Adobe patches zero-day Flash Player flaw used in targeted attacks

Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.Over the past several weeks, a hacker group identified as APT3 by security firm FireEye has used the vulnerability to attack organizations from the aerospace, defense, construction, engineering, technology, telecommunications and transportation industries.The hacking group targeted the companies with generic phishing emails that contained a link to a compromised server, researchers from FireEye said in a blog post Tuesday. The server used JavaScript code to profile potential victims and then served the Flash exploit to the ones meeting attackers’ criteria, the company said.To read this article in full or to leave a comment, please click here

Silver Peak Launches EdgeConnect SD-WAN Product

Silver Peak gets into the SD-WAN market with Unity EdgeConnect, a new product that aims to make it easier to provision, manage, and monitor WAN connectivity for remote and branch offices.

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Silver Peak Launches EdgeConnect SD-WAN Product appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.

Docker: Ready for Production

DockerCon Day 1 was filled with several exciting announcements, including the Open Container Project, Docker Network, Docker Platform 1.7, and container runtime runC.  DockerCon Day 2 builds on this, with an emphasis on the solutions that we are building on that complement the … Continued

Arista Gets An SDN Strategy With CloudVision

In 2014, Arista was telling me that SDN was "Still Don't kNow" and "Still Does Nothing". In 2015, Arista releases their CloudVision™ SDN controller for cloud networks.

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Arista Gets An SDN Strategy With CloudVision appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Wrap-up: Day 1 of DockerCon 2015

Wow, what an awesome start to DockerCon 2015! With over 2100 attendees, yesterday was a great day of Docker learning, meeting the global Docker community, and more! Inspiration from @solomonstre: innovation requires making tools available; programming enables creativity. #dockercon pic.twitter.com/POgyDGEt8M … Continued

IT pros blast Google over Android’s refusal to play nice with IPv6

Two trains made of fiber, copper and code are on a collision course, as the widespread popularity of Android devices and the general move to IPv6 has put some businesses in a tough position, thanks to Android’s lack of support for a central component in the newer standard. DHCPv6 is an outgrowth of the DHCP protocol used in the older IPv4 standard – it’s an acronym for “dynamic host configuration protocol,” and is a key building block of network management. Nevertheless, Google’s wildly popular Android devices – which accounted for 78% of all smartphones shipped worldwide in the first quarter of this year – don’t support DHCPv6 for address assignment.To read this article in full or to leave a comment, please click here

Signs of the times: 2 unexpected ways technology is changing the world

Last week, I came across two technology stories so strange yet so compelling I felt like they should come from the Weekly World News or some schlocky science fiction novel. But no, they both showed up in the Gray Lady. Taken together, their appearance in that most mainstream of newspapers, the New York Times, points to a world where technology is forcing us to rethink just about everything we thought we knew about how things work.Forget about distracted driving First, there was this story about how Utah Valley University was so worried about students walking around campus with their noses buried in their smartphones that it created a texting-and-walking lane in a stairway in its campus life and wellness center.To read this article in full or to leave a comment, please click here

Signs of the times: 2 unexpected ways technoloy is changing the world

Last week, I came across two technology stories so strange yet so compelling I felt like they should come from the Weekly World News or some schlocky science fiction novel. But no, they both showed up in the Gray Lady.Taken together, their appearance in that most mainstream of newspapers, the New York Times, points to a world where technology is forcing us to rethink just about everything we thought we knew about how things work.Forget about distracted driving First, there was this story about how Utah Valley University was so worried about students walking around campus with their noses buried in their smartphones that it created a texting-and-walking lane in a stairway in its campus life and wellness center.To read this article in full or to leave a comment, please click here

Getting Started With Ansible for Cisco IOS

Ansible is well-known for it’s low entry threshold. All what’s required to get started is just one inventory file. However Cisco IOS devices require special considerations. Passwordless SSH RSA-based authentication is still a novelty and in most cases users are authenticated based on their passwords. Another problem is the lack of Python execution environment on IOS devices, which seriously limits the choice of Ansible modules that can be used. In this post I will show how to setup Ansible environment to control Cisco IOS devices

Continue reading

The government is falling behind on application security

Government organizations are struggling when it comes to securing the computer software they use, which could partially explain the large data breaches reported in that sector over the past several years.Three out of four applications used by government organizations are not compliant with one of the primary software security policies and most of the flaws found in them never get fixed, according to a report released Tuesday by U.S.-based application security firm Veracode.The report is based on an analysis of more than 200,000 applications over the past 18 months that are used by organizations in various industries. The tests were performed using Veracode’s cloud-based application security testing platform that uses static analysis, dynamic analysis and manual penetration testing techniques.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Report: ISPs slowing internet service on purpose

Major internet Service Providers (ISPs) like AT&T and Time Warner are intentionally slowing internet service for U.S. customers, according to the Guardian.The newspaper cites a study by BattleFortheNet, a pro-net neutrality activist internet group.Degraded service The report, released on Monday, "looked at results from 300,000 internet users and found significant degradations on the networks of the five largest internet service providers," the Guardian says.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, June 23

Privacy group wants Uber probed for data collectionThe Electronic Privacy Information Center has complained to the U.S. Federal Trade Commission about Uber’s new data collection policy: it comes into effect next month and allows the company to access a customer’s location even when the smartphone app is not actively in use, and to access the information from users’ phone address books and send out promotional materials to contacts listed there. The changes “ignore past bad practices of the company involving the misuse of location data, pose a direct risk of consumer harm, and constitute an unfair and deceptive trade practice,” EPIC said in its request for an FTC investigation.To read this article in full or to leave a comment, please click here

Google’s 60Tbps Pacific cable welcomed with champagne in Japan

With bottles of bubbly and a purification ceremony, a Google-backed undersea cable was given a warm welcome on a beach in Japan last week, a critical step in building the highest capacity data link in the Pacific ever created.The 9,000-kilometer FASTER cable will have a peak capacity of 60 terabytes per second (Tbps) when it enters operation next year, joining Japan with Oregon on the West Coast of the U.S.Apart from Google, the project is backed by telecom carriers KDDI of Japan, SingTel of Singapore, Global Transit of Malaysia, China Mobile International and China Telecom Global.At the landing site in Shima, Mie Prefecture, east of Osaka, a machine pulled the cable onto the beach from an offshore cable-laying ship while stacks of armored pipes, which shield the link from anchors near the shore, were piled nearby.To read this article in full or to leave a comment, please click here