How the Internet responded to the Paris terror attacks

SolidarityImage by REUTERS/Philippe WojazerIn the hours and days following the tragic terror attacks in Paris, the Internet became a primary vehicle for not only disseminating information but also for individuals and companies to show their solidarity with the French. Check out the various ways the Internet responded to the French terror attacks.To read this article in full or to leave a comment, please click here

Anonymous just might make all the difference in attacking ISIS

In the wake of the horrific attacks in Paris, military operations against ISIS terrorist strongholds have increased. When someone hits you, it’s natural to hit back. But can you win by killing an enemy that seeks death — and when those who are killed inspire desperate others to replace them?Along with the news that the French had launched air strikes against ISIS positions came the word that the cyber-revenge group calling itself Anonymous has declared war on ISIS. I never thought I would say this, but Anonymous might be our savior. Attacking ISIS militarily is necessary, but the group has always exerted its influence through social media, using it for both fundraising and recruitment. Both activities are essential to ISIS’ continuing existence and effectiveness. The weaponry it uses in its terror campaign is expensive, and when every successful operation ends in death or the arrest of all participants, recruitment is critical.To read this article in full or to leave a comment, please click here

Alternative processors tapped to fulfill supercomputing’s need for speed

As world powers compete to build the fastest supercomputers, more attention is being paid to alternative processing technologies as a way to add more horsepower to such systems.One thing is clear: It is becoming prohibitive to build blazing CPU-only supercomputers, due to power and space constraints. That's where powerful coprocessors step in -- the processors work in conjuction with CPUs to conduct complex calculations in a power-efficient manner. Coprocessors are an important topic at this week's Supercomputing 15 conference in Austin, Texas. According to the Top500 list of the fastest supercomputers, released on Monday, 104 systems used coprocessors, growing from 90 systems in a list released in July.To read this article in full or to leave a comment, please click here

Containers get a fresh business boost from Hewlett Packard Enterprise

It would be difficult to overstate the impact container technology is having on the software-development world, so it's no wonder vendors large and small are jumping on board with tailored offerings. The latest example: Hewlett Packard Enterprise, which just rolled out an entire portfolio of Docker-focused products.Making containers enterprise-ready will be a key focus over the next two years, according to Dave Bartoletti, a principal analyst with Forrester."Large users will need the same degree of control over containers that they now have over virtual machines: they need to integrate them into their development processes, monitor them, configure them, connect them to each other over the network, and assign storage and other resources," he pointed out.To read this article in full or to leave a comment, please click here

Police body cameras came preloaded with Conflickr

Although Conficker is old, it’s still around as cleaning up botnets takes years to complete. In a new twist, iPower Technologies reported receiving multiple police body cams that came preloaded with the Conficker worm.The body cams were Martel Electronics Frontline Cameras with GPS, which are “sold and marketed as a body camera for official police department use.” Martel said of its “elite video cameras” meant for police departments:To read this article in full or to leave a comment, please click here

Millions of sensitive records exposed by mobile apps leaking back-end credentials

Thousands of mobile applications, including popular ones, implement cloud-based, back-end services in a way that lets anyone access millions of sensitive records created by users, according to a recent study.The analysis was performed by researchers from the Technical University and the Fraunhofer Institute for Secure Information Technology in Darmstadt, Germany, and the results were presented Friday at the Black Hat Europe security conference in Amsterdam. It targeted applications that use Backend-as-a-Service (BaaS) frameworks from providers like Facebook-owned Parse, CloudMine or Amazon Web Services.To read this article in full or to leave a comment, please click here

How ISIS could use video games, messaging apps to evade surveillance

A new report sheds some light on how terrorists, particularly those with the Islamic State (ISIS) involved in last week's deadly attacks in Paris, manage to communicate in an age when most communications tools are susceptible to government surveillance.The most interesting is how the group can use video game platforms, specifically Sony's PlayStation 4, to relay messages between members. A Buzzfeed News report quoted Belgium's federal home affairs minister Jan Jambon, who had explained at an event prior to the Paris attacks that communications on a device like the PlayStation 4 could be more difficult to monitor than those on encrypted messaging apps, such as WhatsApp.To read this article in full or to leave a comment, please click here

9ish Low Latency Strategies for SaaS Companies

Achieving very low latencies takes special engineering, but if you are a SaaS company latencies of a few hundred milliseconds are possible for complex business logic using standard technologies like load balancers, queues, JVMs, and rest APIs.

Itai Frenkel, a software engineer at Forter, which provides a Fraud Prevention Decision as a Service, shows how in an excellent article: 9.5 Low Latency Decision as a Service Design Patterns.

