Microsoft’s NFL partnership enters next generation with new apps

With the start of the U.S. professional football season around the corner, Microsoft unveiled the new tech it’s going to be providing coaches and fans this season as part of its ongoing partnership with the National Football League.Fans get an updated NFL app for the Xbox One and Windows 10 that provides them with video content, stats, replays and fantasy football information about their favorite teams, while coaches and players will be using new Surface Pro 3 tablets that help them strategize on the sidelines.The Xbox One app is designed to be a command center that fans can open up to get information about their favorite teams, fantasy leagues and all things NFL right from their couch. It’s an update to the app Microsoft released last year that provided fans with videos from their favorite teams, information about their fantasy teams and access to live video from the NFL if they pay for the right TV channels. Starting this year, users can now pick out two favorite teams instead of one, so they can easily follow their hometown favorites along with a local franchise.To read this article in full or to leave a comment, please click here

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks -- they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other security experts.These countries included Ukraine, Turkey, Georgia, and OPEC members, according to FBI special agent Elliott Peterson.The gang, which called itself Business Club, had two leaders, one of whom was Evgeniy Bogachev who is still uncaught. The FBI is offering a $3 million reward for information leading to Bogachev’s arrest.[ Follow all the stories out of Black Hat 2015 ]To read this article in full or to leave a comment, please click here

Quick rundown of all the tech talk in last night’s GOP presidential debate

There was no tech talk in last night’s GOP presidential debate.I told you it would be a quick rundown.The San Francisco Chronicle uses a few more words: The most significant reference to technology or Silicon Valley during Thursday’s televised Republican presidential debate came during a commercial for an upcoming movie about Apple founder Steve Jobs.In the main debate between the 10 leading candidates in the polls, the word “technology” wasn’t uttered once. Other than Florida Sen. Marco Rubio making a quick mention that he alone understands the “disruptive changes” caused by tech businesses like Amazon, there was scant discussion of the innovation economy.To read this article in full or to leave a comment, please click here

VMworld 2015 Networking and Security Sessions – Part II

Earlier this week we outlined #VMworld sessions on networking and security that are appropriate for attendees who are just starting down the path to virtualizing their networks with NSX. The beauty of having a solution that has been shipping for nearly two years to more than 700 customers is that we have tons of advanced topics that we can now cover as part of the show program. So take a look at the list of sessions below, and then check out the schedule builder on VMworld.com to organize your week. We’re looking forward to seeing you at VMworld US 2015.

vmworld2015-logo-black

Day Time Session ID Session Title

Sunday, 8/30

2:00 PM - 2:30 PM

NET6614-QT

Implementation of NSX: Decisions and Outcomes

3:00 PM - 3:30 PM

NET6615-QT

Extending the Power of Software Defined Networking to the Retail Branch

4:00 PM - 4:30 PM

NET6616-QT

Creating the SDDC for Healthcare

Monday, 8/31

9:00 AM – 10:30 AM

General Session: Keynote

10:30 AM – 12:30 PM

SPL-SDC-1624

Hands on Labs:

VMware NSX and the vRealize Suite

12:30 PM - 1:30 PM

NET6053

The Case for Network Virtualization:

Customer Case Study

2:00 PM - 3:00 PM *choose one session

NET4989

The Future of Continue reading

New malware turns your computer into a cellular antenna

A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.To read this article in full or to leave a comment, please click here

Design flaw in Intel processors opens door to rootkits, researcher says

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute.By leveraging the flaw, attackers could install a rootkit in the processors System Management Mode (SMM), a protected region of code that underpins all the firmware security features in modern computers.To read this article in full or to leave a comment, please click here

Microsoft, Salesforce.com join $5.3 billion Informatica buyout

Data-integration giant Informatica has made itself a private company in a $5.3 billion deal that includes investments from Microsoft and Salesforce.com.The deal, said to be the biggest leveraged buyout this year, means Informatica’s stock ceased trading on the Nasdaq on Thursday. In exchange, Informatica stockholders are getting $48.75 per share in cash.It’s part of a trend in which companies have been taking themselves private to make themselves more competitive. Dell, Tibco Software, Riverbed and Compuware have all made similar moves.To read this article in full or to leave a comment, please click here

