Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw.The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday.The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier."Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said.A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ouch, Red Hat gets a slapping. Volkswagen chooses Mirantis for its OpenStack needs

To understand the context here readers need a bit of history. RedHat is, of course, a company that has been wildly successful commercializing open source software (in particular Linux). It is also a big part of the OpenStack open source cloud computing initiative. Mirantis is a company focused solely on helping companies move to OpenStack. These two parties were once upon a time best of friends with Red Hat making a significant investment early in Mirantis' life. And then things soured, to the point where Red Hat started telling customers that it didn't support its own Linux distribution, RHEL, on Mirantis' flavor of OpenStack. There was lots of back and forth, and lots of minutiae around the move, but essentially it indicated, very publicly, that Red Hat and Mirantis' bromance was finished forever.To read this article in full or to leave a comment, please click here

Server software poses soft target for ransomware

An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.A type of ransomware called Samsam has been infecting organizations but is not installed in the usual way."Samsam is another variant in a growing number of variants of ransomware, but what sets it apart from other ransomware is how it reaches its intended targets by way of unpatched server-side software," Symantec wrote.The perpetrators behind Samsam use a legitimate penetration tool called Jexboss to exploit servers running Red Hat's JBoss enterprise application server.To read this article in full or to leave a comment, please click here

Server software poses soft target for ransomware

An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.A type of ransomware called Samsam has been infecting organizations but is not installed in the usual way."Samsam is another variant in a growing number of variants of ransomware, but what sets it apart from other ransomware is how it reaches its intended targets by way of unpatched server-side software," Symantec wrote.The perpetrators behind Samsam use a legitimate penetration tool called Jexboss to exploit servers running Red Hat's JBoss enterprise application server.To read this article in full or to leave a comment, please click here

WhatsApp turns on end-to-end encryption

Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.WhatsApp's founders said Tuesday that the application now implements end-to-end encryption, which means only authorized users can decrypt messages."The idea is simple: when you send a message, the only person who can read it is the person or group chat that you send that message to," Jan Koum and Brian Acton wrote in a blog post. "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us."To read this article in full or to leave a comment, please click here

WhatsApp turns on end-to-end encryption

Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.WhatsApp's founders said Tuesday that the application now implements end-to-end encryption, which means only authorized users can decrypt messages."The idea is simple: when you send a message, the only person who can read it is the person or group chat that you send that message to," Jan Koum and Brian Acton wrote in a blog post. "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us."To read this article in full or to leave a comment, please click here

Sigfox’s slow but thrifty IoT network is going Down Under

The Sigfox low-power IoT network is due for an expansion that may not be game-changing in practical terms but will certainly look good on a map.Sigfox announced a deal on Tuesday with a partner that will build a network across Australia and New Zealand using the French company's technology. That's a visible win for a vendor competing to connect small Internet of Things devices like sensors and meters around the world.Several vendors and industry groups are pushing technologies for networking small, far-flung objects that may need to run on a single battery for years. These LPWANs (low-power wide-area networks) don't push a lot of data through the air but are more efficient than the cellular infrastructure that talks to smartphones.To read this article in full or to leave a comment, please click here

So, Internet TV streaming is now a thing in hotels?

As a somewhat frequent traveler, I’ve been in enough hotels to realize that entertainment options are not as good as the ones you get at your home. You end up watching the local version of news for whatever city you’re in, or, if you’re lucky, something good is on either HBO or Showtime as you’re drifting off to sleep.If you have to be stuck in your room for a longer period of time, it’s likely that you end up watching Netflix or Amazon Prime streaming on your computer, but you usually need to position the notebook (or tablet if you’re one of THOSE people) near a power source/cord so that the battery doesn’t run out after the third episode of “House of Cards” finishes).To read this article in full or to leave a comment, please click here

Jeff Bezos praises Amazon’s cloud in letter to shareholders

In a letter to shareholders, Amazon.com founder, CEO and Chairman of the board sounds like a proud father talking about the success of the moonshot project that launched the company into being a powerhouse of the cloud computing market.Amazon Web Services is on pace to earn $10 billion in revenue this year, he notes. “AWS is bigger than Amazon.com was at 10 years old, growing at a faster rate,” he adds.+MORE AT NETWORK WORLD: The myth about how Amazon's cloud started that just will not die | Happy 10th birthday AWS +To read this article in full or to leave a comment, please click here

