Don’t look for Google to make big, quick changes after Alphabet pronouncement

The announcement Monday that saw Google reorganize under the banner of new holding company Alphabet was Big News, we all seem to agree, but it’s much less clear exactly what kind of Big News it is.It’s going to keep investors happy by segmenting some of Google’s wilder moonshot projects out of the main earnings figures, according to the Verge. Or maybe, says the Guardian, Google wants to make itself a smaller target for the European regulators it’s currently battling.To read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

It’s alive! Patch Tuesday survives for Windows 10

Patch Tuesday, contrary to expectations earlier this year, survived after Microsoft yesterday delivered security updates not only for the legacy editions of Windows, but also for the new Windows 10.For now, Patch Tuesday -- Microsoft prefers "Update Tuesday" for some reason -- lives.In a large release yesterday, Microsoft issued 14 security updates for Windows PCs, distributed individually to older OSes like Windows 7 and 8.1, and as a six-bulletin bundle for Windows 10.To read this article in full or to leave a comment, please click here

Most allegations against Julian Assange are dropped, but rape investigation remains

The Swedish Prosecution Authority has dropped the investigation of WikiLeaks front-man Julian Assange for sexual molestation and two unlawful coercion allegations, but it still has a rape allegation to investigate.The charges were dropped because the statute of limitations will run out on in the next week, Marianne Ny, director of public prosecution said in a statement. Assange can be prosecuted for the rape allegation until August 2020.[ ALSO ON CSO: Was LulzSec bust part of a play against Julian Assange? ]To read this article in full or to leave a comment, please click here

Threat intelligence needs to grow up

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant.Aggregating that data requires a shift in mindset and a maturing of threat intelligence in order to better mitigate risks.Experts say that collecting data for the purposes of having data does no good and can actually detract from a security intelligence program by using up time and man power to analyze data that is most often noise rather than real indicators of threat.MORE ON CSO:10 tips to make sure you are ready when a disaster strikes If the long-term goal of enterprises is to have mature threat intelligence programs, they need to conduct an internal risk assessment and design a plan of action.To read this article in full or to leave a comment, please click here

IMUNES on Linux

The IMUNES open-source network simulator can now be installed on and run on Linux. Previously, IMUNES was available only for the FreeBSD operating system.

IMUNES-linux

The Linux version of IMUNES is ready to be used and can set up and run network emulation scenarios. It does not yet have all the features offered in the FreeBSD version of IMUNES but the development team intends make add in more features until both versions support similar capabilities.

In this post, we will show how to install the Linux version of IMUNES on Ubuntu 14.04, look at the tool set used by IMUNES on Linux, and experiment with a simple network simulation scenario.

Compatibility with Linux versions

IMUNES is compatible with all popular Linux distributions.

The IMUNES development team seems to be testing IMUNEs on the latest available Linux distributions. If you are using Linux distributions like Ubuntu 15.04, you can follow the standard IMUNES install directions. However, if you are using a long-term-supported distribution like Ubuntu 14.04, there are some extra software dependencies that you must install.

Install IMUNES in Ubuntu 14.04

I am using Ubuntu 14.04 LTS as my host operating system. When installing IMUNES on Ubuntu Continue reading

Risky Business #378 — Mary Ann Davidson vs Krebs and Dowd

On this week's show we're chatting with Mark Dowd and Brian Krebs about Oracle CSO Mary Ann Davidson's somewhat odd blog post from earlier this week. In the post she laid into security researchers for violating Oracle's EULA when reverse engineering their products. The post got pulled, much drama, we sift through the ashes of that. Plus we chat to Brian about the daring $46.7m online heist against Ubiquiti Networks.

read more

Lenovo’s Motorola business to produce phones at quicker pace, less cost

In the wake of lackluster earnings, Lenovo said it is working towards pumping out products faster from its newly acquired Motorola Mobility division.Lenovo wants the Motorola team to shorten its product development time, CEO Yang Yuanqing said in an earnings conference call Thursday. “By the end of the life cycle the product is not competitive, particularly the Moto G, the Moto X,” he said.Yang wants the company to update its smartphones and add new models every six months. “In the future we will improve our product development cycle. So in every moment our product will be competitive,” he said.Following a streamlining of the business, Lenovo will also create a simpler handset portfolio, with fewer models.To read this article in full or to leave a comment, please click here

Struggling Lenovo to cut 3,200 jobs, streamline handset business

Lenovo is laying off 3,200 employees and trimming down its smartphone portfolio in response to a slowdown in its PC and handset sales.The Chinese company faced a particularly tough market environment during the second quarter, its CEO Yang Yuangqing said Thursday. Demand is down for PCs and tablets, and competition in China’s smartphone market is cutting into sales.The company reported second quarter earnings that failed to meet its expectations. Net profit declined 51 percent year over year to reach US$105 million. Revenue increased by only 3 percent from a year ago, to reach $10.7 billion.In response, Lenovo has announced cost-cutting measures that will reduce its employee strength of 60,000 by 5 percent. It is also restructuring its mobile business group, to pave the way for a simpler product portfolio with fewer smartphone models.To read this article in full or to leave a comment, please click here

Datanauts 006 – Assessing IPv6 Readiness

New IPv4 address space is almost gone from the global market. Organizations need to introduce IPv6 into their environments to ensure uninterrupted business operations with the rest of the world. Yet, implementing IPv6 is not as simple as firing up a routing scheme. How does an organization know if it’s ready? Special guest Ed Horley joins the Datanauts in this discussion.

