Attackers can turn Microsoft’s exploit defense tool EMET against itself

Hackers can easily disable the Microsoft Enhanced Mitigation Experience Toolkit (EMET), a free tool used by companies to strengthen their Windows computers and applications against publicly known and unknown software exploits.Researchers from security vendor FireEye have found a method through which exploits can unload EMET-enforced protections by leveraging a legitimate function in the tool itself.Microsoft patched the issue in EMET 5.5, which was released on Feb. 2. However, it's likely that many users haven't upgraded yet, because the new version mainly adds compatibility with Windows 10 and doesn't bring any new significant mitigations.To read this article in full or to leave a comment, please click here

VLANs and Failure Domains Revisited

My friend Christoph Jaggi, the author of fantastic Metro Ethernet and Carrier Ethernet Encryptors documents, sent me this question when we were discussing the Data Center Fabrics Overview workshop I’ll run in Zurich in a few weeks:

When you are talking about large-scale VLAN-based fabrics I assume that you are pointing towards highly populated VLANs, such as VLANs containing 1000+ Ethernet addresses. Could you provide a tipping point between reasonably-sized VLANs and large-scale VLANs?

It's not the number of hosts in the VLAN but the span of a bridging domain (VLAN or otherwise).

Read more ...

IDG Contributor Network: All the buzzwords: Behavioral biometric adaptive authentication with SecureAuth

SecureAuth is a vendor in the authentication and access space. It covers a range of related functions including authentication, single sign on, and user self-service. At its core, SecureAuth is juggling the conflicting aims of ensuring easy access to applications by legitimate users and high security for sensitive data.One of the ways in which companies reconcile these seemingly irreconcilable aims is through using deep analytics to automate some of the access functions. A case in point comes from SecureAuth's latest version, which includes behavioral analytics, risk analysis, and biometric tracking.What all that means is that SecureAuth is offering to analyze a user's keystrokes and mouse movements to build a profile of an individual user's behavior. Thereafter, this profile is compared to subsequent login attempts and, if they don't match, SecureAuth applies a higher level of access control.To read this article in full or to leave a comment, please click here

Tor users increasingly treated like second-class Web citizens

The Internet is becoming harder to browse for users of Tor, the anonymity network that provides greater privacy, according to a new study. The blame can be placed largely on those who use Tor, short for The Onion Router, for spamming or cyberattacks. But the fallout means that those who want to benefit from the system's privacy protections are sometimes locked out. Researchers scanned the entire IPv4 address space and found that 1.3 million websites will not allow a connection coming from a known Tor exit node. Also, some 3.67 percent of Alexa's top 1000 websites will block Tor users at the application level.To read this article in full or to leave a comment, please click here

A Software-Defined Service Provider Network Improves Profitability and Delivers Competitive Advantage

At Plexxi we’re building a simply better network for public and private cloud environments and next generation service providers. The next era of IT requires support for data center agility, scale-out applications, converged infrastructure, Big Data analytics and integrated security over networks that are both local and global in scale. In a prior blog I reviewed the case study of a large enterprise that deployed a next generation data center network achieving agility through integration with VMware, data and application workload awareness and a dynamic, single-tier fabric optimized for east/west and north/south data center traffic. In this installment of my blog, I review the case study of Perseus. They have built the world’s largest SDN-based on demand services network allowing them to quickly offer new products and services while enabling new deployments at a rapid pace.

Perseus had an existing international network to transport high-speed, high-precision and high-performance applications across the globe for their managed service customers. That network was built on traditional platforms, similar to those of competitors, leveraging a layer three MPLS backbone for multi-tenancy and differentiated services.

They were planning to expand global operations to a new continent and across dozens of new countries where they did Continue reading

Baidu web browsers leaked sensitive information, researchers say

Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study. Baidu responded by releasing software fixes, but researchers say not all the issues have been resolved. The study was published Tuesday by Citizen Lab, a research group that's part of the University of Toronto.  It focused on the Windows and Android versions of Baidu's browser, which are free products. It also found that sensitive data was leaked by thousands of apps that use a Baidu SDK (software development kit).To read this article in full or to leave a comment, please click here

SSID Overhead, Now There’s an App for that!