HSRP VRRP GLBP Comparison

HSRP VRRP GLBP Comparison– In this post I am going to cover the similarities and the differences between HSRP VRRP and GLBP protocols. All these technologies provide first hop redundancy for the hosts. I will use the below table for HSRP VRRP GLBP Comparison and the design attributes listed in it. For the more technology comparison tables; please click […]

The post HSRP VRRP GLBP Comparison appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Servers with Nvidia’s Tesla P100 GPU will ship next year

Nvidia's fastest GPU yet, the new Tesla P100, will be available in servers next year, the company said.Dell, Hewlett Packard Enterprise, Cray and IBM will start taking orders for servers with the Tesla P100 in the fourth quarter of this year, Nvidia CEO Jen-Hsun Huang said during a keynote at the GPU Technology Conference in San Jose, California.The servers will start shipping in the first quarter of next year, Huang said Tuesday.The GPU will also ship to companies designing hyperscale servers in-house and then to outsourced manufacturing shops. It will be available for in-house "cloud servers" by the end of the year, Huang said.Nvidia is targeting the GPUs at deep-learning systems, in which algorithms aid in the correlation and classification of data. These systems could help self-driving cars, robots and drones identify objects. The goal is to accelerate the learning time of such systems so the accuracy of results improves over time.To read this article in full or to leave a comment, please click here

Google brings calendar reminders feature to desktop web

Google Calendar users now have the ability to add reminders from their desktop browsers that will follow them around to other Google services, thanks to a feature the company introduced Tuesday.  People can now set reminders in other services like Google Now, Keep and Inbox, and have them show up in their calendar, informing them of what they have to do during the day. Reminders are meant to help people take care of what they need to do, and will follow users around at the top of their calendar until completed. To read this article in full or to leave a comment, please click here

Underwhelmed by UL’s announcement

Today, Underwriters Laboratory announced the UL CyberSecurity Assurance Program. I won’t call it an oxymoron, but I’m deeply worried about it. While I have faith in UL, I’m not sure if they realize the breadth and depth of what they’re getting into.UL is the reason there are only small holes in appliances and CE gear. Why? So an average toddler can’t stick something inside and become electrocuted. UL helps product vendors have liability insurance within sane ranges. They promulgate standards that vendors are responsible to adhere to for insurance sake. Test labs do the rest, ensuring that First Article Samples (and then, perhaps subsequent production samples) of products adhere to a bevy of standards—all designed to make products safer but at least insurable.To read this article in full or to leave a comment, please click here

Underwhelmed by UL’s announcement

Today, Underwriters Laboratory announced the UL CyberSecurity Assurance Program. I won’t call it an oxymoron, but I’m deeply worried about it. While I have faith in UL, I’m not sure if they realize the breadth and depth of what they’re getting into.UL is the reason there are only small holes in appliances and CE gear. Why? So an average toddler can’t stick something inside and become electrocuted. UL helps product vendors have liability insurance within sane ranges. They promulgate standards that vendors are responsible to adhere to for insurance sake. Test labs do the rest, ensuring that First Article Samples (and then, perhaps subsequent production samples) of products adhere to a bevy of standards—all designed to make products safer but at least insurable.To read this article in full or to leave a comment, please click here

GE’s move to Boston could revive local tech business ambitions

Jeff Immelt candidly told Boston’s business and political elite yesterday about what GE hoped to get from the company’s move to Boston. He said GE moved to Boston for two reasons: to win the Internet of Things and rethink how companies work in this winner-take-all technology innovation economy.He also said he liked Boston because of the chip the tech community has on its shoulder; an obvious reference to the Silicon Valley’s domination of nearly every segment of technology. The Boston technology ecosystem, arguably the richest and most diverse R&D center in the world seems to have lost the DNA for growing big tech companies like the personal Internet, social or the sharing economy.To read this article in full or to leave a comment, please click here