IDG Contributor Network: What terrorism investigations can teach us about investigating cyber attacks

Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected events.This method is used by law enforcement agencies to investigate acts of terrorism, which, sadly, are happening more frequently. While terror attacks that have occurred in the physical world are making headlines, the virtual world is also under attack by sophisticated hackers. However, not much is said about the similarities between investigating both types of attacks or what security researchers can learn from their law enforcement counterparts. I’ve had this thought for awhile and, fearing that I’d be seen as insensitive to recent events, debated whether to write this blog. After much thought, I decided that the stakes are too high to remain silent and continue treating each breach as a one-off event without greater security implications.To read this article in full or to leave a comment, please click here

FAA doubles altitude limits for business drones

Looking to remove a little red tape from businesses and utilities that may want to use unmanned aircraft systems, the FAA today doubled the “blanket” altitude for certain drones to 400ft from 200 ft.Specifically the altitude increase is for FAA Section 333 exemption holders, or potential holders, which have typically been businesses, governmental or utilities looking to explore the drone applications.+More on Network World: DARPA: Show us how to weaponize benign technologies+Under the new blanket “Certificate of Waiver or Authorization,” the FAA will permit flights at or below 400ft for drone operators with a Section 333 exemption for aircraft weighing less than 55 pounds and for government unmanned operations. Operators must fly under existing daytime Visual Flight Rules, keep the drone within visual line of sight of the pilot and stay certain distances away from airports or heliports:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Half of Americans now stream video, says consultant

Streaming and binge watching have taken over from live television consumption among some demographics, a major consulting firm says.A significant 70% of American consumers overall “now binge watch an average of five episodes at a time,” says Deloitte in a press release about its 10th annual, and latest, Digital Democracy Survey (Summary PDF).Half of consumers (46%) now “subscribe to streaming video services,” the consultant says it’s found.To read this article in full or to leave a comment, please click here

If you care about your encrypted data, get rid of your iPhone 5c

If the FBI can hack the iPhone, others can, too, which means the encrypted content on countless phones is no longer secure. Owners of these phones who care about securing their content should think about upgrading to something else. Newer iPhones, for example, might not have the same weakness and so would be less vulnerable, at least for a while. The FBI has dropped its court action that might have forced Apple to help undermine security that blocked a brute-force attack against the passcode on the iPhone 5c used by a terrorist in San Bernardino. That’s because the FBI found someone else - reportedly Israeli mobile-forensics company Cellebrite – to do it for them.To read this article in full or to leave a comment, please click here

Reaction: Should routing react to the data plane?

Over at Packet Pushers, there’s an interesting post asking why we don’t use actual user traffic to detect network failures, and hence to drive routing protocol convergence—or rather, asking why routing doesn’t react to the data place.

I have been looking at convergence from a user perspective, in that the real aim of convergence is to provide a stable network for the users traversing the network, or more specifically the user traffic traversing the network. As such, I found myself asking this question: “What is the minimum diameter (or radius) of a network so that the ‘loss’ of traffic from a TCP/UDP ‘stream’ seen locally would indicate a network outage FASTER than a routing update?”

This is, indeed, an interesting question—and ones that’s highly relevant in our current software defined/drive world. So why not? Let me give you two lines of thinking that might be used to answer this question.

First, let’s consider the larger problem of fast convergence. Anyone who’s spent time in any of my books, or sat through any of my presentations, should know the four steps to convergence—but just in case, let’s cover them again, using a slide from my forthcoming LiveLesson on IS-IS:

Convergence Steps

There Continue reading

Georgia Tech awarded patent for dragonfly-inspired MAV

Well it’s springtime and if you are the type to embrace nature and hang out near freshwater, then you may see dragonflies. The next time you see one, consider that its robotic counterpart has finally been granted a patent.Wait, haven’t you seen dragonfly-like MAVs for years now? Probably. Georgia Tech Research Corporation filed the patent in 2012. At any rate, the patent says that in order for DARPA to consider an aerial vehicle as a MAV, it must be “smaller than 6 inches in any direction or must not have a gross takeoff weight greater than 100 grams” (about .22 pounds or roughly the same weight as 100 Skittles.)To read this article in full or to leave a comment, please click here

Sponsored Post: TechSummit, zanox Group, Varnish, LaunchDarkly, Swrve, Netflix, Aerospike, TrueSight Pulse, Redis Labs, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • The zanox Group are looking for a Senior Architect. We're looking for someone smart and pragmatic to help our engineering teams build fast, scalable and reliable solutions for our industry leading affiliate marketing platform. The role will involve a healthy mixture of strategic thinking and hands-on work - there are no ivory towers here! Our stack is diverse and interesting. You can apply for the role in either London or Berlin.

  • Swrve -- In November we closed a $30m funding round, and we’re now expanding our engineering team based in Dublin (Ireland). Our mobile marketing platform is powered by 8bn+ events a day, processed in real time. We’re hiring intermediate and senior backend software developers to join the existing team of thirty engineers. Sound like fun? Come join us.

  • Senior Service Reliability Engineer (SRE): Drive improvements to help reduce both time-to-detect and time-to-resolve while concurrently improving availability through service team engagement.  Ability to analyze and triage production issues on a web-scale system a plus. Find details on the position here: https://jobs.netflix.com/jobs/434

  • Manager - Performance Engineering: Lead the world-class performance team in charge of both optimizing the Netflix cloud stack and developing the performance observability capabilities Continue reading

US Federal Courts warn of aggressive scammers

The fraud and scam war rages. This week the Federal Courts warned of swindles involving people posing as federal court officials and U.S. Marshals targeting citizens, threatening them with arrest unless they pay some fake fine for failing to show up for jury duty .+More on Network World: What are grand technology and scientific challenges for the 21st century?+“This year’s scams are more aggressive and sophisticated than we’ve seen in years past,” says Melissa Muir, Director of Administrative Services for the U.S. District Court of Western Washington in a statement. “Scammers are setting up call centers, establishing call-back protocols and using specific names and designated court hearing times.”To read this article in full or to leave a comment, please click here

Docker at /Build

Every year, Microsoft welcomes thousands of developers to their /Build conference. This year, whether you’re attending live in San Francisco, or watching online, there will be lots of Docker at /Build. Building from the announcement last week of the beta for Docker for Mac … Continued

Control with Ansible Tower, Part 1

tower-control-series-screen.png

This is the first in a series of posts about how Ansible and Ansible Tower enable you to manage your infrastructure simply, securely, and efficiently.

When we talk about Tower, we often talk in terms of Control, Knowledge, and Delegation. But what does that mean?  In this series of blog posts, we'll describe some of the ways you can use Ansible and Ansible Tower to manage your infrastructure.

CONTROL - THE BASICS

The first step of controlling your infrastructure is to define what it is actually supposed to be. For example, you may want to apply available updates - here's a basic playbook that does that.

---
- hosts: all
  gather_facts: true
  become_method: sudo
  become_user: root
  tasks:
    - name: Apply any available updates
      yum:
        name: "*"
        state: latest
        update_cache: yes

Or you may have more detailed configuration. Here's an example playbook for basic system configuration.This playbook:

  • Configures some users

  • Installs and configures chrony, sudo, and rsyslog remote logging

  • Sets some SELinux parameters

Normally, we’d organize our configuration into Ansible roles for reusability, but for the purpose of this exercise we're just going to use one long playbook.

We'd want to apply this as part of our standard system configuration.

 Continue reading

Apple issues statement regarding DOJ suit: “This case should have never been brought”

The DOJ on Monday filed a brief seeking to vacate a previous court's ruling that would have required Apple to assist the FBI in hacking into a locked iPhone used by one of the San Bernardino shooters. The DOJ's motion seemingly brings to a conclusion a saga that has continued to make headlines since the story burst into the news a few weeks ago.According to the DOJ, the FBI no longer needs Apple's assistance because they managed to access the device's contents with the help of a third-party. While the identity of the third party was not revealed, it's been reported that the FBI received assistance from an Israeli software forensics company called Cellebrite. Whether that is true or not remains unknown, but we do know that the FBI did not receive any outside assistance from other government agencies like the NSA.To read this article in full or to leave a comment, please click here