Search This Blog

Tuesday, June 30, 2015

Dell Teaching and Learning Academy Focuses on Educators’ Instructional Needs | Dell

Dell Teaching and Learning Academy Focuses on Educators’ Instructional Needs | Dell

NetSuite Transforms Akustica's Global Supply Chain Performance

Microphone Manufacturer Named to the Prestigious 2015 List of 100 Great Supply Chain Projects by Supply & Demand Chain Executive Magazine



NetSuite Transforms Akustica's Global Supply Chain Performance

What is a Hack? | Fortinet Blog

Much to the chagrin of actual hackers, the term “hacking” has been co-opted in countless ways that bear little resemblance to actually breaking into computer systems. An intrepid homeowner might be a DIY hacker. Makers rarely object to the hacker moniker. Savvy homeschooling parents are hacking their children’s education and Silicon Valley entrepreneurs are hacking their brains with supplements and stimulants.



What is a Hack? | Fortinet Blog

Is the Samsung Galaxy Note 4 a Good Match for Small Businesses?

Within the Galaxy Note series, the S Pen is still its main selling point. The line includes the Galaxy Note 8.0 mini tablet and the Galaxy Note Edge smartphone. This time around, a few software enhancements have been introduced to the S Pen, some good and some not so good. Shop around a little and you can easily find lower-priced phablets from reputable brands.



Is the Samsung Galaxy Note 4 a Good Match for Small Businesses?

US suspends background checks system after flaw found

An entire US government program is to be suspended in order to fix vulnerabilities discovered during a security audit.
The U.S. Office of Personnel Management (OPM) announced that the program, used to complete background investigations, was reviewed following a high-profile data breach in another department according to Reuters. OPM said it would take e-QIP offline for 4-6 weeks until security can be enhanced, and that there was no evidence that the flaw had been exploited by attackers.


US suspends background checks system after flaw found

Dino – the latest spying malware from an allegedly French espionage group analyzed

In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous CasperBunny and Babar malware. Dino contains interesting technical features, and also a few hints that the developers are French speaking.
Animal Farm is the security industry’s name for a group of attackers first described by Canada’s Communications Security Establishment (CSE) in a set of slides leaked by Edward Snowden in March 2014. In those slides CSE assess with “moderate certainty” that this group is a French intelligence agency. Since then, several examples of malware created by Animal Farm have been found and publicly documented, in particular:


Dino – the latest spying malware from an allegedly French espionage group analyzed

Study Shows Demand for Digital Transformation is Growing | Dell

Dell announced its commitment to the emerging digital paradigm at Dell World last year. Since then, Digital Business Services, a unit of Dell Services, has helped customers assess their needs, develop digital plans and timelines, and implement digital solutions that meet their business goals. Dell-commissioned research shows that companies are adopting digital approaches, but often focus their efforts narrowly, limiting the true potential of digital transformation.



Study Shows Demand for Digital Transformation is Growing | Dell

Like PuTTY In a Hacker’s Hands | Fortinet Blog

PuTTY, the innocuous and ubiquitous terminal application that Windows users download regularly to connect to *nix systems, has been making headlines in the last month after an uptick in malicious activity set off red flags for researchers. As multiple outlets have reported, hackers have recompiled the open source software and inserted malicious code, creating a new “Trojan PuTTY”.



Like PuTTY In a Hacker’s Hands | Fortinet Blog

ICANN policy changes trigger privacy concerns

Internet name authority ICANN has unsettled privacy advocates after a new working group document flagged changes to the way domain proxy services can operate.
The changes, proposed in a document (PDF) from a working group of the Generic Names Supporting Organization at ICANN, essentially mean that “registrants of websites engaged in active commerce” would no longer be allowed to protect the personal information of domain owners using a proxy service.


ICANN policy changes trigger privacy concerns

Sunday, June 28, 2015

Cacti, The Prickly Pear of Data Visualization, gets stung by an XSS Vulnerability | Fortinet Blog

Researchers at FortiGuard Labs recently discovered a cross-site scripting vulnerability in Cacti, a powerful web-based tool for collecting and graphing time series data. Cacti is frequently used for monitoring and presenting a variety of metrics in IT, ranging from CPU fan speeds and temperatures to network traffic. It is free and open source and has been widely adopted due to its extensibility and complete set of monitoring and graphing tools.



Cacti, The Prickly Pear of Data Visualization, gets stung by an XSS Vulnerability | Fortinet Blog

Crypto* Ransomware Still Making Headlines | Fortinet Blog

Although initially targeted at consumers, so-called “ransomware” has continued to make headlines as cybercriminals began shifting their attention to vulnerable businesses. The malware works by encrypting files on users’ computers and then charging fees to unencrypt these files. Organizations ranging from law enforcement to large enterprises have been hit and the entire family of malware (generally variants of the original Cryptolocker malware) has proven quite lucrative for cybercriminals.



Crypto* Ransomware Still Making Headlines | Fortinet Blog

Friday, June 26, 2015

Cisco warns of default SSH key in several products

Cisco security engineers have disclosed that there is a single default ‘maintenance’ SSH key hardcoded into several families of Cisco security appliances.
The default authorised SSH keys and SSH host keys are associated with remote access for maintenance, meaning that a successful attack would allow hackers to access the devices at will. Once obtained, the private keys would allow an attacker to decrypt traffic after collecting it during a man-in-the-middle attack, or impersonate one of the appliances and alter traffic.


