Free Bitdefender tool prevents Locky, other ransomware infections, for now

Antivirus firm Bitdefender has released a free tool that can prevent computers from being infected with some of the most widespread file-encrypting ransomware programs: Locky, TeslaCrypt and CTB-Locker.The new Bitdefender Anti-Ransomware vaccine is built on the same principle as a previous tool that the company designed to prevent CryptoWall infections. CryptoWall later changed the way in which it operates, rendering that tool ineffective, but the same defense concept still works for other ransomware families.While security experts generally advise against paying ransomware authors for decryption keys, this is based more on ethical grounds than on a perceived risk that the keys won't be delivered.To read this article in full or to leave a comment, please click here

Arista takes aim at core router market with Universal Spine

The concept of using switching infrastructure as a replacement for a core router is certainly nothing new. Years ago, vendors like Foundry Networks and Force10 tried to make the case but were unsuccessful in their attempts. Although the switches were beefy and had massive port density they were missing some key features such as MPLS support, the ability to support a full Internet routing table and carrier class resiliency. From an economic perspective, the cost per port on a switch is about one-tenth what it is on a router, so there is a financial argument to be made but the products just didn’t have the technical chops to hang with big routers.Arista Networks is now taking a shot at this market again but is taking a significantly different approach to the market. Arista is attempting to disrupt the core router market by replacing the big boxes with a distributed spine, similar to the way the company disrupted the legacy data center switching market. Spine-Leaf configurations are well accepted today in big data centers and cloud providers but this wasn’t the case just a few years ago as there was a certain religion around big chassis deployed in multiple tiers. Continue reading

New York company profited by sending state records to India

A New York IT contractor "swelled its profits" by outsourcing government work offshore that should not have left the state. A major part of the work was sent to India in violation of state security rules, New York investigators said.The contractor, Focused Technologies Imaging Services in Albany County, was working under a $3.45 million contract to scan and index 22 million fingerprint cards maintained by the New York State Division of Criminal Justice Services.Focused Technologies, in turn, hired an India-based company that performed about 37% of the work and was paid $82,000.The fingerprint cards are associated with arrests and incarcerations, and with applications for jobs or licenses where a criminal history background check is required. The cards, which were all dated before 2009, contained sensitive data including signatures, Social Security numbers, physical characteristics and dates of birth. Focused Technologies employees were required to pass criminal background checks to work on it.To read this article in full or to leave a comment, please click here

The Universal Spine Is Born!

The rapid migration from enterprise to cloud, driven by the economics of scale, the convergence of local and wide-area networking (LAN-WAN), the migration from Fibre Channel to IP storage, the rise of analytics and the emergence of new cloud applications is dramatic. In the past two years, we have witnessed a massive shift in the way applications are built and deployed, moving away from legacy siloed infrastructure to seamless workload mobility. The demands of these new workloads change the way spine networks are reconstructed for cloud networking. As physical compute or storage silos evolve to support cloud applications, one can automate and provision the entire network to handle any workload, workflow or workstream, with real time agility.

Some other comments on the ISIS dead-drop system

So, by the time I finished this, this New York Times article has more details. Apparently, it really is just TrueCrypt. What's still missing is how the messages are created. Presumably, it's just notepad. It's also missing the protocol used. It is HTTP/FTP file upload? Or do they log on via SMB? Or is it a service like DropBox?

Anyway, I think my way is better for sending messages that I describe below:



Old post:

CNN is reporting on how the Euro-ISIS terrorists are using encryption. The details are garbled, because neither the terrorists, the police, or the reporters understand what's going on. @thegrugq tries to untangle this nonsense in his post, but I have a different theory. It's pure guesswork, trying to create something that is plausibly useful that somehow fits the garbled story.

I assume what's really going is this.

The terrorist is given a USB drive with the TrueCrypt software and an encrypted partition/file. The first thing the terrorist does is put the USB drive into a computer, run the TrueCrypt program, then mount the file/partition, entering a password. In other words, all you see on the USB drive is the directory "TrueCrypt", and a large Continue reading

Rolling Roots

In the world of public key cryptography, it is often observed that no private key can be a kept as an absolute secret forever. At some point keys need to be refreshed. And the root key of the DNS is no exception. Its time for this key to change.

Sad News: I’m Not Coming to Interop Las Vegas

Long story short: I burned out last autumn and still haven’t recovered.

I managed to find a replacement instructor for three of my workshops, so I hope they’ll still take place. I’m also working on other ways of delivering them to whoever is interested in an interactive live session.

To all the people who wanted to meet me in Las Vegas: I’m really sorry I’ll miss you. Interop was always a great place for interesting conversations and awesome workshop audiences.