The post Datanauts 006 – Assessing IPv6 Readiness appeared first on Packet Pushers.

Updates are coming for a telematics unit that hacked a Corvette

Security updates are being distributed for a telematics control unit (TCU) that security researchers showed could be manipulated to remotely apply the brakes of a Corvette, according to the device’s French manufacturer.The device is a small dongle that plugs into the On-Board Diagnostics II (OBD-II) port on a vehicle, usually located under the driver’s side dashboard. TCUs with cellular connections are increasingly being used in vehicles by insurance companies to monitor drivers or for fleet management.At the USENIX security conference this week in Washington, D.C., academics from the University of California demonstrated how a C4E family dongle from Paris-based Mobile Devices Ingenierie could be remotely accessed.To read this article in full or to leave a comment, please click here

Using Vagrant with CumulusVX

Cumulus recently announced their CumulusVX platform, which is a virtualized instance of their operating system typically found on network switches. They’ve provided a few options to run this, and in this blog post, I’ll be exploring the use of Vagrant to set up a topology with Cumulus virtual devices. Brief Review of Vagrant In software development, there is a very crucial need to consistently and repeatably set up development and test environments.

Using Vagrant with CumulusVX

Cumulus recently announced their CumulusVX platform, which is a virtualized instance of their operating system typically found on network switches. They’ve provided a few options to run this, and in this blog post, I’ll be exploring the use of Vagrant to set up a topology with Cumulus virtual devices. Brief Review of Vagrant In software development, there is a very crucial need to consistently and repeatably set up development and test environments.

Using Vagrant with CumulusVX

Cumulus recently announced their CumulusVX platform, which is a virtualized instance of their operating system typically found on network switches. They’ve provided a few options to run this, and in this blog post, I’ll be exploring the use of Vagrant to set up a topology with Cumulus virtual devices.

Brief Review of Vagrant

In software development, there is a very crucial need to consistently and repeatably set up development and test environments. We’ve had the “but it worked on my laptop” problem for a while, and anything to simplify the environment set up and ensure that everyone is on the same page will help prevent it.

Vagrant is a tool aimed at doing exactly this. By providing a simple CLI interface on top of your favorite hypervisor (i.e. Virtualbox) you can distribute Vagrantfiles, which are essentially smally Ruby scripts, and they provide the logic needed to set up the environment the way you want it. In addition, it can call external automation tools like Ansible and Puppet to go one step further, and actually interact with the operating system itself to perform tasks like installing and configuring software.

What we get out of a tool like Vagrant is a Continue reading

Using Vagrant with CumulusVX

Cumulus recently announced their CumulusVX platform, which is a virtualized instance of their operating system typically found on network switches. They’ve provided a few options to run this, and in this blog post, I’ll be exploring the use of Vagrant to set up a topology with Cumulus virtual devices.

Brief Review of Vagrant

In software development, there is a very crucial need to consistently and repeatably set up development and test environments. We’ve had the “but it worked on my laptop” problem for a while, and anything to simplify the environment set up and ensure that everyone is on the same page will help prevent it.

Vagrant is a tool aimed at doing exactly this. By providing a simple CLI interface on top of your favorite hypervisor (i.e. Virtualbox) you can distribute Vagrantfiles, which are essentially smally Ruby scripts, and they provide the logic needed to set up the environment the way you want it. In addition, it can call external automation tools like Ansible and Puppet to go one step further, and actually interact with the operating system itself to perform tasks like installing and configuring software.

What we get out of a tool like Vagrant is a Continue reading

Google’s Niantic Labs to become independent company

Two days after announcing a sweeping reorganization, Google has detailed its first departure. Niantic Labs, an augmented reality unit of Google, will be spun off into an independent company.The split, which is unusual for Google, means that Niantic Labs won’t be part of Alphabet, the new holding company that is expected to be formed later this year to include Google and other parts of the company.The move was announced by Niantic Labs in a Google+ post on Wednesday, and confirmed by Winnie King, a spokeswoman for Google.She said the split would allow Niantic to accelerate its growth, “which will help them align more closely with investors and partners in the entertainment space,” but didn’t provide any more details.To read this article in full or to leave a comment, please click here