IDG Contributor Network: Rip up the script when assembling a modern security team

The advanced threats companies face require security teams have different characteristics than the backgrounds analysts typically have. However, most businesses hire security practitioners who have similar professional backgrounds and capabilities. Analysts usually have IT backgrounds, are taught to quickly resolve threats and work in an environment that doesn’t embrace speaking out when there’s a security incident.The adversaries, meanwhile, have a more evolved perspective on how to carry out hacking campaigns. Attack operations often include people who have a range of experiences. For example, to hack a bank, attackers will hire hacking experts as well as someone with deep knowledge about the financial services industry. Hacking teams often employ experts who have various technical capabilities to help them approach attacks in different ways and switch gears if one tactic isn’t working. Hackers realize that a more diverse team—and the mindset it brings—increases the likelihood of the attack’s success.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Rip up the script when assembling a modern security team

The advanced threats companies face require security teams have different characteristics than the backgrounds analysts typically have. However, most businesses hire security practitioners who have similar professional backgrounds and capabilities. Analysts usually have IT backgrounds, are taught to quickly resolve threats and work in an environment that doesn’t embrace speaking out when there’s a security incident.The adversaries, meanwhile, have a more evolved perspective on how to carry out hacking campaigns. Attack operations often include people who have a range of experiences. For example, to hack a bank, attackers will hire hacking experts as well as someone with deep knowledge about the financial services industry. Hacking teams often employ experts who have various technical capabilities to help them approach attacks in different ways and switch gears if one tactic isn’t working. Hackers realize that a more diverse team—and the mindset it brings—increases the likelihood of the attack’s success.To read this article in full or to leave a comment, please click here

Phishing apps posing as popular payment services infiltrate Google Play

Google's efforts to police the Android app store -- Google Play -- are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.Researchers from security firm PhishLabs claim that they've found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies' websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don't see their actual location.To read this article in full or to leave a comment, please click here

Phishing apps posing as popular payment services infiltrate Google Play

Google's efforts to police the Android app store -- Google Play -- are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.Researchers from security firm PhishLabs claim that they've found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies' websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don't see their actual location.To read this article in full or to leave a comment, please click here

IDG Contributor Network: School district repurposes buses as Wi-Fi hotspots

A poverty-stricken school district in Southern California has come up with a novel way to alleviate the lack of internet access for kids in its catchment area. It’s repurposing school buses as internet hotspots.The school buses are parked overnight in impoverished areas where hard-wired broadband Internet access isn’t usually available and students aren’t able to access the internet. Most of the school district’s students reside in stone-broke rural areas and/or reservations.All of the children in the vast, 1,220-square-mile school district qualify for reduced-priced or free meals, says the Office of Educational Technology (OET). And almost half of the students are English-language learners.To read this article in full or to leave a comment, please click here

VMware cloud boss to leave

Bill Fathers, the former executive of Savvis who has been leading VMware’s hybrid cloud efforts for the past three years, is leaving the company. LinkedIn VMware EVP and GM of Cloud Services Bill Fathers is leaving the company VMware confirmed the news that was first reported by Fortune.+MORE AT NETWORK WORLD: Microsoft, Google sweeten their cloud freebies | OpenStack then vs. now +To read this article in full or to leave a comment, please click here

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.The proposed move had been criticized by civil rights groups and companies like Google that said it threatened to undermine the privacy rights and computer security of Internet users.The top court has approved changes to the Federal Rule of Criminal Procedure , including Rule 41, which with some exceptions prohibits a federal judge from issuing a search warrant outside of the judge’s district. The change in the rule was proposed by the Advisory Committee on the Rules of Criminal Procedure at the request of the Department of Justice .To read this article in full or to leave a comment, please click here

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.The proposed move had been criticized by civil rights groups and companies like Google that said it threatened to undermine the privacy rights and computer security of Internet users.The top court has approved changes to the Federal Rule of Criminal Procedure , including Rule 41, which with some exceptions prohibits a federal judge from issuing a search warrant outside of the judge’s district. The change in the rule was proposed by the Advisory Committee on the Rules of Criminal Procedure at the request of the Department of Justice .To read this article in full or to leave a comment, please click here

HELLO, WORLD

Welcome to Cloud Packet! I’m Shakib Shaygan, a full-time blogger and network engineer who has been designing and building networks for over 6 years now. I recently completed the CCIE lab to earn CCIE #46559 (Routing and Switching & Data Center), besides that I have some knowledge of open source and other networking product such as Juniper & Brocade.

As for a bit of background, I’ve worked as a normal IT Support, help desk, and currently as a network researcher, focusing on SDN for Telco. Currently I’m looking forward to doing some research, learning, and writing on a variety of networking-oriented topics. Look for a series of posts related to the CCIE Data Center experience as well as any other interesting topic which I encounter.

One of the reasons that I start this blog was to have a base that I can share my notes, as usually I write down everything that I learn because we are human and we will forget most of them for sure.

Ebbinghaus Forgetting curve

Information is lost over time when there is no attempt to retain it. That's almost same condition with every human which follow simple rules, the more you repeat this Continue reading

HELLO, WORLD

Welcome to Cloud Packet! I’m Shakib Shaygan, a full-time blogger and network engineer who has been designing and building networks for over 6 years now. I recently completed the CCIE lab to earn CCIE #46559 (Routing and Switching & Data Center), besides that I have some knowledge of open source and other networking product such as Juniper & Brocade.

As for a bit of background, I’ve worked as a normal IT Support, help desk, and currently as a network researcher, focusing on SDN for Telco. Currently I’m looking forward to doing some research, learning, and writing on a variety of networking-oriented topics. Look for a series of posts related to the CCIE Data Center experience as well as any other interesting topic which I encounter.

One of the reasons that I start this blog was to have a base that I can share my notes, as usually I write down everything that I learn because we are human and we will forget most of them for sure.

Ebbinghaus Forgetting curve

Information is lost over time when there is no attempt to retain it. That's almost same condition with every human which follow simple rules, the more you repeat this Continue reading

Massive growth shows why Amazon is the public cloud leader

Amazon showed off its dominance in the public cloud market on Thursday as the capstone to a better than expected quarterly earnings report.Revenue from Amazon Web Services during the first quarter of 2016 was up 64 percent year-over-year, showing the big money that's still out there as companies invest more and more in the public cloud. Amazon's cloud platform generated revenue of $2.56 billion, putting it on pace to make $10 billion this year, in line with a letter from CEO Jeff Bezos sent to shareholders earlier this month. That's big money to go with Amazon's massive customer base, which includes names like Netflix, Time Inc., and Intuit. To read this article in full or to leave a comment, please click here