Poseidon hacker group behind long-running extortion scheme

Kaspersky Lab has linked a single group to a long-known campaign of cyberattacks that appears to be aimed at extorting corporate victims.The Poseidon Group may have been active since 2001, according to an analysis of malware samples. The group's tools have been designed to function on systems set to English and Portuguese.Victims are usually sent spear-phishing emails and malware hidden inside office documents. Once on a network, the hackers explore its topology in order to eventually steal intellectual property and commercial information."Then the attacker looks for all administrator accounts on both the local machine and the network," Kaspersky wrote in a post on Tuesday. "This technique allows them to map network resources and make lateral movements inside the network, landing in the perfect machine to match the attacker’s interest."To read this article in full or to leave a comment, please click here

Skyport Systems – Moving the edge

The traditional security model has put significant emphasis on what’s typically called the ‘external edge’.  That is, the connection between your network and any third party network.  This is also where we create a delineation between ‘trusted’ and ‘untrusted’ networks.  Regardless of how you define this boundary, it becomes the focal point for any security related tooling.  This creates some interesting challenges…

Scale – Applying security tooling at the external edge introduces some possible scale concerns.  You now have a single point in the network has to scale to provide connectivity and security services to all of the users and applications.  While this might make sense in smaller networks, aggregating everything in one place on larger networks can be challenging.  Considering that many security tools can handle significantly lower amounts of traffic than routers and switches, you may find that doing this all in one place introduces a bottleneck in the network.  Scaling security appliances is often a much larger task than scaling network links. 

Network magic – I often joke that network engineers have to perform network magic to get all of the security tools all of the traffic they Continue reading

Google will stop accepting new Flash ads on June 30

Google has just hammered another nail in the coffin for Flash, Adobe Systems' multimedia software widely criticized for its frequent security vulnerabilities.On Tuesday, Google set deadlines for when it will stop running Flash ads and accept only those written in HTML5, the latest version of the Web's mother tongue.As of June 30, Google will stop accepting new Flash-based display ads for AdWords and DoubleClick Digital Marketing. And Flash ads won't be allowed on the company's Display Network or DoubleClick after Jan. 2, 2017.Flash is one of the most commonly targeted applications by hackers because it's installed on hundreds of millions of computers. Unpatched vulnerabilities can allow a hacker to install malicious software on a computer if a victim merely views a malicious ad.To read this article in full or to leave a comment, please click here

Should Monitoring Systems Also Perform Mitigation?

Shiny red lights and sundry messages can tell us when a transaction time is too high, an interface is dropping too many packets, database commits are taking too long, or a WAN link’s jitter just went south. That information is wonderful, but doesn’t resolve the issue. A course of action is required.

Carriers celebrate as Telecommunications Act of 1996 turns 20

The winners in a broadband industry heavily shaped by the Telecommunications Act of 1996 celebrated publicly this week, as February 8 marked the 20-year anniversary of the law taking effect.The Act – a sweeping rewrite of America’s 60+ year old laws governing phone service, media ownership, and more – substantially deregulated the telecom and media industries, causing large-scale mergers and a much more centralized landscape.+ ALSO ON NETWORK WORLD: Cisco boosts, broadens Catalyst switches | US government wants to sharply increase spending on cybersecurity +To read this article in full or to leave a comment, please click here

Obama’s new cybersecurity agenda: What you need to know

In response to mounting cyber attacks on federal networks, President Barack Obama is seeking $19 billion for cybersecurity, more than a 35% increase over last year’s spending, and calling for a federal CISO to oversee all the upgrade of outdated and insecure cyber infrastructure.The number of information security incidents grew more than 11-fold between 2006 and 2014 to 67,168, and attacks from other countries have been on the rise.+More on Network World: Feds' primary network security weapon needs more bang+To read this article in full or to leave a comment, please click here

The iconic Boeing 747 is almost 50!

