Security in Cloud Networking

Enterprises are grappling with security in their infrastructure and many point products try to solve this in different use -cases. As enterprises migrate from north-south to east-west traffic patterns, the need for consistent security across cloud-network and firewall infrastructure is paramount. Furthermore, additional security concerns emerge as organizations contemplate leveraging access to the public cloud...
Continue reading »

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.Gianni Gnesa was scheduled to give a presentation titled "Abusing Network Surveillance Cameras" on Oct. 14 at the Hack in the Box GSEC conference in Singapore.Internet-connected video camera, or IP cameras, are widely used for security systems, offering the advantage that footage can be streamed anywhere remotely. But anything connected to the Internet poses risks if not properly secured. IP cameras, like this one made by Shenzhen Shixin Digital, are widely used in the security industry.To read this article in full or to leave a comment, please click here

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.The flaws were found by security company Zimperium, which also unearthed the original Stagefright flaws in April.In an advisory Monday, Google said it didn't appear that attackers have started exploiting the vulnerabilities yet.The latest flaws are only slightly less dangerous than their predecessors, which allowed a device to be compromised merely by sending a specially crafted multimedia message (MMS). An attacker needed only to know the victim's phone number.To read this article in full or to leave a comment, please click here

A Few Points About VMware EVO SDDC Networking

A Packet Pushers listener that heard us chatting about VMware's EVO SDDC solution raised a few concerns about the networking functionality in the current version of EVO SDDC. I was able to talk briefly with Krish Sivakumar, Director of Product Marketing, EVO SDDC & Ven Immani, Senior Technical Marketing Engineer, EVO SDDC at VMware to help clarify some of the issues.

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.+More on Network World: Gartner: Get onboard the algorithm train!+The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.To read this article in full or to leave a comment, please click here

1 More Reason To Be Wary of Sky High Drones (See Video)

Even wireless LANs located many stories from the ground in skyscraper offices might not be safe from hackers -- if the hackers are armed with drones. So say researchers in Singapore, a country where skyscrapers are plentiful.In this video, researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology And Design, show how attackers could infiltrate a wireless printer using a personal drone and an Android phone outfitted with a special app.MORE: New super-precise drones could win over wireless carriersTo read this article in full or to leave a comment, please click here

IDG Contributor Network: More data breaches caused by lost devices than malware or hacking, Trend Micro says

Prices are dropping for Personally Identifiable Information (PII) on the Dark Web. One likely reason is a surplus of the data; cybercriminals have been too successful gathering the stuff. Criminals can now purchase PII for $1 a line — that's down from $4 just a year ago, Trend Micro reported in its new research paper. Each line contains a name, a full address, a date of birth, a Social Security number, and other information. Criminals only need a few lines to clone an identity.Studying stolen data Trend Micro analyzed a decade's worth of data breach information in its new report, "Follow the Data, Dissecting Data Breaches and Debunking the Myths' (PDF).To read this article in full or to leave a comment, please click here

AT&T adds Juniper SDN controller

AT&T has added Juniper Networks’ controller to its SDN. Juniper’s Contrail controller will provide SDN control of AT&T’s Integrated Cloud infrastructure.AT&T will use Contrail to help automate and virtualize the network for deployment of new services. AT&T is also using Brocade’s Vyatta controller in its Network on Demand service.Juniper says Contrail is based on its Open Contrail open source software, and allows AT&T to incorporate new capabilities into its network while decreasing development time and cost.To read this article in full or to leave a comment, please click here

Gartner: Get onboard the algorithm train!

ORLANDO -- Algorithms are hot and will be a major driver in the future of IT and business. That was the driving thought from the opening keynote session at this week’s Gartner Symposium/IT Expo.In five years 1 million new devices will come online every hour and these devices will create billions of new relationships. These relationships are not driven solely by data but algorithms, said Peter Sondergaard senior vice president of research withGartner.+More on Network World: Gartner: Top 10 Technology Trends for 2015 IT can’t ignore+To read this article in full or to leave a comment, please click here