Under DDoS attack? Look for something worse

When businesses are hit by noticeable distributed denial-of-service attacks, three-quarters of the time those attacks are accompanied by another security incident, according to Kaspersky Lab.Those other attacks may or may not originate from the same party, but they can go undetected if IT staff is totally focused on defending against the DDoS, says Evgeny Vigovsky, head of Kaspersky DDoS Protection.“In many cases, it may be a coordinated effort, but even if these attacks originate from different sources, IT staff have to allocate resources to solve two problems at the same time, under a lot of stress,” Vigovsky says. Kaspersky polled top managers and IT pros at 5,500 companies in 26 countries about their experiences with DDoS attacks.To read this article in full or to leave a comment, please click here

Celebrating 25 years of wacky Ig Nobel Prize brilliance

25 years oldEach year since 1991, Improbable Research has highlighted a handful of real researchers whose work might seem goofy on the surface, but often has serious implications. The Ig Nobel prizes are awarded annually at a ceremony at Harvard University shortly before the Nobel prizes are announced. Here’s a look at a winner from each of the past 24 years, with the 2015 prize winners being announced tonight.To read this article in full or to leave a comment, please click here

Celebrating 25 years of wacky Ig Nobel Prize brilliance

25 years oldEach year since 1991, Improbable Research has highlighted a handful of real researchers whose work might seem goofy on the surface, but often has serious implications. The Ig Nobel prizes are awarded annually at a ceremony at Harvard University shortly before the Nobel prizes are announced. Here’s a look at a winner from each of the past 24 years, with the 2015 prize winners being announced tonight.To read this article in full or to leave a comment, please click here

Malware enables cheating at online poker

Online poker malware lets players cheat by getting a peek at cards held by opponents whose machines have been infected.The Trojan, called Win32/Spy.Odlanor, is typically downloaded by victims because it is disguised as installers or resources such as poker databases and poker calculators, according to the ESET WeLiveSecurity blog.“In other cases, it was loaded onto the victim’s system through various poker-related programs … such as Tournament Shark, Poker Calculator Pro, Smart Buddy, Poker Office, and others,” the blog says.Once installed it grabs screenshots of the PokerStars and Full Tilt Poker clients, letting the attackers see what cards the victim holds. In order to carry out the scam, the cheaters have to find and join the table at which the infected machine is playing.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What does a next-generation WAN look like?

After years of sitting in the shadow of virtualization, SaaS, containers, and all the other exciting IT trends, the wide area network is finally getting some attention. These other trends are actually drivers for this change in many cases; while WAN architectures have remained relatively static in recent years, the applications they need to support have changed beyond recognition. This is driving the need to re-think what the WAN looks like and how it operates.The phrase 'next-generation WAN' will mean different things to different enterprises, but let's identify some of the characteristics that are starting to become more common. Some of these are new, but in many cases the next-generation WAN is a new network methodology or mindset. This can impact the technologies used, insourcing/outsourcing decisions, and functionality provided by the network.To read this article in full or to leave a comment, please click here

Breach Presumption: The East-West Data Center Security Problem

A recurring trend in security briefings I've taken over the last year is that breaches are assumed. If you don't assume your infrastructure has been breached, you're ignorant, and probably willfully so. Ostrich, meet sand. A weird response my brain had to this is to ponder that if we've lost the war, why are we still fighting?

Fiber bandits: FBI hunting serial fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

Fiber bandits: FBI hunting repeated fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

The Texas Tribune: Our Docker Journey

written by Daniel Craigmile, System Architect at The Texas Tribune  We’re fans of Docker at The Texas Tribune. We’ve been playing with it since well before the 1.0 release and immediately started incorporating it into our infrastructure when the first production-ready code … Continued