Happy 47thImage by Reuters/Pascal RossignolThe 747 truly ushered in the Jumbo Jet era when it first flew for the first time this week – Feb. 9 -- in 1969. “The fuselage of the original 747 was 225 feet (68.5 meters) long; the tail as tall as a six-story building. Pressurized, it carried a ton of air. The cargo hold had room for 3,400 pieces of baggage and the total wing area was larger than a basketball court. Yet, the entire global navigation system weighed less than a modern laptop computer,” Boeing wrote of the aircraft. The massive airplane required construction of the 200 million-cubic-foot 747 assembly plant in Everett, Wash., the world's largest building by volume. Here’s a brief look at the giant of the skies:To read this article in full or to leave a comment, please click here

Microsoft released 13 security bulletins for February Patch Tuesday, 6 rated critical

On February 2016 Patch Tuesday, Microsoft released 13 security bulletins, six of which are rated as critical for remote code execution. The rest deal with fixing elevation of privilege, denial of service, and security feature bypass vulnerabilities.Rated critical MS16-022 resolves 23 flaws in Adobe Flash Player by updating Flash libraries in Internet Explorer 10, Internet Explorer 11, and Microsoft Edge. This patch is meant for all supported editions of Windows. It was ranked at the top of the list for patching, according to Qualys CTO Wolfgang Kandek, who called the patch a “packaging change” since “there is a real bulletin for it,” as opposed to a security advisory.To read this article in full or to leave a comment, please click here

Heterogeneous Multi-Dimensional Cloud Security

According to ESG research, 75% of organizations use public cloud services of one kind or another today (note: I am an ESG employee).  A majority (65%) use SaaS, 38% use IaaS, and 33% use PaaS.  In terms of IaaS, Amazon Web Services (AWS) is still the king of the hill but many large enterprises are implementing or kicking the tires on alternatives.  Microsoft is pushing clients with enterprise client access licenses (ECAL) toward Office365 and Azure, IBM is winning SoftLayer deals with large customers, and Google Cloud Platform is gaining traction in the life sciences industry.With all of this cloud momentum, we see a new compute model evolving that ESG calls heterogeneous multi-dimensional cloud infrastructure.  Simply stated, heterogeneous multi-dimensional cloud infrastructure is sort of a hybrid cloud on steroids where enterprises have a little bit of everything – AWS, Azure, OpenStack, SoftLayers, VMware, etc., on-premise and in the public cloud.To read this article in full or to leave a comment, please click here

Microsoft skills: What’s hot and what’s not?

It's a good time to be in IT. Job seekers have the advantage as employers struggle to hire tech talent in key areas such as cloud computing, mobility, security and data analytics. Companies are raising salaries and piling on the perks -- but not for every IT role.To read this article in full or to leave a comment, please click here(Insider Story)

A Smallish List of Parse Migration Guides

Since Parse's big announcement it looks like the release of migration guides from various alternative services has died down. 

The biggest surprise is the rise of Parse's own open source Parse Server. Check out its commit velocity on GitHub. It seems to be on its way to becoming a vibrant and viable platform.

The immediate release of Parse Server with the announcement of the closing of Parse was surprising. How could it be out so soon? That's a lot of work. Some options came to mind. Maybe it's a version of an on-premise system they already had in the works? Maybe it's a version of the simulation software they use for internal testing? Or maybe they had enough advanced notice they could make an open source version of Parse? 

The winner is...

Charity Majors, formerly of Parse/Facebook, says in How to Survive an Acquisition, tells all:

Massive props to Kevin Lacker and those who saw the writing on the wall and did an amazing job preparing to open up the ecosystem.

That's impressive. It seems clear the folks at Parse weren't on board with Facebook's decision, but they certainly did everything possible to make the best Continue reading

The Myth of Chargeback

 

Cash Register

Cash register by the National Cash Register Co., Dayton, Ohio, United States, 1915.

Imagine a world where every aspect of a project gets charged correctly. Where the massive amount of compute time for a given project gets labeled into the proper department and billed correctly. Where resources can be allocated and associated to the projects that need them. It’s an exciting prospect, isn’t it? I’m sure that at least one person out there said “chargeback” when I started mentioning all these lofty ideas. I would have agreed with you before, but I don’t think that chargeback actually exists in today’s IT environment.

Taking Charge

The idea of chargeback is very alluring. It’s been on slide decks for the last few years as a huge benefit to the analytics capabilities in modern converged stacks. By collecting information about the usage of an application or project, you can charge the department using that resource. It’s a bold plan to change IT departments from cost centers to revenue generators.

IT is the red headed stepchild of the organization. IT is necessary for business continuity and function. Nothing today can run without computers, networking, or phones. However, we aren’t a visible part Continue reading