One of the more popular reasons that people visit my website is to understand why too many SSIDs is an issue on a WLAN. I've written about performance degradation issues due to network overhead and subsequently released an SSID Overhead Calculator. The drawback to the tool is that it's in Microsoft Excel format. This makes it's use limited to people who have Excel and is only really available on workstations (not mobile devices) which makes it hard to use on-the-fly while in the field or in front of a customer.

Thanks to collaboration with Ryan Adzima, we are announcing the availability of the Revolution Wi-Fi SSID Overhead Calculator as an Apple iOS application today! You can download it here:
https://itunes.apple.com/us/app/apple-store/id1041231876?pt=615227&ct=Revolution%20Wi-Fi&mt=8

The iOS application provides the full functionality of the original tool right on your phone and tablet. You can adjust beacon data rate, beacon frame size, beacon interval, number of SSIDs, and number of APs on the channel. The circular bar displays the amount of overhead that the combinations will cause on your WLAN as well as a severity indication and recommendations to improve performance.

Here are a few screenshots:

SSID Overhead 3.png
SSID Overhead 2.png
SSID Overhead 1.png

Big shoutout to Ryan for working Continue reading

IT manager gets 30 months in jail for code-bombing firm’s intellectual property

He could have gotten 10 years behind bars but this week a former IT manager at software maker Smart Online only got 30 months for sending malicious code that destroyed the company’s computers and data.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2015+The Department of Justice said that according to the plea agreement, from 2007 to 2012, Nikhil Shah, 33 was an information technology manager at Smart Online Inc., of Durham, North Carolina, that develops mobile applications.To read this article in full or to leave a comment, please click here

Japan’s infrastructure probed by cybergroup, security firm says

A group of cyberattackers that emerged in 2010 and then went quiet has resurfaced and is targeting Japan's critical infrastructure, a security vendor said this week.The attacks have targeted utilities and energy companies in Japan, as well as other companies in finance, transportation and construction, said Greg Fitzgerald, chief marketing officer at Cylance, which specializes in end-point protection.The group appears to be based in Asia, and its methods and procedures suggest it may be linked to a nation state, Fitzgerald said.Symantec detected signs of the group, which Cylance calls Operation Dust Storm, in 2010, Fitzgerald said. The group went quiet in March 2013, shortly after Mandiant -- the forenics investigative unit of FireEye -- published a lengthy report on APT 1, which the company believes to be an elite cyber unit of the Chinese army.To read this article in full or to leave a comment, please click here

QOS Your Life

So as we’re all busy network professionals, I’m sure you’ve ran into the problem of a work-life balance. I personally know lots of engineers that have burned out at one time, or their family life has suffered, and their kids barely know them. Now granted these are extreme case scenarios, but it could happen to […]

The post QOS Your Life appeared first on Packet Pushers.

QOS Your Life

So as we’re all busy network professionals, I’m sure you’ve ran into the problem of a work-life balance. I personally know lots of engineers that have burned out at one time, or their family life has suffered, and their kids barely know them. Now granted these are extreme case scenarios, but it could happen to […]

The post QOS Your Life appeared first on Packet Pushers.

Apple v. FBI – Who’s for, against opening up the terrorist’s iPhone

Everyone has an opinionApple and the Department of Justice are locked in a court fight over whether the company should disable the anti-brute force mechanism on the iPhone used by the San Bernardino terrorists. Public opinion is split on which side is right, and everyone from tech experts to presidential candidates is weighing in on whether the order actually threatens privacy or whether it’s just a way to find out what’s on that particular phone. Here’s a sampling of comments about the issue from the likes of Bill Gates, Mark Zuckerberg and Donald Trump.To read this article in full or to leave a comment, please click here