Cisco warns of default SSH key in several products

Phone Scams: Increasing Numbers, Wider Scope

A few weeks ago my colleague Stephen Cobb (knowing my interest in research related to fraud and scams, including phone scams) drew my attention to a section in the *Consumer Sentinel Network Data Book for January-December 2014 that pointed to a rise in the percentage of fraud complaints about phone scam calls over the period 2012 to 2014. The data concerning ‘Fraud Complaints by Company’s Method of Contacting Consumers’ indicate that the percentage of phone scam complaints rose from 34% in 2012 to 54% in 2014, whereas the percentage of complaints about scam emails dropped from 37% in 2012 to 23% in 2014.
Interestingly, complaints about scams initiated via ‘Internet – Web Sites\Others’ rose from 12% to 15% in 2013 and dropped again to 11% in 2014. Maybe three years isn’t long enough to draw too many conclusions, and in any case the percentage of people who actually report the initial method of contact has dropped over the same period from 55% to 46%. However, one possibility is that the decline in email-related complaints represent at least two factors:


Phone Scams: Increasing Numbers, Wider Scope

Thursday, June 25, 2015

Nuit du Hack 2k15 | Fortinet Blog

La Nuit du Hack is a major French hacking event I attended last Saturday in Paris. The organization is amazing and there is a ton to do there (provided you've had enough sleep in the last few days): bug bounties, wargame, hack4kids and talks of course. I will not be commenting my own talk (on Android malware statistics) as that would sound like a 'blog selfie'. If you have missed it though, you can watch it here (live stream - starts around 2:05) or grab the slides.
Rather, I'll shortly explain wargame in connection with my slides. Indeed, the organizers asked us, if possible, to tie the wargame with our talks. So, that's what I came up with. It wasn't very difficult as you'll see.


Nuit du Hack 2k15 | Fortinet Blog

Domo Arigato, Mr. Robot | Fortinet Blog

I just finished watching the first episode of Mr. Robot, the new show on USA Network about “a cyber-security engineer by day and vigilante hacker by night...recruited by a mysterious underground group to destroy the firm he's paid to protect”. Let’s just get this out of the way upfront: It’s a great show.
It’s good television in its own right, but the real genius is in the way it doesn’t bother dumbing down the geek-speak for the sake of viewers who aren’t nerds looking for something to fill the void left by the season finale of Game of Thrones. There’s rootkits (I won’t tell you how one of the engineers explained the concept of a rootkit to a less savvy colleague), Tor, encryption, shots of command lines with actual recognizable commands, Gnome vs. KDE references, and all sorts of other goodies that will make the technorati feel right at home.


Domo Arigato, Mr. Robot | Fortinet Blog

How do you recover from a hack?

Recent high-profile data breaches at the US Office of Personnel Management (OPM), Adult Friend Finder and the German Parliament illustrate criminals’ insatiable appetite for data and financial reward.
Getting hacked, whether that is as an individual or as a company, is a horrible experience, and a costly one too. Hackers often get away with money or data, some of which might be sensitive like health records and private pictures or messages. This data is sometimes used for further attacks, or simply sold onto other criminals on the dark web.


How do you recover from a hack?

New iPhone update blocks iOS apps from spying on eachother

Apple will reportedly introduce a new privacy update for the iPhone that will prevent iOS apps from seeing which other apps have been downloaded to the device, reports The Information.
The new update is said to have been revealed during a private session at Apple’s Worldwide Developers Conference, coming in to effect when the company rolls out iOS 9 later this year. As it is, major apps like Facebook and Twitter are able to monitor the user’s downloaded apps, using the the data to tailor their advertisements.


New iPhone update blocks iOS apps from spying on eachother

Spiceworks application vulnerability disclosed

A serious flaw has been discovered in the Spiceworks application, which creates an admin account for anyone logging in using their Facebook or LinkedIn details.
An admin with malicious intentions could change or delete passwords and cause havoc across the network. The Spiceworks application allows a network of 6 million IT professionals to exchange product reviews and publish how-tos.


Spiceworks application vulnerability disclosed

Mellanox Improves Software-Defined Storage Performance at 40Gb and 100Gb Ethernet Speeds (NASDAQ:MLNX)

New Mellanox performance benchmarks validate Mellanox solutions for 25, 40, 50, 56, and 100 Gigabit Ethernet networking and RDMA technology help increase performance for Red Hat Ceph Storage and Red Hat Gluster Storage deployments



Mellanox Improves Software-Defined Storage Performance at 40Gb and 100Gb Ethernet Speeds (NASDAQ:MLNX)

Wednesday, June 24, 2015

AVT-PR-Avnet Recognized as Global and North America Distributor Partner of the Year by Riverbed

Awards presented at Riverbed Partner Summit 2015



AVT-PR-Avnet Recognized as Global and North America Distributor Partner of the Year by Riverbed

Critical vulnerabilities in Windows and Adobe Reader exposed by hacker

A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management.
Google Project Zero hacker Mateusz Jurczyk found a total of 15 vulnerabilities, any of which could trigger remote code execution or privilege escalation in Adobe Reader or the Windows kernel. However, the two worst (detailed as CVE-2015-3052 for 32-bit and CVE-2015-0093 for 64-bit) exist in the Adobe Type Manager Font Driver, which has existed in the Windows kernel since Windows NT 4.


