5 tips for defending against advanced persistent threats

The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.APTs are highly organized, sometimes with a complete staff, and have plenty of monetary and technological resources. Although APTs may use common hacker tools, they more often employ sophisticated, customized software that's less likely to be picked up by a security protection system. Types of APTs or delivery mechanisms include zero-day attacks, phishing, advanced malware and a variety of Web compromises.To read this article in full or to leave a comment, please click here(Insider Story)

5 tips for defending against advanced persistent threats

The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.To read this article in full or to leave a comment, please click here(Insider Story)

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all.Phishing emails continued to be a primary starting point for attacks, said Bryan Sartin, executive director, global security services at Verizon.The number of phishing email messages that were opened hit 30 percent in this year's report, up from 23 percent last year.In addition, 12 percent of users don't just open the email but open the attachment as well, while 11 percent follow links in the email to online forms where they then input sensitive data such as login credentials.To read this article in full or to leave a comment, please click here

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all.Phishing emails continued to be a primary starting point for attacks, said Bryan Sartin, executive director, global security services at Verizon.The number of phishing email messages that were opened hit 30 percent in this year's report, up from 23 percent last year.In addition, 12 percent of users don't just open the email but open the attachment as well, while 11 percent follow links in the email to online forms where they then input sensitive data such as login credentials.To read this article in full or to leave a comment, please click here

Dropbox wants to stretch desktop file storage to infinity

Dropbox has a futuristic vision for how its users will be able to share massive files and have quick access to them on their computers, without their hard drives overflowing.The cloud storage company announced a new initiative at its Open conference in London on Tuesday called Project Infinite. It's a push to create a new Dropbox interface that allows users to see all of the files they've stored in the cloud in their computer's file explorer without requiring them to keep local copies of each document, image, spreadsheet or other file. With Project Infinite, users will be able to manage their files in the cloud by moving them around inside the Mac OS X Finder or Windows File Explorer, just like they would any local files that are taking up space on their hard drives.To read this article in full or to leave a comment, please click here

OpenStack and Amazon’s cloud: Friends or foes?

Four years ago tensions between OpenStack and Amazon Web Services were at a high. The open source cloud computing platform was being developed as an alternative to AWS’s and members of the community spoke despairingly about the public cloud behemoth. Fast-forward to today, and the relationship between these two cloud platforms seems quite undefined.To read this article in full or to leave a comment, please click here

Nokia to buy connected health gadgets firm Withings for $191 million

Nokia is paying 170 million euros (US$191 million) to acquire French fitness gadgets company Withings in a bid to get into the digital health market.For the Espoo, Finland company, which sold its handset business to Microsoft two years ago, and has been since mainly in the area of selling telecom equipment, the acquisition marks a strong push into connected healthcare and home products, ranging from activity trackers, weighing scales, thermometers, blood pressure monitors, and home and baby monitors.Nokia's brand, which is still well-regarded in many consumer markets, may aid the company as it enters new segments and starts what it describes as a "new chapter."To read this article in full or to leave a comment, please click here

Optimize Your Data Center: Virtualize Your Servers

A month ago I published the video where I described the idea that “two switches is all you need in a medium-sized data center”. Now let’s dig into the details: the first step you have to take to optimize your data center infrastructure is to virtualize all servers.

For even more details, watch the Designing Private Cloud Infrastructure webinar, or register for the Building Next-Generation Data Center course.

BetterBack: How to fix your bad back

There’s one activity that dominates the athletic activities of pretty much everyone in IT and that activity is inactivity. Whether it’s in a car seat, a train, a bus, or in front of a computer, most of us are locked into a chair for 6 or more hours every day and what does this cost us? Along with all of the other health consequences (heart disease, muscle degeneration, strained necks, limp glutes (yewww), tight hips, … I could go on but it's pretty gruesome), sitting for long periods of time ruins our backs. We sit there every day squinting at our screens, slumped into postures that nature never intended us to hold for hours at a time then we wonder why we ache.To read this article in full or to leave a comment, please click here

For the remotest IoT gear, cellular and satellite are coming together

Many enterprises are looking to the Internet of Things to monitor and control assets they can't physically reach. Building networks that can cover all those assets is one of the big challenges of industrial IoT.Cellular networks cover people well, at least in developed countries, but total land area not as well. LPWANs (low-power wide-area networks) are emerging as an alternative for reaching endpoints over longer distances, thanks to their lower speed and power levels and designs optimized for IoT. But for truly global connectivity, satellite is really the only game in town. (And, more importantly, far out of town.)To read this article in full or to leave a comment, please click here