GoBGP – A Control Plane Evolving Software Networking

If I have talked to you over the past year or two about networking, odds are I have mentioned a project to you called GoBGP. If we have spoken a lot, you are probably sick of me talking to you about GoBGP There is a reason, it’s because GoBGP is a missing link in networking that has been for a ... The post GoBGP – A Control Plane Evolving Software Networking appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Comments on the FBI success in hacking Farook’s iPhone

Left-wing groups like the ACLU and the EFF have put out "official" responses to the news the FBI cracked Farook's phone without help from the Apple. I thought I'd give a response from a libertarian/technologist angle.

First, thank you FBI for diligently trying to protect us from terrorism. No matter how much I oppose you on the "crypto backdoors" policy question, and the constitutional questions brought up in this court case, I still expect you to keep trying to protect us.

Likewise, thank you FBI for continuing to be open to alternative means to crack the phone. I suppose you could've wrangled things to ignore people coming forward with new information, in order to pursue the precedent, in the longer term policy battle. I disagree with the many people in my Twitter timeline who believe this was some sort of FBI plot -- I believe it's probably just what the FBI says it is: they first had no other solution, then they did.

Though, I do wonder if the FBI's lawyers told them they would likely lose the appeal, thus setting a bad precedent, thus incentivizing the FBI to start looking for an alternative to get out of the case. Continue reading

Large US healthcare provider’s network shut down by malware

A large healthcare provider in the Washington, D.C., area said it has resorted to paper transactions after malware crippled part of its network early Monday.MedStar Health, a not-for-profit that runs 10 hospitals, said its clinical facilities were functioning and that it did not appear data had been compromised. The malware prevented "certain users from logging into our system.""MedStar acted quickly to prevent the virus from spreading throughout the organization," it said in a statement posted on Facebook. "We are working with our IT and cybersecurity partners to fully assess and address the situation."To read this article in full or to leave a comment, please click here

LACP is not Link Aggregation

So there’s a mistake I’ve been making, for years. I’ve referred to what is link aggregation as “LACP”.  As in “I’m setting up an LACP between two switches”. While you can certainly set up LACP between to switches, the more correct term for the technology is link aggregation (as defined by the IEEE), and an instance of that is generically called a LAG (Link Aggregation Group). LACP is an optional part of this technology.

Here I am explaining this and more in an 18 minute Youtube video.


FireEye says hackers are racing to compromise POS systems

Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.More than a dozen types of malware were found last year that target point-of-sale systems, the electronic cash registers the process payments at many retailers.Over the last few years, hackers have successfully breached the systems, targeting weaknesses or software vulnerabilities in order to extract card details to sell on the black market.As of last October, retailers are liable for fraudulent transactions that are not completed using EMV payment cards, which have a microchip and enhanced security defenses that better shield card data.  To read this article in full or to leave a comment, please click here

Configuring Macvlan and Ipvlan Linux Networking

Macvlan and Ipvlan are both Linux type networking interfaces that are both supported by the Linux kernel. They are unique for a few different reasons. One thing that makes them both very attractive is they do not use bridges in their implementation and natively namespace aware. It solves some painful problems such as getting access to a gateway from a ... The post Configuring Macvlan and Ipvlan Linux Networking appeared first on NetworkStatic | Brent Salisbury's Blog.

...

DOJ cracks San Bernardino shooter’s iPhone

The U.S. government has managed to access the iPhone used by San Bernardino gunman Syed Rizwan Farook, bypassing a passcode that had the FBI stymied for several weeks. "The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple," the Department of Justice said in a court filing on Monday. The filing didn’t detail the method used to access the phone, but U.S. Attorney Eileen M. Decker said in a statement that it had been accomplished with the help of a third party.To read this article in full or to leave a comment, please click here

Going to IETF 95? Join the TLS 1.3 hackathon

If you’re in Buenos Aires on April 2-3 and are interested in building, come join the IETF Hackathon. CloudFlare and Mozilla will be working on TLS 1.3, the first new version of TLS in eight years!

At the hackathon we’ll be focusing on implementing the latest draft of TLS 1.3 and testing interoperability between existing implementations written in C, Go, OCaml, JavaScript and F*. If you have experience with network programming and cryptography, come hack on the latest and greatest protocol and help find problems before it is finalized. If you’re planning on attending, add your name to the Hackathon wiki. If you can’t make it, but implementing cryptographic protocols is your cup of tea, apply to join the CloudFlare team!

We’re very excited about TLS 1.3, which brings both security and performance improvements to HTTPS. In fact, if you have a client that speaks TLS 1.3 draft 10, you can read this blog on our TLS 1.3 mirror: tls13.cloudflare.com.

We hope to see you there!