IRS warns yet again on scam artist trickery

The IRS this week said some 4,000 victims have lost over $20 million to scammers and the rip-offs continue at a startling pace.+More on Network World: FBI and IRS warn of pervasive, maddening business, consumer scams+ The IRS noted what it called a number of new variations on old schemes: Scammers alter what appears on your telephone caller ID to make it seem like they are with the IRS or another agency such as the Department of Motor Vehicles. They use fake names, titles and badge numbers. They use online resources to get your name, address and other details about your life to make the call sound official. They even go as far as copying official IRS letterhead for use in email or regular mail. Brazen scammers will even provide their victims with directions to the nearest bank or business where the victim can obtain a means of payment such as a debit card. And in another new variation of these scams, con artists may then provide an actual IRS address where the victim can mail a receipt for the payment – all in an attempt to make the scheme look official. Scammers try to scare people Continue reading

Black Hat 2015: Spectacular floor distractions

May Black Hat be with youAs if hacked cars and massive Android vulnerabilities weren’t enough to keep the attention of security experts attending Black Hat 2015 in Las Vegas, the vendors at this increasingly vendor-driven show were wheeling out shiny distractions ranging from food and drink to celebrity lookalikes to custom art and free giveaways. Here’s a look at some of what helped keep Black Hat entertained. (See all the stories from Black Hat.)To read this article in full or to leave a comment, please click here

Attack on Sabre reportedly conducted by Anthem, OPA hackers

Travel industry software maker Sabre is the latest company said to have been hit by the same hackers who recently attacked U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM), while American Airlines has been investigating its own systems for evidence of a similar breach.Texas-based Sabre, whose technology processes reservations for hundreds of airlines and thousands of hotel properties, on Friday confirmed that its systems were compromised.“We recently learned of a cybersecurity incident, and we are conducting an investigation into it now,” Sabre said. “At this time, we are not aware that this incident has compromised sensitive protected information, such as credit card data or personally identifiable information, but our investigation is ongoing.”To read this article in full or to leave a comment, please click here

PlexxiPulse—CRN’s Top 100

This week, CRN named Rich Napolitano to their Top 100 list of the IT industry’s foremost channel leaders. The annual list recognizes the efforts of agile decision-makers who play an integral role in evolving the way the channel does business. CRN selects leaders that represent the pre-eminent innovators, influencers, disrupters and channel sales leaders in the IT channel today.

Our solutions enable success in the next era of IT as virtualization, hyperconvergence, Big Data and scale-out applications and with Rich’s guidance we are working with great partners to bring our solutions to the market. Congratulations to all of the leaders named to this year’s CRN® Top 100 list.

Below please find a few of our top picks for our favorite news articles of the week. Have a great weekend!

SearchITChannel: Is bimodal IT the future of the channel?
By John Moore
CHICAGO — In CIO circles, bimodal IT has been a conversation starter: How can an enterprise’s information leadership balance the necessity of keeping the lights on against the challenge of adopting emerging, business-changing technologies? That same discussion is now surfacing in the channel. Speakers at this week’s CompTIA ChannelCon 2015 here suggested the possibility of partners becoming bimodal and the Continue reading

Black Hat 2015: DHS deputy says ‘just trust us’

The deputy head of the Department of Homeland Security implored a group of skeptical security pros at Black Hat 2015 to share information about security incidents and to trust the government to keep it safe.“We understand the trust deficit that exists in the [security] community,” says Alejandro Mayorkas, deputy secretary of Homeland Security, encouraging attendees to participate in a government program where private businesses share information about cyber threats they encounter.+ MISS BLACK HAT? Get caught up with our stories from the show +Part of the trust problem is that businesses lack confidence that government can secure information it receives, Mayorkas says, citing the massive breach at the Office of Personnel Management. (It didn’t help his cause that as the meeting broke up news also broke that unclassified emails for the Joint Chiefs of Staff had been hacked and the email system shut down for two weeks.)To read this article in full or to leave a comment, please click here

Linux Core 6.3 as Network Host on VMware Disk

The Core Linux is a small modular Linux distribution that provides only a command line interface and tools that allows you to build your own application extensions. Thanks to these extensions you can easily turn your Core installation to a custom appliance such as network host, router, switch, server. Moreover choosing the Core Linux as an operating system for your appliance significantly reduces the size of the appliance.