Critical vulnerabilities in Windows and Adobe Reader exposed by hacker

AVT-PR-RGS to Share Insights from SmartStart Digital Learning Pilot Program at ISTE Conference

PHOENIX – “When am I ever going to use this in real life?” It’s a question that has stymied educators for generations as they struggle to demonstrate the relevance to students of facts and formulas drawn from decades-old text books. RGS, a business unit of Avnet, Inc. (NYSE:AVT), is helping school districts across the U.S. transform their approach to education and inspire students to take on more complex challenges, to collaborate better and to see greater context in their daily assignments by introducing high-performance learning devices and dynamic new curricula to the classroom with its SmartStart in-classroom digital learning pilot program. RGS will be presenting highlights from successful SmartStart pilots at the upcoming International Society for Technology in Education (ISTE) Conference, June 28-July 1 at the Pennsylvania Convention Center, Philadelphia.



AVT-PR-RGS to Share Insights from SmartStart Digital Learning Pilot Program at ISTE Conference

Tuesday, June 23, 2015

Dell pushes boundaries of HPC with new PowerEdge C server | Dell

Dell today announced it continues to push the boundaries of high-performance computing (HPC) and big data by unveiling the PowerEdge C6320, the latest addition in its 13th generation Dell PowerEdge server portfolio. The PowerEdge C6320 delivers up to two times performance improvement on the leading HPC performance benchmark(1), and has the right mix of cost-efficient compute and storage in a compact, 2U chassis for HPC and hyper-converged solutions and appliances, allowing customers to meet demanding workload needs.
The notion of aligning HPC and big data has steadily gained traction over the past few years. As analytics and big data continue to be top of mind for organizations of all sizes and industries, traditional IT departments are considering HPC solutions to help provide rapid and reliable information to business owners so they can make more informed decisions. As Dell’s latest future-ready HPC solution, the Dell PowerEdge C6320 helps power the discoveries and insights being made by top research organizations and enterprises around the world.


Dell pushes boundaries of HPC with new PowerEdge C server | Dell

Dell Software Furthers All-Data Approach With Updates to Toad Database Solutions | Dell

Dell Software today announced a series of updates to its Toad™ family of database solutions that continues the company’s focus on enabling customers to manage all data across all platforms. Unlike platform-specific approaches that propagate vendor lock-in, Dell’s agnostic approach to data and database management enables customers to manage all of their data, no matter where – or on what platform – it resides. The latest round of updates to the Toad family of solutions enables customers to automate agile development practices, improve data preparation for analytics and reporting, and gain flexibility in selecting database platforms.
As the database market transforms, IT departments across the world now must deal with increasingly complex database environments. A recent Dell Software survey of database management trends affirmed that IT professionals are dealing with more data and more data sources to manage than ever before, driving the need to take on more tasks and learn new database technologies. By providing a platform-agnostic family of database solutions that cuts across both traditional and non-traditional data sources, Dell Software is helping customers manage and gain greater value from all their data.


Dell Software Furthers All-Data Approach With Updates to Toad Database Solutions | Dell

Dell Reports Progress on 2020 Legacy of Good Plan | Dell

Dell today reported significant progress against its 2020 Legacy of Good plan and the company’s 21 goals in support of the environment, communities and Dell team members. Dell has a long-term commitment to putting its technology and expertise to work where they can do the most good for people and the planet. The report summarizes its efforts in its Fiscal Year 2015 (February 1, 2014 - January 31, 2015).

"Dell has made great progress across its global business ecosystem in its efforts to use the technology we produce for good," said Trisa Thompson, vice president of Corporate Responsibility at Dell. "We’re committed to this ongoing work and share our results to both create and inspire positive change in business practices."

The full interactive report is available at dell.com/legacyofgoodupdate. Report highlights include:


Dell Reports Progress on 2020 Legacy of Good Plan | Dell

How to steal encryption keys (using radio waves and pita bread)

An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a gadget so small it can be hidden inside some pita bread.
The device has been named, with a clear sense of humour, Portable Instrument for Trace Acquisition (PITA).


How to steal encryption keys (using radio waves and pita bread)

The role of proxies and protocols in malware investigations

A lot of people associate online anonymity with Tor, however it is a much deeper issue than this and does not relate only to privacy while browsing. In this post, we will learn some of the key concepts to keep in mind when analyzing malware, because when we talk about anonymity, we need to understand the role played by proxy servers and certain protocols used for communication in such cases.
It’s important to be aware of these concepts, because when someone is trying to establish an anonymous connection these are the fundamental tools employed.


