Application-layer DDoS attacks will increase, Kaspersky Labs predicts

Monday is still the busiest day of the week for DDoS attacks, with Thursday replacing Tuesday as the second most-active day.According to Kaspersky Lab’s DDoS intelligence report covering the first quarter of 2016, 74 countries were targeted by DDoS attacks, with China, South Korea and the the United States as the top three most-targeted countries. There was slight drop in the percentage of attacks targeting resources in the U.S.SYN, TCP and HTTP were the top three most-popular DDoS attack methods in Q1.To read this article in full or to leave a comment, please click here

Application-layer DDoS attacks will increase, Kaspersky Labs predicts

Monday is still the busiest day of the week for DDoS attacks, with Thursday replacing Tuesday as the second most-active day.According to Kaspersky Lab’s DDoS intelligence report covering the first quarter of 2016, 74 countries were targeted by DDoS attacks, with China, South Korea and the the United States as the top three most-targeted countries. There was slight drop in the percentage of attacks targeting resources in the U.S.SYN, TCP and HTTP were the top three most-popular DDoS attack methods in Q1.To read this article in full or to leave a comment, please click here

Kaspersky predicts application-layer DDoS attacks will increase

Monday is still the busiest day of the week for DDoS attacks with Thursday replacing Tuesday as the second most active day.According to Kaspersky Lab’s DDoS intelligence report covering the first quarter of 2016, 74 countries were targeted by DDoS attacks, with China, South Korea and the USA as the top three most-targeted countries. There was slight drop in the percentage of attacks targeting resources in the USA.SYN, TCP and HTTP were the top three most popular DDoS attack methods in Q1. Kaspersky Lab's Q1 2016 DDoS Intelligence Report Most botnet attacks are launched from Windows, 55.5% in Q1 2016, compared to 44.5% being Linux-based attacks. South Korea still has the most C&C servers, followed by China, “other,” USA, Russia, a tie by Great Britain and the Netherlands, followed by France.To read this article in full or to leave a comment, please click here

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.The tools have been made to give less tech-savvy members of terror groups the ability to use known technologies without having to trust or invest in commercial products that can perform the same functions, the report says.Some of the tools are still being updated, indicating an active development community among the terrorists.To read this article in full or to leave a comment, please click here

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.The tools have been made to give less tech-savvy members of terror groups the ability to use known technologies without having to trust or invest in commercial products that can perform the same functions, the report says.Some of the tools are still being updated, indicating an active development community among the terrorists.To read this article in full or to leave a comment, please click here

IDG Contributor Network: ExtraHop broadens its monitoring further across hybrid environments

ExtraHop is a vendor that offers real-time stream analytics for data in motion. That's a fancy-schmancy way of saying ExtraHop analyzes communication across the network to give visibility into application performance, availability and security. ExtraHop is an agent-less, appliance-based offering that promises cross-tier visibility.Given this message of visibility across geographically distributed operations, and across multiple infrastructure providers, it is perhaps unsurprising to see ExtraHop today announce the availability of extended public cloud monitoring functionality to now include Microsoft Azure (alongside the existing Amazon Web Services). On top of the Azure extension, ExtraHop is extending its offering to support branch offices to benefit geographically dispersed organizations.To read this article in full or to leave a comment, please click here

VMware NSX: From Turning Point to Tipping Point

I’m very excited that I get the opportunity to report on another exceptional quarter for VMware NSX. As a company, we’re demonstrating that NSX will be an important growth driver for the foreseeable future. We added more than 200 new NSX customers in the quarter, and have more than 120 customers that have spent more than $1M on NSX. Organizations such as Shutterfly, TriZetto, Riverside County, and Royal Bank of Scotland are all making commitments to NSX as a foundational part of their IT future. Production deployments also continued to accelerate. We have more than 340, and in Q1 added the equivalent of one new NSX production deployment each day.

NSX is, indisputably, the leading software network overlay. NSX is proving equally valuable across all hardware underlays. Most notably, we’re starting to see customer proof points of something we’ve said all along – VMware NSX and Cisco ACI can be successfully deployed in the same environment to address different pain points. Just look at customers such as Sugar Creek and Hutto ISD; even the channel recognizes this as reported by CRN.