Two weeks ago I started to build a network host that can handle network traffic. I installed the latest 64 bit Linux Core 6.3 on VMware virtual disk and loaded Core with extensions that can generate traffic, measure bandwidth, route, forward and filter traffic.  A list of the extensions, their purpose and configuration changes is mentioned here.

I share my own network host VMware disk in Linux Core download section. You can create a new virtual machine (VirtualBox, VMware Workstation/Player, Qemu) with the disk attached and use it in your GNS3 labs in order to simulate network host. The disk contains the following tcz extensions:

bash - 4.3.39(1) with patches up to 39
bash-completion - 2.1
d-itg - 2.8.1-r1023
hping3 - 3.0.0-alpha-1
iperf3 - 3.1b3
iproute2 - 3.14.0
iptables Continue reading

University technology program launched to give peace a chance

Computer science and engineering students at Drexel University will have a new opportunity to use their skills for good with the launch of a technology program for promoting world peace.The Young Engineers Program, a partnership between the private university in Philadelphia and PeaceTech Lab in Washington, D.C., will give computer science and engineering students and researchers at Drexel a chance to focus on conflict zones around the world.The goal of the program is to use technology, media and data to prevent violent conflict in hot spots like Afghanistan, Sudan and Colombia, said Sheldon Himelfarb, president and CEO of the PeaceTech Lab.To read this article in full or to leave a comment, please click here

How To Do DevOps Without Leaving Legacy Behind

 

15-ANS-007_Blog_Post_DevOps_DerbyCar_1223x358

An increasingly apparent and large challenge in IT organizations is how teams can effectively modernize software development and IT operations while still operating and maintaining legacy infrastructure. Often the approach is to merely draw a line in the sand, creating an arbitrary cut-off whereby new implementations make use of the much desired DevOps and Agile methodology.

But what about the legacy environments?

Just because something is “legacy” doesn’t automatically mean that it’s twenty years old. Many so-called legacy systems were deployed mere months ago-- and on modern hardware, operating systems, and storage. For the sake of an agile organization, however, a legacy deployment or environment is anything that is not included in the new processes and approaches required for a DevOps-enabled organization.

The question remains: how can IT organizations successfully apply DevOps and Agile methodologies to existing legacy environments, and what are the benefits from doing this?

Start with the Infrastructure

Regardless of the type and variety of applications in an enterprise IT environment, there are likely many commonalities in the operating system and infrastructure components.

Manual OS build processes typically require significant admin-hours to deliver a single build. Additionally, the reliability of the result is a totally dependent Continue reading

Researchers find way to steal Windows Active Directory credentials from the Internet

An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the Black Hat security conference.The attack, called an SMB relay, causes a Windows computer that’s part of an Active Directory domain to leak the user’s credentials to an attacker when visiting a Web page, reading an email in Outlook or opening a video in Windows Media Player.Those credentials can then be used by the attacker to authenticate as the user on any Windows servers where the user has an account, including those hosted in the cloud.In an Active Directory network, Windows computers automatically send their credentials when they want to access different types of services like remote file shares, Microsoft Exchange email servers or SharePoint enterprise collaboration tools. This is done using the NTLM version 2 (NTLMv2) authentication protocol and the credentials that get sent are the computer and user name in plain text and a cryptographic hash derived from the user’s password.To read this article in full or to leave a comment, please click here

Update Firefox now! Fix rushed out for an exploit that steals files off your hard drive

Late Thursday night, Mozilla released a security patch for the Firefox browser after finding a  serious vulnerability being exploited in the wild. The vulnerability allows malicious attackers to use some JavaScript magic to “search for and upload potentially sensitive” from your hard drive to their servers.Mozilla is asking all Firefox users to upgrade immediately to version 39.0.3. Anyone on the Firefox Extended Support release via their school or business should upgrade to version 38.1.1. MORE ON NETWORK WORLD: Free security tools you should try The security issue only affects PCs since the flaw relies on an interaction between Firefox’s PDF Viewer and other parts of the browser. Firefox for Android does not have the PDF Viewer and therefore not vulnerable, according to a blog post by Mozilla’s security lead, Daniel Veditz.To read this article in full or to leave a comment, please click here

Nest Cam review: a slightly pricey way to secure your home

They say an ounce of prevention is worth a pound of cure. With Nest’s motion-sensing camera, that prevention will put a dent in your wallet.The Google-owned company, which makes a smart thermostat and smoke detector, recently launched its first home security camera, the Nest Cam. It offers higher-quality video and smarter motion detection than its predecessor, the Dropcam, which Nest acquired last year. But with a bunch of similar cameras on the market, some of which come with cheaper or even free cloud storage plans, the Nest Cam is not necessarily a smart buy.To read this article in full or to leave a comment, please click here

Purdue Research Park tenant offers Cisco certification prep classes

MERRILLVILLE, Ind. – Networking engineers in all industrial sectors who are preparing to take the Cisco Certified Internetwork Expert (CCIE) exam may benefit from a Purdue Research Park tenant that offers products and monthly preparation courses.

iPexpert Inc. is a tenant in the Purdue Research Park of Northwest Indiana that helps its clients prepare to take the CCIE Collaboration certification exam. Andy Vassar, senior technical instructor, said the prep courses are suitable for all networking professionals.

“Today, almost every company will have a networking engineer design and implement computer networks, and almost everyone runs Cisco Systems equipment in their network,” he said. “A CCIE certification is the most respected, sought-after certification in networking and there are many opportunities to use it. Those who earn it are considered the top experts in their profession.”

CCIE certification is available on several subjects including Routing and Switching, Data Center, Wireless and Security. Vassar said iPexpert classes at the Purdue Research Park of Northwest Indiana prepare attendees for the CCIE Collaboration certification, which covers communication via telephone, instant messenger and video.

“CCIE certification exams have two parts: passing the two-hour written test makes you eligible to take the eight-hour lab exam,” he said. Continue reading

iPexpert’s Newest “CCIE Wall of Fame” Additions 8/7/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Jaffar Nassiry, CCIE #49339 (Wireless)
  • John Meachum, CCIE #49353 (Wireless)
  • James Wheat, CCIE #49400 (Wireless)
  • Brian McPhail, CCIE #49246 (Route/Switch)
  • Abdelfattah Ali, CCIE #48195 (Route/Switch)
  • Daniel Lucas, CCIE #49361 (Route/Switch)
  • Ding So, CCIE #40685 (Wireless)
  • Leonardo Henrique, CCIE #49208 (Collaboration)
  • Thomas Bryant, CCIE #49458 (Collaboration)
  • Ramcharan Arya, CCIE #28926 (Data Center)
  • Muhammad Adil, CCIE #49504 (Data Center)

This Week’s Testimonials

Ramcharan Arya CCIE #28926 (Voice/R&S/DC)
I would like to say “Thank you”, I have passed CCIE Data Center Lab exam last week. Your training material is outstanding for beginners to become an expert in DC technology. Your workbook and proctor lab racks helps in gaining hands-on experience and prepare for lab exam.

Thomas Bryant CCIE #49458 (Collaboration)
Studying for the Collaboration Lab takes years of experience among actual lab study. As most voice focused engineers know, time is extremely precious and dedicating study time is not exactly easy. I took the 10 day boot camp near Chicago to solidify my knowledge and ensure I knew all of the technologies on the blueprint backwards and forwards before my attempt. I can Continue reading