Carly Fiorina calls on Apple, Google to provide greater access for FBI

Republican presidential candidate and former tech-executive Carly Fiorina has called on Apple and Google to provide greater access to information about their users to the FBI and law enforcement in order to aid investigations.Speaking Thursday in a televised debate in Cleveland organized by Fox News Channel, the former CEO of Hewlett-Packard said restrictions that prevent private companies and law enforcement from working together need to be changed.“I certainly support that we need to tear down cyber walls, not on a mass basis but on a targeted basis,” she said in response to a question from a moderator.“I do not believe that we need to wholesale destroy every American citizen’s privacy in order to go after those that we know are suspect or already a problem, but yes, there is more collaboration required between private sector companies and the public sector and specifically we know that we could have detected and repelled some of these cyber attacks if that collaboration had been permitted,” she said.To read this article in full or to leave a comment, please click here

OSX, Outlook 2011 and Evernote

If you are using Outlook and Evernote on the Mac, check out the article below. It outlines an AppleScript that allows the user to press Command+E to add an email, or selected portion of an email to Evernote.

As I implemented this, I did run into a couple of caveats. My suggestion is to make sure to read the comments in the script and to relaunch Outlook between changes. Thanks to Justin Lancy for a great tip.

I’d love to hear from you, so share your thoughts by commenting below.

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may does not reflect the position of past, present or future employers.

No related content found.

The post OSX, Outlook 2011 and Evernote appeared first on PacketU.

IPv4 Address Exhaustion in APNIC

It has been over 4 years since APNIC, the Regional Internet Registry for the Asia Pacific Region handed out its last “general use” allocation of IPv4 addresses. Since April 2011 APNIC has been restricted to handing out addresses from a “last chance” address pool, and has limited the amount of addresses allocated to each applicant. In this article I’d like to review where APNIC is up to with its remaining pools of IPv4 addresses.

Web Real Time Communication (WebRTC) applications emerge as the tech stabilizes

Perhaps the single-most significant standards based technological advancement in the field of unified communications over the past year has been the completion of Web Real Time Communication (WebRTC) standard and the appearance of several WebRTC based implementations.

WebRTC 1.0 APIs are defined by the World Wide Web Consortium (W3C) and the IETF (Internet Engineering Taskforce) RTCWeb Working Group, and they make it possible for Web browsers to support voice calling, video chat, and peer-to-peer connections.

There has been considerable stabilization of the WebRTC browser implementation over the past year or so, enabling much more robust WebRTC apps to be developed. On the other hand, there still remains considerable and substantial work to be done on the IETF protocols for WebRTC.  

To read this article in full or to leave a comment, please click here

Tesla patches Model S after researchers hack car’s software

Tesla has issued a security update to its Model S car after security researchers discovered six flaws that allowed them to control its entertainment software and hijack the vehicle.With access to the entertainment software, Kevin Mahaffey, CTO of security startup Lookout, and Marc Rogers, a security researcher at CloudFlare, turned off the engine while a person was driving, changed the speed and map information displayed on the touchscreen, opened and closed the trunk and controlled the radio.The pair, who will discuss their findings Friday at the DEF CON hacking conference in Las Vegas, also uploaded a remote access application that allowed them to lock and unlock the car using an iPhone.To read this article in full or to leave a comment, please click here

Tesla patches Model S after researchers hack car’s software

Tesla has issued a security update to its Model S car after security researchers discovered six flaws that allowed them to control its entertainment software and hijack the vehicle.With access to the entertainment software, Kevin Mahaffey, CTO of security startup Lookout, and Marc Rogers, a security researcher at CloudFlare, turned off the engine while a person was driving, changed the speed and map information displayed on the touchscreen, opened and closed the trunk and controlled the radio.The pair, who will discuss their findings Friday at the DEF CON hacking conference in Las Vegas, also uploaded a remote access application that allowed them to lock and unlock the car using an iPhone.To read this article in full or to leave a comment, please click here