For the remotest IoT gear, cellular and satellite are coming together

Many enterprises are looking to the Internet of Things to monitor and control assets they can't physically reach. Building networks that can cover all those assets is one of the big challenges of industrial IoT.Cellular networks cover people well, at least in developed countries, but total land area not as well. LPWANs (low-power wide-area networks) are emerging as an alternative for reaching endpoints over longer distances, thanks to their lower speed and power levels and designs optimized for IoT. But for truly global connectivity, satellite is really the only game in town. (And, more importantly, far out of town.)To read this article in full or to leave a comment, please click here

OpenStack cloud’s “killer use case”: Telcos and NFV

AUSTIN, Texas – Today, 114 petabytes of data traverse AT&T's network daily, and the carrier predicts a 10x increase in traffic by 2020. To help manage this, AT&T is transitioning from purpose-built appliances to white boxes running open source software. And according to AT&T Senior Vice President of Software Development and Engineering Sarabh Saxena, OpenStack has been a key part of this shift.+MORE AT NETWORK WORLD: OpenStack Director: Why open source should be the core of your cloud | Cool products from OpenStack Summit +To read this article in full or to leave a comment, please click here

55% off Wansview Wireless IP Security Camera – Deal Alert

This security camera from Wansview currently averages 4 out of 5 stars from 180 reviewers on Amazon (read reviews). It lists for $199.99, but with the current 55% discount you save $110 and can buy it for just $89.99.The unit has clarity up to 1920x1080, and and SD card slot (max 64GB supported) for video recording and playback. Horizontal 340 degree and vertical 90degree pan & tilt capability. 4x digital zoom, and IR LED night vision up to 26 feet. It also features a built-in mic and speaker for 2-way audio communication and connects easily to your smartphone for remote viewing. If enabled, it can send pictures or video when motion is detected.  See this feature-packed IP camera on Amazon and review buying options.To read this article in full or to leave a comment, please click here

Better SWIFT software design would have thwarted Bangladesh Bank cyber heist

In February, attackers tried to steal $951 million using the SWIFT bank transfer system by submitting transfer requests from the Central Bank of Bangladesh to the Federal Reserve Bank of New York. Before the cyber heist was detected, attackers got away with $81 million by routing and laundering the funds through a bank account in the Philippines. Most of the transfers were thwarted for an unexplained reason.Reuters reported the details of the cyber heist based on an interview with defense contractor and security researcher BAE Systems. It wasn’t clear if BAE Systems worked independently, for SWIFT or for the Bangladesh Bank. The report exposes that the SWIFT software has the same design flaws as the Target point-of-sale (POS) system. Both imprudently relied on the assumption of an impenetrable perimeter for security.   The fault appears to be SWIFT’s—if BAE is correct in its report that “the malware registers itself as a service and operates within an environment running SWIFT’s Alliance software suite, powered by an Oracle Database.”To read this article in full or to leave a comment, please click here

Better SWIFT software design would have thwarted Bangladesh Bank cyber heist

In February, attackers tried to steal $951 million using the SWIFT bank transfer system by submitting transfer requests from the Central Bank of Bangladesh to the Federal Reserve Bank of New York. Before the cyber heist was detected, attackers got away with $81 million by routing and laundering the funds through a bank account in the Philippines. Most of the transfers were thwarted for an unexplained reason.Reuters reported the details of the cyber heist based on an interview with defense contractor and security researcher BAE Systems. It wasn’t clear if BAE Systems worked independently, for SWIFT or for the Bangladesh Bank. The report exposes that the SWIFT software has the same design flaws as the Target point-of-sale (POS) system. Both imprudently relied on the assumption of an impenetrable perimeter for security.   The fault appears to be SWIFT’s—if BAE is correct in its report that “the malware registers itself as a service and operates within an environment running SWIFT’s Alliance software suite, powered by an Oracle Database.”To read this article in full or to leave a comment, please click here

US Marshals set to auction fraudster’s $1.5M high-end auto collection

It might have been a pretty nice life for Thomas Hauk -- for a while anyway -- but frauds usually explode and this one was nothing different.The US Marshals this week announced the auction of the Hauk’s spoils -- 25 vehicles, including Ferrari, Mclaren, BW and Porche cars worth more than $1.5 million.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

US Marshals set to auction fraudster’s $1.5M high-end auto collection

It might have been a pretty nice life for Thomas Hauk -- for a while anyway -- but frauds usually explode and this one was nothing different.The US Marshals this week announced the auction of the Hauk’s spoils -- 25 vehicles, including Ferrari, Mclaren, BW and Porche cars worth more than $1.5 million.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here