The role of proxies and protocols in malware investigations

Minor Chrome release fixes serious bugs

Google has updated the Chrome browser to version 43.0.2357.130 for Windows, Mac, and Linux.
The Chrome update has fixed at least two high severity bugs, as can be seen by the partial list released on the Chrome blog, but other details remain scarce, because as Google makes clear in its blog post:


Minor Chrome release fixes serious bugs

Mellanox Releases Open Source Code for "Soft-RoCE" to Accelerate Enterprise Deployments of RDMA

From Mellanox:


June 23, 2015
Mellanox Releases Open Source Code for "Soft-RoCE" to Accelerate Enterprise Deployments of RDMA
Software RoCE enables RDMA technology over any Ethernet adapter; furthers the adoption of RDMA in the data center, Web 2.0, and cloud infrastructures

BOSTON--(BUSINESS WIRE)-- Red Hat Summit - Mellanox® Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of end-to-end interconnect solutions for servers and storage systems and a RoCE Initiative supporter, today announced the release of "Soft-RoCE" - a software-implementation of RDMA Over Converged Ethernet (RoCE). Resulting from a joint development effort with IBM and System Fabric Works, the freely-available software implementation of RoCE enables servers and storage systems to communicate with RDMA using any industry-standard Ethernet adapter. Soft-RoCE enables full interoperability between industry-standard NICs and hardware accelerated solutions, providing businesses with the ability to use RDMA technology across their entire data center infrastructure.

The open source software supports the RoCE Initiative within the InfiniBand Trade Association, which promotes multi-vendor RDMA over Ethernet solutions for cloud and enterprise data centers. Providing Soft-RoCE freely for Ethernet networks and interconnects accelerates the adoption of RDMA across a wide range of applications and environments. Soft-RoCE code is available now at https://github.com/SoftRoCE.

"RDMA is becoming an increasingly important technology in the enablement of cloud-scale high-performance data center networks," said Seamus Crehan, president of Crehan Research. "Simultaneously, these data center operators are embracing open source software-defined networking and storage. Soft-RoCE combines both of these factors, furthering efficiencies and performance improvements in data center network infrastructures."

"The Mellanox ConnectX® family of 10/25/40/50 and 100GbE adapter cards, include full RoCE hardware offloads, and are the world's most widely deployed adapters supporting RDMA today," said Michael Kagan, CTO of Mellanox Technologies. "These adapters offer world class performance capable of scaling to 100,000s of nodes for cloud, Web 2.0, Big Data, and storage applications. Soft-RoCE allows the protocol to become ubiquitous and available on any server with an Ethernet connection. Communication with a Soft-RoCE client allows storage and appliance vendors to showcase the performance, scalability, and efficiency benefits of hardware accelerated RoCE used in their platforms."

Systems supporting hardware-accelerated RoCE adapters—such as the Mellanox ConnectX-3 Pro—are already available from Dell, HP, Lenovo, IBM, Quanta, Supermicro, and other major server and storage manufacturers. Adapters supporting RoCE hardware acceleration will soon be available from other vendors.

"Canonical, the market leader in scale out and OpenStack production environments, is pleased to have Mellanox as a Ubuntu Cloud partner to enable new network and data center models," said John Zannos, vice president alliances and ecosystem, Canonical. "Accelerating network data in an OpenStack environment is important to customer deployments. Bringing Soft-RoCE capability to any Ethernet adapter shows Mellanox leadership in utilizing open source for production networks. We are pleased to see Soft-RoCE availability in Ubuntu today and look forward to even tighter integration in the future."

Supporting Resources:

Learn more about ConnectX-3 Pro.
Learn more about RoCE and the RoCE Initiative at www.roceinitiative.org
Learn more about Mellanox products and solutions at www.mellanox.com.
Follow Mellanox on Twitter, Facebook, Google+, LinkedIn, and YouTube
Join the Mellanox Community
About Mellanox

Mellanox Technologies is a leading supplier of end-to-end InfiniBand and Ethernet interconnect solutions and services for servers and storage. Mellanox interconnect solutions increase data center efficiency by providing the highest throughput and lowest latency, delivering data faster to applications and unlocking system performance capability. Mellanox offers a choice of fast interconnect products: adapters, switches, software, cables and silicon that accelerate application runtime and maximize business results for a wide range of markets including high-performance computing, enterprise data centers, Web 2.0, cloud, storage and financial services. More information is available at www.mellanox.com.

Brocade Shows Leadership in Transition to New IP Networks With 2015 Leading Lights Awards for Most Innovative SDN Product Strategy and Best New Product for Mobile (NASDAQ:BRCD)

BROCADE-POWERED CUSTOMER SOLUTION WINS ADDITIONAL AWARD FOR MOST INNOVATIVE NFV DEPLOYMENT STRATEGY



Brocade Shows Leadership in Transition to New IP Networks With 2015 Leading Lights Awards for Most Innovative SDN Product Strategy and Best New Product for Mobile (NASDAQ:BRCD)

AJAX Exploit Kit - Now At Scale | Fortinet Blog

At around 5AM PST today, our automatic website scanning system began to detect malicious contents being served from a top 10 global website. This lasted to around 8:30AM PST when, presumably, the website's operators disabled the malicious content.
Upon analysis, it appears that a malware is being served through the website's advertisement network. What's technically interesting about this case is that the malware (an 'exploit kit') is being pushed though AJAX. This is something that was previously done only in small scale exploit kit campaigns.


