Tuesday, July 29, 2014

Guns, vandals and thieves: US networks under attack

  BlackBerry buying German firm for voice encryption | Android vulnerability allows malware to compromise most devices and apps

 
  Network World After Dark

Forward this to a Friend >>>


Guns, vandals and thieves: US networks under attack
More than a thousand malicious acts have targeted the US telecoms infrastructure in recent years, FCC data shows Read More
 


: Smartling

Travel App Expands via Robust Translation Management System
Using Smartling's translation management platform, Hotel Tonight, a popular mobile travel app used to book same-day hotel stays, was able to grow its business internationally. In this case study, you'll learn about how Hotel Tonight was able to quickly expand into key tourism markets. Learn More

WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers
There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

BlackBerry buying German firm for voice encryption
The secure mobile vendor wants to be more secure.BlackBerry plans to buy a German vendor specializing in voice encryption, apparently to extend the technology to its government and high-security enterprise customers. Read More
 

Android vulnerability allows malware to compromise most devices and apps
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.The core problem is that Android fails to validate public key infrastructure certificate chains for app digital signatures, said Jeff Forristal, chief technology officer of Bluebox Security, a San Francisco company whose researchers discovered the issue.According to Google's documentation, Android applications must be signed in order to be installed on the OS, but the digital certificate used to sign them does not need to be issued by a digital certificate authority. "It is perfectly allowable, and typical, for Android applications to use self-signed certificates," the documentation says.To read this article in full or to leave a comment, please click here Read More
 

Abuse of Larry Ellison continues unabated
How much of this abuse does the Oracle board of directors expect its rock star CEO Larry Ellison to endure?How much of this could any CEO endure?First, Ellison saw his total compensation slashed 18% in 2013 over 2012.And now on top of that humiliation comes word in a regulatory filing that Oracle will be awarding Ellison fewer than half the stock options he has received in previous years.Oh, sure, the heartless and the hate-mongers will harp on the fact that the 18% reduction still left Ellison with a total compensation package worth $78.4 million, highest in the tech industry. They'll note that the 3 million stock options he's in line to receive, while no 7 million, remain nothing to sneeze at. And that his net worth of $42 billion makes him the third richest American.To read this article in full or to leave a comment, please click here Read More
 

NASA breakthrough improves 3D printing in space
NASA's new technique allows 3D printers to create one object composed of multiple types of materials. Read More
 

Flexibility, asking questions key for recent college graduates looking to advance in IT
Learning doesn't stop after graduation and becomes critical to keeping IT skills fresh and staying employable Read More
 

Senator pushes new version of bill to limit NSA phone records collection
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.The new version of Leahy's USA Freedom Act, introduced Tuesday, would ban bulk collection of U.S phone records by the NSA and would prohibit the agency from collecting all the information from a single telecom carrier or from a broad geographic region such as a city or zip code.Leahy, a Vermont Democrat, introduced the new version of the bill after the House passed a weakened version of the bill in May. The House version of the bill would allow the NSA to continue collect telephone and other records from large groups of people, critics said.To read this article in full or to leave a comment, please click here Read More
 

Canada blames China for cyber intrusion at National Research Council
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.It's not clear why the government believes that the attackers were state-sponsored, but the breach was discovered and confirmed with help from the Communications Security Establishment, Canada's foreign signals intelligence agency. The agency is also responsible for securing government communications.The National Research Council's computer networks are not part of the Canadian government's broader network and there is no evidence that data from the larger network was compromised, the Chief Information Officer for the Government of Canada said in a statement. Nevertheless, the research agency's networks have been isolated as a precaution.To read this article in full or to leave a comment, please click here Read More
 

Rocket Lab wants to make Model T of space satellite launchers
When it comes to blasting satellites into Low Earth Orbit, cost can be a major detriment.An Australian company called Rocket Labs is looking to fix that problem – at least for smaller satellite launches—with a carbon composite, 11-ton , 18 meter (about 60ft) tall rocket known as Electron that it says can blast payloads of about 100kg (about 220lbs) into LEO for about $5 million. The company says comparable flights would cost around $100 million.+More on Network World: Quick look: The hot Asian space industry+To read this article in full or to leave a comment, please click here Read More
 

Amazon Fire teardown pegs parts cost just below 32GB iPhone 5S
Parts for the 32GB Amazon Fire smartphone cost $205, just shy of the cost of parts of a similarly configured Apple iPhone 5S and well below the Samsung Galaxy S5, both with the same 32GB storage tally, according to teardowns done by IHS. The Fire, Amazon's first phone, runs a variant of Android similar to that used in the company's Kindle tablets. The Fire includes a Dynamic Perspective feature, enabled with four sensors on the phone's front, which makes it different from other phones. The Omnivision-supplied senors allow a user to interact by tilting the phone or moving his or her head, to provide 3D-like effects. Other features include a Firefly button for quick scanning of barcodes, QR codes and ordinary items to find information. There's also the Mayday button that's also part of the Kindle Fire HDX tablet. The button provides video access from the device to customer support within 15 seconds.To read this article in full or to leave a comment, please click here Read More
 

Majority of large ISPs now using monthly data caps, GAO says
U.S. broadband providers appear to be embracing monthly data caps, but customers are confused about the amount of data they use and broadband plan options, according to preliminary findings by the U.S. Government Accountability Office.The four largest U.S. mobile carriers and seven of the 13 largest wireline broadband providers have data-capped subscriptions in place, the GAO said. When customers exceed the data caps, three mobile carriers and three wired providers charge customers for additional data, while a fourth mobile carrier throttles connection speeds, the GAO said.The ISPs' move toward data caps raises concerns about what customers are getting in return, said Representative Anna Eshoo, a California Democrat who requested the GAO report. Broadband customers want to be able to stream videos, download music and use video-conferencing apps, and "they don't want it interrupted," she said.To read this article in full or to leave a comment, please click here Read More
 

The copper telephone line over time
My daughter, Emma, soon to be 13, is in the office with me today and I had some fun sharing with her a couple of facts from this Alcatel-Lucent infographic about the history of the copper telephone line. Two examples: In 1918 it took an average of 15 minutes just to set up a call and it wasn't until 1940 that telephone numbers allowed for direct customer dialing.I'm glad she didn't ask if I remembered these milestones. To read this article in full or to leave a comment, please click here Read More
 

Amazon warming up to hybrid clouds
Two years ago at the company's very-first ever Amazon re-Invent conference in Las Vegas, the chief of Amazon's cloud division Andy Jassy gave private clouds a bad rap.The headline from Network World's article the day after the conference: "Amazon bashes private clouds, launches virtual desktops."Jassy preached the values and benefits of a public-cloud approach. Private clouds offer none of the same benefits around scalability, initial cost and institutional security.But in the past year or so Amazon has changed its tune somewhat. It's not advocating for private clouds, but instead, it's acknowledging that big businesses may have data on their own premises that needs to interact with public-cloud based services. Perhaps there is data that is too difficult to move to the public cloud, but a program using an Amazon database needs to access it, for example.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 in November? Don't believe it

2. 10 amazing (and bizarre) drone discoveries

3. About those alleged backdoors in Microsoft products...

4. 17 obscure Windows tools and tricks too powerful to overlook

5. BYOA: Bring Your Own Authentication

6. Top 25 free tools for every Windows desktop

7. Cisco ready to ship ACI controller

8. Say goodbye to desktop phones

9. New products of the week 07.28.2014

10. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: