SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

Apple running a secret car design lab in Germany, report claims

Rumors of Apple's interest in developing an electric car have persisted for months now. Over the last 12 months, we've heard rumblings that Apple's car development team is almost 1,000 engineers and researchers deep. What's more, it's no secret that Apple has poached a number of employees from high-end luxury automakers such as BMW, Porsche, and of course Tesla.Now whether or not an Apple Car actually sees the light of day is another matter altogether, but it's impossible to ignore that Apple is seriously exploring such a possibility. The latest report about Apple's car plans comes to us courtesy of the German-language Frankfurter Allgemeine Zeitung (F.A.Z) which relays that Apple has a secret auto-oriented research facility in Germany where a team of 15-20 employees with deep experience across all facets of the car design and manufacturing process come up with new and interesting ideas. Specifically, the employees are said to be "progressive thinkers" with backgrounds in engineering, software and hardware design, and sales.To read this article in full or to leave a comment, please click here

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Making a docker container for a Flask application

Recently I presented to you a project called PLAZA which basically serves as a Web UI for python scripts. It was a pleasure to see that this project was welcomed well and some folks even asked how they can get PLAZA to play with. My fault, I wanted to release it so bad that I missed

Using OpenSwitch Appliance With GNS3

Note: This article was originally published here.

Update:This post has been updated to account for some recent changes in the appliance configuration (support for up to 7 front ports). In my previous post I described my developer setup to work with OpenSwitch. At the end of my post I showed how to download the build system, and configure and build an ‘appliance’ image.

What Is An OpenSwitch Appliance?

The appliance is a virtual machine image (in OVA format) that could be run on VirtualBox or VMware (on this articule I will focus on VirtualBox) and provides a software datapath (based in OVS right now, but P4 support it’s landing soon). All the rest of the OpenSwitch stack is the same that you will see in a real hardware, and obviously the software datapath has certain limitations and features not implemented.

Despite his limitations, the appliance is a really nice way to get your hands into OpenSwitch without having real hardware.

If you are using the development environment, you can find the appliance .ova file on the images directory after completing the build, but otherwise you can also download a periodic image from the project archives (keep in mind Continue reading

Here’s what the new Intel will look like

The PC market has been in trouble for ages, but last year took the biscuit. Shipments dropped below 300 million for the first time since 2008, and IDC declared it the worst year in history. That explains a lot about what happened at Intel this week.The chip maker has been reducing its dependency on PCs for some time, preferring to focus on its more successful data center business. But the announcement that it would lay off 12,000 people is a sign that Intel is finally turning a corner.To read this article in full or to leave a comment, please click here

Magic Leap adds virtual reality head-tracking and possibly hand-tracking

A second demonstration of mega-venture Magic Leap’s virtual reality technology indicates that head-tracking has been added and possibly hand-tracking.Head-tracking, which wasn’t shown in the only other demonstration that happened over a year ago, lets a person move around a hologram to see it from different sides. Hand-tracking, which is a mouse-like metaphor interface that lets people interact with virtual objects using hand movements, also seems to have been added. The report also hints at the principals behind how Magic Leap’s virtual reality works. Wired reported on Kevin Kelly’s visit to Magic Leap in Fort Lauderdale, Florida, to experience the second public demonstration of the company’s version of virtual reality that it calls mixed reality (MR). A comparison of the Wired story with one written by Rachel Metz over a year ago for the MIT Technology Review measures Magic Leap’s progress.To read this article in full or to leave a comment, please click here

Software-Defined Networks .. A Primer

SDN, Software-Defined Networking, the trending technology that some friends/colleagues of mine like to refer to it as “Still Does Nothing”. Let’s see if it does some thing. SDN has been a market hype for few years now.  Out of laziness, I ignored it in the beginning then I had to catch up a bit later …

The post Software-Defined Networks .. A Primer appeared first on Networkers-online.com.

IDG Contributor Network: Bugs for cash: Bounty hunters in the new wild west of security

The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly that unscrupulous bounty hunters can take advantage of if they successfully identify a vulnerability.The average cost of a data breach is $3.8 million, according to research by the Ponemon Institute. It’s not hard to understand why so many companies are now stumping up bounties. It can also be very difficult, time consuming and expensive to root out bugs and flaws internally. Turning to the wider security community for help makes a lot of sense, and where there’s need there’s a market.  To read this article in full or to leave a comment, please click here

IDG Contributor Network: Bugs for cash: Bounty hunters in the new wild west of security

The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly that unscrupulous bounty hunters can take advantage of if they successfully identify a vulnerability.The average cost of a data breach is $3.8 million, according to research by the Ponemon Institute. It’s not hard to understand why so many companies are now stumping up bounties. It can also be very difficult, time consuming and expensive to root out bugs and flaws internally. Turning to the wider security community for help makes a lot of sense, and where there’s need there’s a market.  To read this article in full or to leave a comment, please click here

Wi-Fi offloading breakthrough nets Korean researchers second major IEEE networking award

This year's IEEE Communications Society William R. Bennett Prize, known as the most honored award for papers in the networking communications field, goes to a Korean team for its breakthrough research on offloading data traffic from cellular networks to Wi-Fi.The award recognizes the work of Professor Kyunghan Lee  from the School of Electrical and Computer Engineering of Ulsan National Institute of Science and Technology (UNIST); Prof. Yi Yung, Prof. Chong Song, and Dr. Joohyun Lee of Electrical and Computer Engineering at KAIST; and Executive Vice President Injong Rhee of Samsung Electronics, Mobile Division.To read this article in full or to leave a comment, please click here

Wi-Fi offloading breakthrough nets Korean researchers second major IEEE networking award

This year's IEEE Communications Society William R. Bennett Prize, known as the most honored award for papers in the networking communications field, goes to a Korean team for its breakthrough research on offloading data traffic from cellular networks to Wi-Fi.The award recognizes the work of Professor Kyunghan Lee  from the School of Electrical and Computer Engineering of Ulsan National Institute of Science and Technology (UNIST); Prof. Yi Yung, Prof. Chong Song, and Dr. Joohyun Lee of Electrical and Computer Engineering at KAIST; and Executive Vice President Injong Rhee of Samsung Electronics, Mobile Division.To read this article in full or to leave a comment, please click here

First Wave of Pascal GPUs Coming to European Supercomputer

There are few international supercomputing hubs sporting the systems and software prowess of the Swiss National Supercomputing Center (CSCS), which started with large-scale vector machines in 1992 and moved through a series of other architectures and vendors; from NEC at the beginning, to IBM, and most recently, Cray. In fact, the center has had an ongoing preference for Cray supercomputers, with an unbroken stretch of machines beginning in 2007.

In addition to choosing Cray as the system vendor, CSCS has been an early adopter and long-term user of GPU acceleration. According to the center’s director, Thomas Schulthess, teams there firmed

First Wave of Pascal GPUs Coming to European Supercomputer was written by Nicole Hemsoth at The Next Platform.

JP Morgan: “Monumental” shift of enterprise workloads to the cloud

A new report from JP Morgan quantifies just how significant the enterprise shift to the cloud has become.The Wall Street giant queried 207 CIOs who have budgets of more than $600 million to find that 16.2% of the workloads under management by the CIOs run in the public cloud and within five years, 41.3% are expected to.+MORE AT NETWORK WORLD: IDC: The cloud is eating legacy systems +We don’t normally put too much stock in surveys, but this one caught our eye because of who administered and took the survey.To read this article in full or to leave a comment, please click here