OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Internet Leeches Drawn to Heartbleed
April 14, 2014
It's been more than a week since news of the Heartbleed flaw launched a frantic scramble on the Web, but security professionals' palpitations haven't subsided. The OpenSSL Software Foundation has issued a fix, and Google, Cisco, and hordes of other companies have begun patching their products. Predictably, scammers and spammers have climbed onto the Heartbleed solution bandwagon.
XP Users Have a Bad Headache Coming On
April 07, 2014
Money will be the biggest problem users of Windows XP will face when Microsoft officially stops supporting it on Tuesday. As a last resort, Microsoft is offering custom support for Windows XP as a temporary stopgap. That could cost as much as $200 per PC per year, Gartner estimated. The UK government reportedly has paid Microsoft about $9 million to extend Windows XP support for one year.
Clock Counting Down on Windows XP Support
April 01, 2014
As Microsoft prepares to cut off support for Windows XP, hackers are sharpening their knives in anticipation of carving up the operating system's carcass. Web predators will pounce on XP 10 minutes after Microsoft pulls the support plug on the software, predicted one former military computer specialist and network engineer. Indeed, it appears that information highwaymen are stockpiling ammunition.
Easing DevOps Snafus in the Cloud Era
February 21, 2014
As developers are pressured to produce mobile and distributed cloud apps ever faster and with more network unknowns, the older methods of software quality control can lack sufficient predictability. And as Agile development means faster iterations and a constant stream of updates, newer means of automated testing of the apps in near-production realism prove increasingly valuable.
Google May Let 34 More Cities Munch on Fiber
February 20, 2014
Google has revealed plans to expand its Google Fiber Internet service to as many as 34 new cities. Google Fiber offers connection speeds of up to 1,000 Mbps -- around 100 times faster than the average U.S. speeds of 9.8 Mb/sec, according to Akamai -- by providing service through fiber-optic cables instead of copper wiring. Google's service also delivers high-definition television.
Feds' Shift to Mobile Creates Security Cracks
February 05, 2014
Federal employees quickly have become strong adherents of mobile devices. In a recent survey, 90 percent of government employees said they used at least one mobile device -- laptop, smartphone or tablet -- for work purposes. However, the enthusiasm by federal workers for the use of mobile devices has not been matched by appropriate concerns for security.
Target Fiasco Shines Light on Supply Chain Attacks
February 03, 2014
The holiday data breach at Target was opened up with stolen credentials from a vendor in the company's supply chain, according to reports that surfaced last week. That kind of attack is getting more and more common these days. "About 80 percent of data breaches originate in the supply chain," said Torsten George, vice president of marketing for Agiliance.
IT Weaknesses Paved the Way for Target Hackers
January 30, 2014
The Target data breach exposed more than 100 million customers, riled up U.S. intelligence agencies, sparked a Justice Department investigation, involved the U.S. Department of Homeland Security and the FBI, triggered congressional hearings, and led several banks to re-issue their credit cards. The hacker has variously been identified as a 17-year-old Russian or one or more other cybercriminals.
Google Joins Enterprise Cloud Slugfest in Earnest
December 03, 2013
The Google Compute Engine became generally available on Tuesday, almost 18 months after its introduction at last year's Google I/O. "We have been taking time and doing careful work to ensure that as we open Compute Engine to developers, they have a great experience with things like billing and support, tools, and our operating system support," said Google spokesperson Elizabeth Markman.
NSA's Malware Infection Spree Leaves Network Managers Powerless
November 26, 2013
The United States National Security Agency reportedly has seeded 50,000 networks worldwide with malware designed to steal sensitive information. The report -- the latest in a series of published disclosures based on documents released by Snowden -- is likely to fuel the controversy raging around cybersurveillance by the U.S. and its allies -- the UK, Australia, New Zealand and Canada.
Feds Hankering for Mobile IT Management Solutions
October 09, 2013
The acquisition process for the latest innovation must keep pace with the ever changing IT landscape. In the public sector, that process has surfaced in acquisition vehicles related to cloud technology, data management and IT security. For the U.S. government, the GSA has become a focal point for developing contract vehicles and programs to facilitate the acquisition of innovative IT.
BYOD Security Is All About Juggling Risks
September 23, 2013
Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed. What should such a risk management program do? "The first step is you have to protect the device," said IBM Application, Data and Mobile Security Director Caleb Barlow. That includes everything from provisioning to data wiping.
Cracking the BYOD Security Nut
September 23, 2013
While so-called BYOD isn't necessarily new -- IT departments, after all, have been supporting mobile road warriors since the 1980s -- the rising tide of end users seeking the use and support of their own consumer devices is different. It's so different that IT departments are grasping for any standard or proven approaches that make BYOD access of enterprise resources both secure and reliable.
Federal Networks Can't Handle Planned IT Upgrades
September 18, 2013
Ambitious plans to improve federal information technology systems could easily founder on the shoals of deficient networks. Government agencies currently are striving to meet the challenges associated with initiatives in five major areas: cloud technology; Big Data management; cybersecurity requirements; data center consolidation; and, increasingly, mobile IT.
Needle in a Haystack: Harnessing Big Data for Security
September 14, 2013
The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible. Until now, security has been based largely on the opinions of researchers who investigate attacks.
No End to the Headaches Endpoints Give System Defenders
September 03, 2013
If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.
4 Quick and Dirty SaaS Technical Controls
September 03, 2013
Because of the rapid pace of SaaS adoption, many security practitioners have found themselves scrambling to ensure the security of the specific technologies their enterprises want to employ. However, the dynamics of SaaS can make this a challenging exercise. This is because most of the options for specific security controls are, by necessity, of the contractual or procedural variety.
AWS: The Cloud Is Falling
August 26, 2013
Amazon Web Services were impacted in some areas on Sunday, six days after Web stores in the U.S. and Canada went down for about 30 minutes, causing losses estimated at up to $45 million. The latest outage lasted about an hour and impacted Facebook's Instagram, Twitter's Vine and Airbnb, among others. Amazon blamed the problem on a networking device that caused packet losses, which it replaced.
Major US Media Succumb to Unsophisticated Syrian Hack Attacks
August 16, 2013
The Syrian Electronic Army on Thursday claimed credit for hack attacks that took control of portions of a handful of major U.S. news sites via an article-recommendation service they all use. SEA reportedly gained control of them by entering an administration portal for Outbrain and inserting links in some of the recommended articles at the bottom of the Web page, thereby redirecting readers to its own site.
Google Changes Net Neutrality Tune in Fiber Spat
July 31, 2013
The FCC is looking into a complaint that Google Fiber's ban on hosting computer servers on its network violates its Open Internet Order and Rules. Google Fiber told the FCC, among other things, that its policy was fully consistent with the Order and Rules, but critics contend the company has done an about-face on its previously vociferous support for Net neutrality.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS