a soft landing on the lunar surface, and performing post-landing relocations through propulsive ‘hops,’” the FAA stated. The FAA Office of Commercial Space Transportation holds controlling powers over space launches and their payloads.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.

But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?

+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +

To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +To read this article in full or to leave a comment, please click here

Toshiba raises SSD storage capacity to 7.68TB

Toshiba's been lagging in the race to raise storage capacity in solid-state drives, but has taken a step forward with its new 7.68TB ZD6000 SSD. The new drive is the highest-capacity SSD announced by Toshiba to date, up from its prior high of 4TB. But it's still way behind Samsung, which started shipping a 15.36TB SSD earlier this year. The ZD6000 is exactly half the size of Samsung's highest capacity drive, but Toshiba could exceed 8TB soon. It's a matter of cramming more chips in a drive, and Toshiba has the manufacturing technology to make that possible.To read this article in full or to leave a comment, please click here

Toshiba raises SSD storage capacity to 7.68TB

Toshiba's been lagging in the race to raise storage capacity in solid-state drives, but has taken a step forward with its new 7.68TB ZD6000 SSD. The new drive is the highest-capacity SSD announced by Toshiba to date, up from its prior high of 4TB. But it's still way behind Samsung, which started shipping a 15.36TB SSD earlier this year. The ZD6000 is exactly half the size of Samsung's highest capacity drive, but Toshiba could exceed 8TB soon. It's a matter of cramming more chips in a drive, and Toshiba has the manufacturing technology to make that possible.To read this article in full or to leave a comment, please click here

Black Hat: Kaspersky is seeking white hats

Kaspersky Lab is using Black Hat’s hacker-rich environment as the launch pad for its first bug-bounty program that seeks talent to hack the company’s anti-malware software.It’s dipping its toe into the program by staking an initial $50,000 kitty for a six-month effort to find flaws in its two most popular products, Kaspersky Internet Security and Kaspersky Endpoint Security.+More on Network World: Hot products at Black Hat 2016 | Follow all the stories from Black Hat +To read this article in full or to leave a comment, please click here

Black Hat: Kaspersky is seeking white hats

Kaspersky Lab is using Black Hat’s hacker-rich environment as the launch pad for its first bug-bounty program that seeks talent to hack the company’s anti-malware software.It’s dipping its toe into the program by staking an initial $50,000 kitty for a six-month effort to find flaws in its two most popular products, Kaspersky Internet Security and Kaspersky Endpoint Security.+More on Network World: Hot products at Black Hat 2016 | Follow all the stories from Black Hat +To read this article in full or to leave a comment, please click here

Another huge bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex

The Hong Kong-based bitcoin exchange Bitfinex suspended trading on Tuesday after discovering a security breach. A hacker or hackers pulled off a massive heist of nearly 120,000 bitcoins. At the time of the theft, 119,756 bitcoins would have been worth about $72 million. After the breach announcement, the price of bitcoin crashed; current exchange rates place the value at around $65 million.“Some of our users have had their bitcoins stolen,” Zane Tackett, Bitfinex’s director of community and product development, said on Reddit. “The bitcoin was stolen from users’ segregated wallets,” he told Reuters.To read this article in full or to leave a comment, please click here

Another huge bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex

The Hong Kong-based bitcoin exchange Bitfinex suspended trading on Tuesday after discovering a security breach. A hacker or hackers pulled off a massive heist of nearly 120,000 bitcoins. At the time of the theft, 119,756 bitcoins would have been worth about $72 million. After the breach announcement, the price of bitcoin crashed; current exchange rates place the value at around $65 million.“Some of our users have had their bitcoins stolen,” Zane Tackett, Bitfinex’s director of community and product development, said on Reddit. “The bitcoin was stolen from users’ segregated wallets,” he told Reuters.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Congress presented with shocking E911 MLTS report by GSA

After ignoring a Congressional directive for more than three years, as well as an FCC commissioner’s direct request, the General Services Administration (GSA) finally produced a report on the status of 911 dialing in federal buildings. Despite the long delay, the content and quality of the report were disappointing at best.On Feb. 22, 2012, the Middle-Class Tax Relief and Job Creation Act of 2012 was passed as Public Law 112-96. As with many bills, the law covered a broad array of topics, one of them being the establishment of a national public safety broadband network expanding high-speed wireless broadband and improving communications interoperability among first responders. Within this section, the law also required that the GSA audit and produce a report on the 911 capabilities of multi-line telephone systems (MLTS) used in the almost 10,000 federal buildings and facilities under their control.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Congress presented with shocking E911 MLTS report by GSA

After ignoring a Congressional directive for more than three years, as well as an FCC commissioner’s direct request, the General Services Administration (GSA) finally produced a report on the status of 911 dialing in federal buildings. Despite the long delay, the content and quality of the report were disappointing at best.On Feb. 22, 2012, the Middle-Class Tax Relief and Job Creation Act of 2012 was passed as Public Law 112-96. As with many bills, the law covered a broad array of topics, one of them being the establishment of a national public safety broadband network expanding high-speed wireless broadband and improving communications interoperability among first responders. Within this section, the law also required that the GSA audit and produce a report on the 911 capabilities of multi-line telephone systems (MLTS) used in the almost 10,000 federal buildings and facilities under their control.To read this article in full or to leave a comment, please click here

Iranian hacker group knows who is on Telegram

Hackers obtained the mobile phone numbers of 15 million Iranian users of the Telegram encrypted messaging app, and hacked the accounts of more than a dozen of them, security researchers say.The accounts were hacked through interception of SMS confirmation codes sent to the associated phone numbers, security researchers Claudio Guarnieri and Collin Anderson told Reuters.The revelations show once again how use of encryption can pit technology companies against governments. Telegram founder Pavel Durov has in the past sided with Apple CEO Tim Cook against the FBI on the question of whether governments should have access to the contents of smartphones.To read this article in full or to leave a comment, please click here

Iranian hacker group knows who is on Telegram

Hackers obtained the mobile phone numbers of 15 million Iranian users of the Telegram encrypted messaging app, and hacked the accounts of more than a dozen of them, security researchers say.The accounts were hacked through interception of SMS confirmation codes sent to the associated phone numbers, security researchers Claudio Guarnieri and Collin Anderson told Reuters.The revelations show once again how use of encryption can pit technology companies against governments. Telegram founder Pavel Durov has in the past sided with Apple CEO Tim Cook against the FBI on the question of whether governments should have access to the contents of smartphones.To read this article in full or to leave a comment, please click here

Juniper vMX Multicast Configuration

How does Internet work - We know what is networking

I’m fairly new to Juniper CLI. For one of my first tries, I decided to make my life difficult by starting with multicast configuration on virtual vMX routers running as VMs on VMware ESXi. It took a lot of investigation about some part of this configuration specially the tunnel interface which you will see below. I decided to put it here all in one place with the explanation of every step because Juniper documentation tends to assume that you know more than me. If that is not the case, this short description is for you. Here’s how the topology looks like. I have

Juniper vMX Multicast Configuration