Update Firefox now! Fix rushed out for an exploit that steals files off your hard drive

Late Thursday night, Mozilla released a security patch for the Firefox browser after finding a  serious vulnerability being exploited in the wild. The vulnerability allows malicious attackers to use some JavaScript magic to “search for and upload potentially sensitive” from your hard drive to their servers.Mozilla is asking all Firefox users to upgrade immediately to version 39.0.3. Anyone on the Firefox Extended Support release via their school or business should upgrade to version 38.1.1. MORE ON NETWORK WORLD: Free security tools you should try The security issue only affects PCs since the flaw relies on an interaction between Firefox’s PDF Viewer and other parts of the browser. Firefox for Android does not have the PDF Viewer and therefore not vulnerable, according to a blog post by Mozilla’s security lead, Daniel Veditz.To read this article in full or to leave a comment, please click here

Nest Cam review: a slightly pricey way to secure your home

They say an ounce of prevention is worth a pound of cure. With Nest’s motion-sensing camera, that prevention will put a dent in your wallet.The Google-owned company, which makes a smart thermostat and smoke detector, recently launched its first home security camera, the Nest Cam. It offers higher-quality video and smarter motion detection than its predecessor, the Dropcam, which Nest acquired last year. But with a bunch of similar cameras on the market, some of which come with cheaper or even free cloud storage plans, the Nest Cam is not necessarily a smart buy.To read this article in full or to leave a comment, please click here

Purdue Research Park tenant offers Cisco certification prep classes

MERRILLVILLE, Ind. – Networking engineers in all industrial sectors who are preparing to take the Cisco Certified Internetwork Expert (CCIE) exam may benefit from a Purdue Research Park tenant that offers products and monthly preparation courses.

iPexpert Inc. is a tenant in the Purdue Research Park of Northwest Indiana that helps its clients prepare to take the CCIE Collaboration certification exam. Andy Vassar, senior technical instructor, said the prep courses are suitable for all networking professionals.

“Today, almost every company will have a networking engineer design and implement computer networks, and almost everyone runs Cisco Systems equipment in their network,” he said. “A CCIE certification is the most respected, sought-after certification in networking and there are many opportunities to use it. Those who earn it are considered the top experts in their profession.”

CCIE certification is available on several subjects including Routing and Switching, Data Center, Wireless and Security. Vassar said iPexpert classes at the Purdue Research Park of Northwest Indiana prepare attendees for the CCIE Collaboration certification, which covers communication via telephone, instant messenger and video.

“CCIE certification exams have two parts: passing the two-hour written test makes you eligible to take the eight-hour lab exam,” he said. Continue reading

iPexpert’s Newest “CCIE Wall of Fame” Additions 8/7/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Jaffar Nassiry, CCIE #49339 (Wireless)
  • John Meachum, CCIE #49353 (Wireless)
  • James Wheat, CCIE #49400 (Wireless)
  • Brian McPhail, CCIE #49246 (Route/Switch)
  • Abdelfattah Ali, CCIE #48195 (Route/Switch)
  • Daniel Lucas, CCIE #49361 (Route/Switch)
  • Ding So, CCIE #40685 (Wireless)
  • Leonardo Henrique, CCIE #49208 (Collaboration)
  • Thomas Bryant, CCIE #49458 (Collaboration)
  • Ramcharan Arya, CCIE #28926 (Data Center)
  • Muhammad Adil, CCIE #49504 (Data Center)

This Week’s Testimonials

Ramcharan Arya CCIE #28926 (Voice/R&S/DC)
I would like to say “Thank you”, I have passed CCIE Data Center Lab exam last week. Your training material is outstanding for beginners to become an expert in DC technology. Your workbook and proctor lab racks helps in gaining hands-on experience and prepare for lab exam.

Thomas Bryant CCIE #49458 (Collaboration)
Studying for the Collaboration Lab takes years of experience among actual lab study. As most voice focused engineers know, time is extremely precious and dedicating study time is not exactly easy. I took the 10 day boot camp near Chicago to solidify my knowledge and ensure I knew all of the technologies on the blueprint backwards and forwards before my attempt. I can Continue reading

Microsoft’s NFL partnership enters next generation with new apps

With the start of the U.S. professional football season around the corner, Microsoft unveiled the new tech it’s going to be providing coaches and fans this season as part of its ongoing partnership with the National Football League.Fans get an updated NFL app for the Xbox One and Windows 10 that provides them with video content, stats, replays and fantasy football information about their favorite teams, while coaches and players will be using new Surface Pro 3 tablets that help them strategize on the sidelines.The Xbox One app is designed to be a command center that fans can open up to get information about their favorite teams, fantasy leagues and all things NFL right from their couch. It’s an update to the app Microsoft released last year that provided fans with videos from their favorite teams, information about their fantasy teams and access to live video from the NFL if they pay for the right TV channels. Starting this year, users can now pick out two favorite teams instead of one, so they can easily follow their hometown favorites along with a local franchise.To read this article in full or to leave a comment, please click here

