Feeling angry and betrayed, IT workers mount protest

In midtown Manhattan Wednesday, around 25 EmblemHealth IT employees and their supporters held a protest over the firm's decision to shift work to IT services firm Cognizant.On the sidewalks next to EmblemHealth's midtown offices, they yelled "Protect U.S. jobs," "Keep jobs in the U.S.A." and, to the people passing by: "It's our jobs now, your jobs next." They waved signs and slowly moved along.The IT employees gathered for the protest outside St. Michael's Church on 34th Street near 9th Avenue, across from EmblemHealth's office.INSIDER: Network jobs are hot: Salaries expected to rise in 2016 A small contingent of plainclothes security, dressed in suits, watched. There was never any tension or reason for security to become animated. There were a few moments of humor, particularly when everyone made way for a tiny, sunglasses-wearing poodle on a leash that walked by with its owner.To read this article in full or to leave a comment, please click here

How to break into Android development

With hundreds of millions of Android devices in use today, there’s little wonder why the Android development job market continues to show strong demand.Job search website Monster.com, for example, consistently shows more than 1,000 Android developer job postings, with California continuing to be a top destination. Android developers are also in high demand in New York City and Boston, among other cities. And job search website Indeed.com reports $163,000 as the average salary for Android developers. It’s clear that motivated developers will find plenty of opportunities to work on Android apps at startups, agencies, and other organizations.To read this article in full or to leave a comment, please click here

9 free Windows apps that can solve Wi-Fi woes

If you believed the vendors, you'd think Wi-Fi was simple: Turn on your computer or other device, hop on the Internet and you're set to go.But as we all know, life isn't quite that easy. Your home or office network can have dead spots where devices can't seem to connect, or where the connections get slow or flaky. Public hotspots can make you prey for hackers and snoopers. And when you are at a hotspot, you might need to share your connection with your other devices, including smartphones and tablets.MORE ON NETWORK WORLD: How to use public Wi-Fi hotspots safely While there is no way to immediately solve all the problems associated with wireless connectivity, there are applications that can make things better -- and many of them are free. I've rounded up nine free pieces of Windows software that can go a long way toward helping you solve your Wi-Fi issues at home, in your office or on the go.To read this article in full or to leave a comment, please click here

9 free Windows apps that can solve Wi-Fi woes

If you believed the vendors, you'd think Wi-Fi was simple: Turn on your computer or other device, hop on the Internet and you're set to go.But as we all know, life isn't quite that easy. Your home or office network can have dead spots where devices can't seem to connect, or where the connections get slow or flaky. Public hotspots can make you prey for hackers and snoopers. And when you are at a hotspot, you might need to share your connection with your other devices, including smartphones and tablets.MORE ON NETWORK WORLD: How to use public Wi-Fi hotspots safely While there is no way to immediately solve all the problems associated with wireless connectivity, there are applications that can make things better -- and many of them are free. I've rounded up nine free pieces of Windows software that can go a long way toward helping you solve your Wi-Fi issues at home, in your office or on the go.To read this article in full or to leave a comment, please click here

You’ve been hit with ransomware. Now what?

Imagine waking up to an urgent 5 a.m. call: Something has taken over your corporate network and encrypted all of your data, and supposedly the only way to get it all back is to pay a significant sum to an anonymous third party using Bitcoin. While that scene might sound like something out of Hollywood, it is actually very real – and it’s exactly what several variants of ransomware are doing to organizations around the globe.Two recent appearances of ransomware in the news demonstrate that it is a problem that is growing in both volume and significance, as larger and larger organizations, some critical to public and social services, are impacted by an outbreak:To read this article in full or to leave a comment, please click here

You’ve been hit with ransomware. Now what?

Imagine waking up to an urgent 5 a.m. call: Something has taken over your corporate network and encrypted all of your data, and supposedly the only way to get it all back is to pay a significant sum to an anonymous third party using Bitcoin. While that scene might sound like something out of Hollywood, it is actually very real – and it’s exactly what several variants of ransomware are doing to organizations around the globe.Two recent appearances of ransomware in the news demonstrate that it is a problem that is growing in both volume and significance, as larger and larger organizations, some critical to public and social services, are impacted by an outbreak:To read this article in full or to leave a comment, please click here

IT salaries increase across 12 tech job categories

Salaries increase across 12 tech job categoriesImage by ThinkstockMondo's 2016-2017 IT Salary Guide points to steady increases in tech salaries across 12 verticals. The study points out that as technology influences every industry, the demand for STEM workers is only going to increase, with a projected 1.5 million open positions in STEM by the year 2020. If you are already in the technology field, or are hoping to break into it, it couldn't be a better time. Mondo tracks the salaries of popular technology jobs to see how the annual compensation range increases year over year and this most recent report shows increases in nearly every tech job evaluated; and for jobs that didn't increase in this report, they at least didn't show a decline in average salary either. DevOps/SDNImage by ThinkstockTo read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Enhanced Disaster Recovery with Cross-VC NSX and SRM

Check-out the new Disaster Recovery with NSX and SRM white paper that explains how Cross-VC NSX + VMware’s SRM offers an Enhanced Disaster Recovery (DR) solution and solves many of the challenges related to traditional DR solutions. This solution provides consistent logical networking and security across protected and recovery sites and faster recovery upon disaster scenarios. A summary and overview of the solution is provided below.  Continue reading

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

Apple running a secret car design lab in Germany, report claims

Rumors of Apple's interest in developing an electric car have persisted for months now. Over the last 12 months, we've heard rumblings that Apple's car development team is almost 1,000 engineers and researchers deep. What's more, it's no secret that Apple has poached a number of employees from high-end luxury automakers such as BMW, Porsche, and of course Tesla.Now whether or not an Apple Car actually sees the light of day is another matter altogether, but it's impossible to ignore that Apple is seriously exploring such a possibility. The latest report about Apple's car plans comes to us courtesy of the German-language Frankfurter Allgemeine Zeitung (F.A.Z) which relays that Apple has a secret auto-oriented research facility in Germany where a team of 15-20 employees with deep experience across all facets of the car design and manufacturing process come up with new and interesting ideas. Specifically, the employees are said to be "progressive thinkers" with backgrounds in engineering, software and hardware design, and sales.To read this article in full or to leave a comment, please click here

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.