AJAX Exploit Kit - Now At Scale | Fortinet Blog

Monday, June 22, 2015

Boost Mobile Invites All Cricket and MetroPCS Customers to Slash Their Payment in Half | Sprint Newsroom

Boost Mobile Invites All Cricket and MetroPCS Customers to Slash Their Payment in Half | Sprint Newsroom

Polish airline LOT grounded by ‘first attack of its kind’

Hackers are being blamed for an attack which grounded 1,400 passengers set to fly on Polish airline LOT.
The passengers were waiting to fly from Warsaw’s Frederic Chopin Airport when the attack occurred at around 4:00 pm (1500 GMT). The airline’s ground operations system was knocked offline by the targeted attack, which led to the cancellation of 10 flights departing from Warsaw, and the delay of about a dozen more, according to Reuters.


Polish airline LOT grounded by ‘first attack of its kind’

Cybersecurity and Healthcare – No Time to Wait | Fortinet Blog

It’s difficult to overemphasize just how vulnerable many healthcare organizations are to cyber attacks. The healthcare industry as a whole simply hasn’t adopted the sorts of protections, best practices, and security awareness as other markets like finance or defense. One has to look no further than the biggest data breaches so far in 2015 - Healthcare is at the top of the list.
Why is healthcare such a big target? The Workgroup for Electronic Data Interchange (WEDI) recently published a primer on healthcare cybersecurity and identified several important factors that set the industry apart:


Cybersecurity and Healthcare – No Time to Wait | Fortinet Blog

Friday, June 19, 2015

Women In Tech - Women In Security | Fortinet Blog

We don't see many awards for "The Most Influential Men In Silicon Valley" or "Top Men In the Channel". There's a reason for this, of course. The tech sector is dominated by men, from engineering to the C-suite. Security is no exception.



Women In Tech - Women In Security | Fortinet Blog

Samsung Galaxy S6 Now Available from AT&T

If you want the newest version of the Samsung Galaxy S6, you’ll have to get it from AT&T.
For the third summer in a row, the telecommunications giant is releasing an exclusive offering from the Galaxy S family.


Samsung Galaxy S6 Now Available from AT&T

LinkedIn to stick with invite-only bug bounty program

LinkedIn will continue a bug bounty program that pays out to a closed group of security researchers,reports PC World, claiming that an invite-only approach reduces the number of irrelevant reports.
Writing on the LinkedIn blog, the company’s director of information security Cory Scott said that the program was started in October 2014, and has already paid out $65,000 for more than 65 ‘actionable bugs’. The team of researchers are hand-picked and invited by the company to join the team, working closely with its own security experts.


LinkedIn to stick with invite-only bug bounty program

Reddit goes HTTPS, joins Wikipedia at security table

Popular meme site Reddit has announced that it will soon encrypt all traffic with HTTPS by default.
Reddit will officially switch to HTTPS encryption by default beginning June 29, having offered the option since September 2014.


Reddit goes HTTPS, joins Wikipedia at security table

CNET Update - Sprint stops data throttling, AT&T faces FCC fine

Thursday, June 18, 2015

Cyber Boot Camp: a head start for tomorrow's cyber workforce

What is Cyber Boot Camp? Every June, a select group of students from high schools and middle schools in San Diego County, California, get five days of intense education in the art of defending computer systems, organized by the unique community-wide security awareness non-profit, Securing Our eCity, and sponsored by a variety of organizations, including security solutions-provider, ESET. This year more than 50 students will experience a week of hands-on instruction, plus lectures from leading cyber security experts from San Diego companies as well as local and national law enforcement. The 2015 Cyber Boot Camp starts Monday, June 22.



Cyber Boot Camp: a head start for tomorrow's cyber workforce

Apple iOS and OS X flaws leave passwords vulnerable

A vulnerability found in Apple’s iOS and OS X devices could allow hackers to upload malware and steal passwords for services including Mail and iCloud, reports The Register.
The discovery was made by six researchers at Indiana University, Peking University and the Georgia Institute of Technology, whose academic paper (view PDF) revealed a flaw that could allow malicious apps to gain unauthorized access to the data stored by other apps.


Apple iOS and OS X flaws leave passwords vulnerable

Khail and Ashley's best (and worst) of E3 2015 (Tomorrow Daily 194)

Apple Faces $600k Fine In Taiwan | CNBC

Utah Valley University paints 'text lane' on a staircase - Jun. 18, 2015

If you're texting while using the stairs, you'd better stay to the right.



That's the message from Utah Valley University's hall-monitor like message to students, after the college painted lines on a staircase to divide the stairs into three lanes: walk (on the left), run (in the middle), and text (on the right).



Utah Valley University paints 'text lane' on a staircase - Jun. 18, 2015

Mellanox Announces ConnectX-4 Lx, the Most Cost-Efficient 25/50 Gigabit Ethernet Network Adapter for Cloud, Web 2.0 and Enterprise Data Centers (NASDAQ:MLNX)

New network adapter designed to serve as direct replacement for commonly deployed 10 Gigabit Ethernet adapters in Web 2.0, cloud, data analytics, database, and storage platforms



Mellanox Announces ConnectX-4 Lx, the Most Cost-Efficient 25/50 Gigabit Ethernet Network Adapter for Cloud, Web 2.0 and Enterprise Data Centers (NASDAQ:MLNX)

BofA Merrill Lynch Fund Manager Survey Finds Investors Taking ‘Risk-off’ Stance Amid Interest Rate and Grexit Concerns | Bank of America Newsroom

Proportion of Investors Buying Protection Against Equity Sell-off Reaches Survey High



BofA Merrill Lynch Fund Manager Survey Finds Investors Taking ‘Risk-off’ Stance Amid Interest Rate and Grexit Concerns | Bank of America Newsroom

Kansas City Proud Network Press Kit | Sprint Newsroom

Sprint finished in a statistical tie for first place as the top ranked overall wireless network in Kansas City, according to independent mobile analytics firm RootMetrics®. The new analysis shows Sprint in a dead heat for #1 in overall wireless network performance.



Kansas City Proud Network Press Kit | Sprint Newsroom

600 million Samsung Galaxy phones exposed to hackers - Jun. 17, 2015

Every Samsung Galaxy device -- from the S3 to the latest S6 -- has a significant flaw that lets in hackers, researchers have discovered.



The vulnerability lives in the phones' keyboard software, which can't be deleted. The flaw potentially allows hackers to spy on anyone using a Samsung Galaxy phone.



600 million Samsung Galaxy phones exposed to hackers - Jun. 17, 2015

Teen's phone finder app leads to his killing - Jun. 17, 2015

Authorities are warning those who use phone-finder apps to be careful after a Canadian teenager was shot and killed when he went to retrieve his cell phone.



Jeremy Ryan Cook, 18, was gunned down on Sunday in London, Ontario, according to police.



Teen's phone finder app leads to his killing - Jun. 17, 2015

UK Consumers willing to share DNA with banks to secure identity

Consumers in the UK would be happy to share their DNA if it would help secure their financial and personal information, according to a new report.
A surprising 24% would consider giving their bank their DNA profile, while 42% would share biometrics such as fingerprints – a mere 26% would share their social network profile however.


UK Consumers willing to share DNA with banks to secure identity

Federal IT Survey Reveals Network Limitations are Impacting Government's Ability to Deliver Digital Services (NASDAQ:BRCD)

NEW RESEARCH HIGHLIGHTS GAPS IN ADOPTION OF OPEN STANDARDS REQUIRED FOR NEW IP NETWORKS



Federal IT Survey Reveals Network Limitations are Impacting Government's Ability to Deliver Digital Services (NASDAQ:BRCD)

Top US baseball team accused of hacking rival

The St. Louis Cardinals, one the United States’s top major league baseball teams, is being investigated for allegedly hacking into the computer systems of sporting rivals.
According to claims first made public in a New York Times report, evidence has been uncovered that Cardinals staff broke into a network belonging to the Houston Astros, and accessed a database containing sensitive information.


Top US baseball team accused of hacking rival

Wednesday, June 17, 2015

New exploit compromises Samsung Galaxy phones

Potentially 600m Samsung Galaxy phones are at risk of malicious compromise after a new exploit was discovered by a security researcher.
The vulnerability is down to the way in which SwiftKey keyboard app updates – it periodically queries a server to check if new updates exist. However, the process is conducted in the clear, and the downloaded executable file isn’t encrypted, meaning that a man-in-the-middle technique can spoof the update server, then send a malicious file to the device. The file could turn the device into a bug, by taking control of the camera and microphones, install other malware apps, and steal data.


New exploit compromises Samsung Galaxy phones

Tuesday, June 16, 2015

The Way Software Is Designed Today, It's Amazing Anything Is Ever Secure | Fortinet Blog

One of the most frightening lessons IT people quickly learn is that large complex systems—software, hardware and certainly operating systems—always do things that no one knew they could do (or expect them to do). That's because these systems are created by multiple teams and each team member only bothers to document most (and certainly not all) of what their own module can do. Also, programmers often create backdoors during development to facilitate and accelerate inevitable fixes and repairs. Most, but not all, remember to remove them before launch.



The Way Software Is Designed Today, It's Amazing Anything Is Ever Secure | Fortinet Blog

EU data protection regulation overhaul inches closer

The 28 EU member states have taken a significant step towards a historic overhaul of EU-wide data protection laws, first proposed three years ago.
The justice ministers from each state have now agreed their general approach to the legislation, which just leaves a final text to be thrashed out next week. The European Parliament has generally endorsed the plans already.


EU data protection regulation overhaul inches closer

AVT-PR-Avnet Electronics Marketing Experts to Address IoT and Embedded Linux Development Opportunities at Freescale Technology Forum

PHOENIX – Avnet Electronics Marketing, an operating group of Avnet, Inc. (NYSE: AVT) announced today that four Avnet technical experts will be among the featured presenters at the Freescale® Technology Forum, June 22-25, 2015, at the J.W. Marriott, Austin, Texas. Avnet software enablement engineers Chris Young and Des Howlett will lead a four-hour, hands-on workshop on Embedded Linux development, while Technical Marketing Manager Peter Fenn and Strategic Solutions Architect John Weber will focus on design challenges and state-of-the-art solutions for smart networks and IoT security.



AVT-PR-Avnet Electronics Marketing Experts to Address IoT and Embedded Linux Development Opportunities at Freescale Technology Forum

Password security firm LastPass compromised

Popular online password vault provider LastPass has warned users to update their master account passwords after its network was hacked.
The company wrote a blog post to notify customers initially, before sending emails direct to users. The post said that the hack was discovered on Friday, when “our team discovered and blocked suspicious activity on our network”. An investigation discovered that while the hackers had not compromised encrypted user data, “account email addresses, password reminders, server per user salts, and authentication hashes were compromised.”


Password security firm LastPass compromised

A beginner's guide to starting in InfoSec

A lot of ink has been spilt about the shortage of people trained in information security – especially about the shortage of women in tech and in this industry in particular. I was recently interviewed by Matthew J. Schwartz for a podcast in which we discussed this topic, which seems to have struck a chord with a lot of people. I’ve received quite a few requests for information about how to get into this industry, especially for those who don’t yet have a lot of technical experience.
Since this seems to be such a popular topic, I thought I’d devote a blog post to exploring it, so that more people can make use of this information (and please add your own experiences in the comments!).


A beginner's guide to starting in InfoSec

NetSuite Partners with GovReports to Streamline Taxation Reporting for Businesses Operating in Australia

GovReports SuiteApp Enables Businesses to Report Directly to the Australian Taxation Office Using NetSuite, Providing a Multi-User, Transparent Tax Reporting System for Businesses



NetSuite Partners with GovReports to Streamline Taxation Reporting for Businesses Operating in Australia

Monday, June 15, 2015

AVT-PR-Avnet, Inc. Names Rodney C. Adkins to Its Board of Directors

PHOENIX – Avnet, Inc. (NYSE: AVT), a leading global technology distributor, announced today that Rodney C. Adkins, president of 3RAM Group LLC, a privately-held company specializing in capital investments, business consulting services and property management, has been appointed to the company's board of directors. He will serve on both the audit and corporate governance committees.



AVT-PR-Avnet, Inc. Names Rodney C. Adkins to Its Board of Directors

Irony alert: Password-storing company is hacked - Jun. 15, 2015

No one's safe from hackers -- not even LastPass, a company that stores people's passwords.



LastPass lets people store passwords online so they can access them all with a single master password.



Irony alert: Password-storing company is hacked - Jun. 15, 2015

Need to Talk to Beijing? Here Comes Skype Translator

Your business is in Boston. You have clients in Beijing. You’re about to communicate via Skype for the first time, and you’re worried. “Will they be comfortable speaking English? Does anyone here speak Mandarin?”
Skype says concerns like that could soon go the way of the fax machine thanks to the company’s Translator Preview, expected to roll out at the end of this summer as part of the Skype For Windows desktop app.


Need to Talk to Beijing? Here Comes Skype Translator

The funniest site on the Internet turns 1 - Jun. 15, 2015

If you want to see people actually agree with each other on the Internet, just watch the celebration among journalists on Twitter when a new Clickhole post drops.



Clickhole, a product of the satirical media company The Onion, marked its first birthday last week.



The funniest site on the Internet turns 1 - Jun. 15, 2015

Facebook's new photos app powered by artificial intelligence - Jun. 15, 2015

Your phone is likely filled with hundreds of photos you've forgotten to share.



Facebook's new Moments app scans those images for faces and matches them to your Facebook friends. You can then share the photos, which are grouped by occasion, directly with those people though the app.



Facebook's new photos app powered by artificial intelligence - Jun. 15, 2015

DD4BC DDoS Extortion Threat Activity

DD4BC DDoS Extortion Threat Activity

Uber site flaw allows hacker to display rival ad

A flaw in taxi cab network Uber’s site allowed a security researcher to manipulate the firm’s home page and display an ad for rival Lyft, it has been claimed.
The flaw allegedly concerns Uber’s petitions, which appear to now have been taken offline. The security researcher, Austin Epperson, claimed that he was filling in an Uber petition on its site when he noticed that the form allowed non-numeric and special character inputs into a ‘zip code’ field.


Uber site flaw allows hacker to display rival ad

Now Access DropBox Pro from Your Cheaper OnePlus One Phone

Fans of DropBox Pro can now access it from the OnePlus One smartphone, thanks to a new promotion by the company timed to coincide with a drop in price.
When it first launched last year, the OnePlus One was like an exclusive nightclub; you needed an invite to access it.


Now Access DropBox Pro from Your Cheaper OnePlus One Phone

Virtual Reality: What To Expect At E3 | Tech Bet | CNBC

NetSuite Wins SIIA Software CODiE Award for Best Financial Management Solution

NetSuite OneWorld Honored for the Third Consecutive Year



NetSuite Wins SIIA Software CODiE Award for Best Financial Management Solution

Wikipedia switches to HTTPS by default

Wikimedia has announced that all of its web properties – including the enormously popular crowd-sourced dictionary Wikipedia – will now use HTTPS encryption by default.
The step means that the half billion users of Wikimedia sites will have their browsing traffic encrypted, making interception and monitoring by third parties considerably harder. It also makes mass censorship by ISPs or governments more problematic.