Executing On the NSX Plan, Reaching the Turning Point

The plan for growing NSX in the market was very Continue reading

EMC’s latest VCE nodes aim to make clouds easy

One way to get enterprises and service providers to adopt cloud infrastructure is to make it easier to set up and use. That’s what EMC is doing with Neutrino, a new type of hardware-software node for the VCE VxRack platform.The VxRack System 1000 with Neutrino nodes can run any workload on any node in the rack, and on any of several cloud software stacks. If OpenStack is best for one job, Hadoop is best for another, and VMware Photon is ideal for a third application, each can run on the appropriate stack. As long as there’s capacity somewhere in the rack, it doesn’t matter where each is hosted.“It allows any of the hardware in the nodes to be provisioned to any software stack,” said Jeremy Burton, EMC’s president of products and marketing. This will help enterprises and service providers deliver IaaS (infrastructure as a service) to their users and customers.To read this article in full or to leave a comment, please click here

NYC scowls at LTE-U in open letter

The City of New York became the latest entity to weigh in on the subject of LTE-U, as an open letter from the mayor’s office to policymakers at the 3GPP standards body pushes for thorough protection for existing Wi-Fi.LTE-U, a carrier technology designed to take the load off of existing networks by using the unlicensed frequency bands where Wi-Fi lives, has provoked widespread concerns about interference and disruption. The technology’s inventors, Qualcomm and Ericsson, and the carriers have insisted that LTE-U contains features that will enable it to co-exist peacefully with Wi-Fi, but many others, from the cable industry to Google and Microsoft, have expressed serious doubts.To read this article in full or to leave a comment, please click here

Gotchas to configuring Calico with Docker

© Calico project - Metaswitch
Setting up Calico with Docker has been documented with step-by-step commands on the Calico github page and I will not be repeating them here again. I am going to use this as a scratch pad for the gotchas that I learnt from following that article on github. I hope it helps some of you.

Docker networking has seen a lot of improvements both in the native libnetwork library as well as other projects & solutions. Docker container networking especially across two physical hosts is an interesting problem with various solutions out there with their own pros and cons. You could go with flannel, a L2 overlay, VXLAN overlay to facilitate multi-host container networking or choose a pure L3-only solution like Calico. Speaking of the various choices for container networking I came across this article that compares the network glue : underlay/ overlay solutions using different parameters. Feel free to check that out if you want to get an idea into what each of these (VXLAN, flannel & Calico) offer but then of course making your own comparisons and benchmarks will not only provide with the differences/features you are looking for but also Continue reading

Containers: Most developers still don’t understand how to use them

Nine out of 10 developers are likely or very likely to boost their use of containerized applications in the coming year, according to a new survey of 300 developers by Shippable.“Companies are realizing the productivity and flexibility gains they were expecting, and use of container technology is clearly on the rise,” said Shippable CEO Avi Cavale in a statement.Those are optimistic words, and almost 90 percent seems like a strong vote of confidence for containers such as Docker and others, validating the intense hype the technology has generated in the last couple years. Perhaps that’s why more than half of developers (52 percent) told Shippable, which sells a continuous delivery platform, they already use containers in production, at least for new applications.To read this article in full or to leave a comment, please click here

25 Mother’s Day gifts with geek appeal

Not the same old flowers, chocolate and jewelryThis isn’t a gadget-heavy list of Mother’s Day gift ideas. It’s a collection of gifts inspired by science, technology, engineering and math. The tech quotient is low, but the design bar is high. Each of these gifts shows how artists, craftspeople and industrial designers can put a geeky spin on the usual jewelry, flowers and accessories.To read this article in full or to leave a comment, please click here

25 Mother’s Day gifts with geek appeal

Not the same old flowers, chocolate and jewelryThis isn’t a gadget-heavy list of Mother’s Day gift ideas. It’s a collection of gifts inspired by science, technology, engineering and math. The tech quotient is low, but the design bar is high. Each of these gifts shows how artists, craftspeople and industrial designers can put a geeky spin on the usual jewelry, flowers and accessories.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Who will manage IoT in the enterprise?

Most IT departments throughout enterprises are about to relinquish control of the Internet of Things, a research firm says.IoT will not generally be managed by IT, reckons Bob O’Donnell. His company, TECHnalysis Research, recently completed an online study about which department will be running IoT within organizations.Surprisingly, operations, facilities and manufacturing was the principal selection, the researcher found (with 42 percent). It will be the “most common department to be responsible for IoT projects,” O’Donnell says.To read this article in full or to leave a comment, please click here