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks -- they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other security experts.These countries included Ukraine, Turkey, Georgia, and OPEC members, according to FBI special agent Elliott Peterson.The gang, which called itself Business Club, had two leaders, one of whom was Evgeniy Bogachev who is still uncaught. The FBI is offering a $3 million reward for information leading to Bogachev’s arrest.[ Follow all the stories out of Black Hat 2015 ]To read this article in full or to leave a comment, please click here

Quick rundown of all the tech talk in last night’s GOP presidential debate

There was no tech talk in last night’s GOP presidential debate.I told you it would be a quick rundown.The San Francisco Chronicle uses a few more words: The most significant reference to technology or Silicon Valley during Thursday’s televised Republican presidential debate came during a commercial for an upcoming movie about Apple founder Steve Jobs.In the main debate between the 10 leading candidates in the polls, the word “technology” wasn’t uttered once. Other than Florida Sen. Marco Rubio making a quick mention that he alone understands the “disruptive changes” caused by tech businesses like Amazon, there was scant discussion of the innovation economy.To read this article in full or to leave a comment, please click here

VMworld 2015 Networking and Security Sessions – Part II

Earlier this week we outlined #VMworld sessions on networking and security that are appropriate for attendees who are just starting down the path to virtualizing their networks with NSX. The beauty of having a solution that has been shipping for nearly two years to more than 700 customers is that we have tons of advanced topics that we can now cover as part of the show program. So take a look at the list of sessions below, and then check out the schedule builder on VMworld.com to organize your week. We’re looking forward to seeing you at VMworld US 2015.

vmworld2015-logo-black

Day Time Session ID Session Title

Sunday, 8/30

2:00 PM - 2:30 PM

NET6614-QT

Implementation of NSX: Decisions and Outcomes

3:00 PM - 3:30 PM

NET6615-QT

Extending the Power of Software Defined Networking to the Retail Branch

4:00 PM - 4:30 PM

NET6616-QT

Creating the SDDC for Healthcare

Monday, 8/31

9:00 AM – 10:30 AM

General Session: Keynote

10:30 AM – 12:30 PM

SPL-SDC-1624

Hands on Labs:

VMware NSX and the vRealize Suite

12:30 PM - 1:30 PM

NET6053

The Case for Network Virtualization:

Customer Case Study

2:00 PM - 3:00 PM *choose one session

NET4989

The Future of Continue reading

New malware turns your computer into a cellular antenna

A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.To read this article in full or to leave a comment, please click here

Design flaw in Intel processors opens door to rootkits, researcher says

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute.By leveraging the flaw, attackers could install a rootkit in the processors System Management Mode (SMM), a protected region of code that underpins all the firmware security features in modern computers.To read this article in full or to leave a comment, please click here

Microsoft, Salesforce.com join $5.3 billion Informatica buyout

Data-integration giant Informatica has made itself a private company in a $5.3 billion deal that includes investments from Microsoft and Salesforce.com.The deal, said to be the biggest leveraged buyout this year, means Informatica’s stock ceased trading on the Nasdaq on Thursday. In exchange, Informatica stockholders are getting $48.75 per share in cash.It’s part of a trend in which companies have been taking themselves private to make themselves more competitive. Dell, Tibco Software, Riverbed and Compuware have all made similar moves.To read this article in full or to leave a comment, please click here

Carly Fiorina calls on Apple, Google to provide greater access for FBI

Republican presidential candidate and former tech-executive Carly Fiorina has called on Apple and Google to provide greater access to information about their users to the FBI and law enforcement in order to aid investigations.Speaking Thursday in a televised debate in Cleveland organized by Fox News Channel, the former CEO of Hewlett-Packard said restrictions that prevent private companies and law enforcement from working together need to be changed.“I certainly support that we need to tear down cyber walls, not on a mass basis but on a targeted basis,” she said in response to a question from a moderator.“I do not believe that we need to wholesale destroy every American citizen’s privacy in order to go after those that we know are suspect or already a problem, but yes, there is more collaboration required between private sector companies and the public sector and specifically we know that we could have detected and repelled some of these cyber attacks if that collaboration had been permitted,” she said.To read this article in full or to leave a comment, please click here