While any article on latency will have some familiar suggestions, Itai goes into some new territory you can really learn from. The full article is rich with detail, so you'll want to read it, but here's a short gloss:

Country wide outage in Azerbaijan

AZoutageIt doesn’t happen often that a country with hundreds of prefixes is affected by a massive outage, however earlier today this unfortunately happened to Azerbaijan. Starting at 12:04 UTC approximately 94% of the prefixes out of Azerbaijan became unreachable.  At the time of writing the outage is still active.
The event was reported on @bgpstream and details plus a replay can be found here: https://bgpstream.com/event/7981

The image below shows the impact on traffic from Azerbaijan to OpenDNS. It’s clear that almost all of the traffic from Azerbaijan disappeared at the time of outage.

Traffic from Azerbaijan

Traffic from Azerbaijan

The main Internet Service provider in Azerbaijan is AS29049, Delta Telecom Ltd. The majority of the country relies on Delta Telecom for connectivity to the rest of the Internet.  The outage is reportedly the result of a fire damaging the equipment of Delta Telecom. As a result all routes for AS29049, Delta Telecom Ltd. and all of the networks that rely on Delta Telecom disappeared from the Internet.

The graph below shows the number of prefixes observed in the BGP routing tables for Azerbaijan. Clearly visible is the drop in reachable networks starting at 12:04.

Visisble BGP prefixes for Azerbaijan

Visible BGP prefixes for Azerbaijan

Networks out of Continue reading

Intel’s fastest chip ever will appear in supercomputers next year

There's been a slight delay, but the latest version of Intel's fastest processor ever will finally reach supercomputers early next year.The Xeon Phi chip, code-named Knights Landing, offers an array of new technologies that collectively deliver performance breakthroughs. The chip is also a springboard for new memory, I/O and storage technologies destined to reach desktops and laptops in the coming years.Intel didn't provide details on the first supercomputers with Knights Landing. The U.S. Department of Energy, however, said that the chip will be used in Cori, a 9,300-core supercomputer that will be deployed in the latter half of 2016 at the National Energy Research Scientific Computing Center in Berkeley, California.To read this article in full or to leave a comment, please click here

Ted Koppel discusses the inevitable cyberattack on U.S. infrastructure

Ted Koppel, anchor of ABC TV’s “Nightline” for 25 years, from 1980-2005, is the author of “Lights Out,” which argues that not only is the nation’s critical infrastructure at grave risk of a catastrophic cyber attack that could leave as much as a third of the nation without electricity for months or even a year, but that there is no government plan to respond to such an attack.[ ALSO ON CSO: Read our review of the book and if the industry agrees with Koppel ]Koppel spoke briefly with CSO earlier last week about those issues:What kind of feedback on your book are you getting from information security professionals? Do they think you’ve overstated the risk or not?To read this article in full or to leave a comment, please click here

Top tech turkeys of 2015

Turkey timeJust in time for Thanksgiving, here’s our annual rundown of the tech industry’s “turkeys” for the year.Looking back: Top tech turkeys 2014Top tech turkeys 2013To read this article in full or to leave a comment, please click here

The State of Cyber Insurance

All this year I’ve been researching the burgeoning cyber insurance market. Admittedly, this is a bit of a detour from covering endpoint security, network security, and security analytics, but cyber insurance is becoming an increasingly important puzzle piece in any organization’s risk mitigation strategy, so it’s worth paying attention to. Given all of the highly visible data breaches over the past few years, it shouldn’t be surprising that cyber insurance is on fire. Between 30% and 40% of companies have some type of cyber insurance today, and the market is growing at 35% or more on an annual basis. It is estimated that the U.S. market for cyber insurance is around $2.5 billion today with about 50 insurance companies competing for business. PWC estimates that this market will grow to over $7.5 billion by 2020.To read this article in full or to leave a comment, please click here

The 10 mightiest supercomputers in the world

Biggest, fastest, occupying the most racksImage by ThinkstockThe latest Top500 supercomputer rankings are out today, to coincide with the annual SC15 conference, which is being held this year in Austin, Texas. While there are plenty of names familiar to Top500 watchers in the new top 10, there are also some new faces. Or, there would be if supercomputers had faces. Have a look.To read this article in full or to leave a comment, please click here

Castle versus Cannon: It’s time to rethink security

P1120249In case you’re confused about the modern state of security, let me give you a short lesson.

Your network is pictured to the left. When I first started working on networks in the USAF we were just starting to build well designed DMZs, sort of a gate system for the modern network. “Firewalls” (a term I’m coming to dislike immensely), guard routers, VPN concentrators, and other systems were designed to keep your network from being “penetrated.” Standing at the front gate you’ll find a few folks wearing armor and carrying swords, responsible for letting only the right people inside the walls — policies, and perhaps even an IDS or two.

The world lived with castles for a long time — thousands of years, to be precise. In fact, the pride of the Roman Legion really wasn’t the short sword and battle formation, it was their ability to work in concrete. Certainly they had swords, but they could also build roads and walls, as evidenced by the Roman style fortifications dotting the entire world.

But we don’t live inside concrete walls any longer. Instead, our armies today move on small and large vehicles, defending territory through measure and countermeasure. They gather Continue reading