Wikipedia switches to HTTPS by default

Company leaves New York, protesting 'BitLicense'

One company is suspending its services in New York, saying it needs to take a "moral and ethical stand" against a new state law regulating digital currency such as bitcoin.
ShapeShift, a digital currency exchange that doesn't require users to make accounts, announced Thursday it is pulling its service from New York state because it does not wish to comply with the recently issued BitLicense. That new law asks digital currency firms to, among other things, record some personal identifying information of its users. ShapeShift opposes that effort.


Company leaves New York, protesting 'BitLicense'

Sunday, June 14, 2015

Think About These Steps Towards Better Online Marketing

Members of the online small business community have had to make those decisions plenty of times, so they have lots of helpful tips to share. Read some of their online marketing insights below in this week’s Small Business Trends community news and information roundup.



Think About These Steps Towards Better Online Marketing

Saturday, June 13, 2015

Mobile data usage set to explode nearly six-fold by 2020: Report

Nearly 7 in 10 people will be using a smartphone across the globe by 2020, according to the latest edition of Ericcson's Mobility Report.
Smartphone subscriptions will reach 6.1 billion and 90 percent of devices will be covered by mobile broadband networks, the report said.


Mobile data usage set to explode nearly six-fold by 2020: Report

iOS bug leaves iCloud passwords vulnerable

A security researcher has highlighted an iOS bug that makes it easier for hackers to to steal iCloud passwords, reports Ars Technica.
The proof-of-concept attack was posted to GitHub earlier this week by user Jan Soucek, identifying a flaw in the Mail app in the latest version of iOS. The app contains dangerous code linked to incoming messages, allowing a hacker to remotely load HTML content that would replace the message in the original email.


iOS bug leaves iCloud passwords vulnerable

Friday, June 12, 2015

Apple Welcomes The Creation Of Ad Blocking Apps | Tech Bet | CNBC

The 404 Show 1,618: Spotify's Shanon Cook, Oculus teams with Xbox, Apple...

Top 5 times Apple shook up the tech world

CNET Update - Twitter CEO steps down, Snoop Dogg steps up

Apple Byte - The things Apple didn't tell you at WWDC 2015

Tomorrow Daily - Oculus Rift gets a Q1 2016 release, we better upgrade o...

White Collar Robots Will Take Your Job | CNBC

Snapchat bolsters security with optional Two-factor authentication

Snapchat has added an option for two-factor authentication in its latest update, following in the footsteps of Apple, Twitter and Facebook, reports The Verge.
With the recently released 9.9.0 update, Snapchat users can help keep their account secure against hackers and ensure that their personal files are protected. Users who choose to activate this feature will need to enter a six-digit password when signing in from a new device, as well as a verification code that is sent via SMS each time they want to log in.


Snapchat bolsters security with optional Two-factor authentication

Intel Releases Game Optimizations and New Drivers for Intel Graphics

Intel Releases Game Optimizations and New Drivers for Intel Graphics

Intel Capital Launches $125M Fund to Invest in Women and Underrepresented Minority Entrepreneurs

SANTA CLARA, Calif., June 9, 2015 – Intel Capital, Intel Corporation's global investment organization, today announced the Intel Capital Diversity Fund, which will invest in technology startups run by women and underrepresented minorities. Also unveiled were the fund's first investments in four companies led by inspiring trailblazers. The largest of its kind, the fund totals approximately $125 million, and investments will cover a broad spectrum of innovative industries.



Intel Capital Launches $125M Fund to Invest in Women and Underrepresented Minority Entrepreneurs

Dell and TGen Support Fight Against Pediatric Cancer Across EMEA | Dell

Dell today announced its extended partnership with Translational Genomics Research Institute (TGen) to help clinical researchers and doctors globally expand the reach and impact of the world’s first Food and Drug Administration (FDA)-approved personalized medicine trial for pediatric cancer. The renewed commitment includes an additional $3 million Dell grant to support continued collaboration with TGen and support the Neuroblastoma and Medulloblastoma Translational Research Consortium’s (NMTRC) expanded  pediatric cancer clinical trials in EMEA, starting with sites in France and Lebanon. This is the second grant Dell has provided TGen to accelerate treatment of pediatric cancer, bringing its total contributions to more than $15 million since 2011.



Dell and TGen Support Fight Against Pediatric Cancer Across EMEA | Dell

Thursday, June 11, 2015

KLA-Tencor Announces Analyst Briefing At SEMICON West 2015 (NASDAQ:KLAC)

MILPITAS, Calif.June 11, 2015 /PRNewswire/ -- KLA-Tencor Corporation (NASDAQ: KLAC), the world's leading supplier of process control and yield management solutions for the semiconductor and related nanoelectronics industries, today announced that it will host its annual analyst briefing at SEMICON West at the W Hotel on Tuesday, July 14, 2015, with a live webcast beginning at 12:30 p.m. PDT. The agenda includes:



KLA-Tencor Announces Analyst Briefing At SEMICON West 2015 (NASDAQ:KLAC)

FBI trace celebrity iCloud hacks to computer in Chicago

The FBI has traced the leak of hundreds of nude photos featuring high-profile celebrities to a Chicago home, seizing a computer, cellphones and storage devices, reports The Guardian.
The photo and video material was released onto the internet last year without permission, stolen from the victims’ smartphones via an iCloud breach. A computer in Chicago has now been traced to nearly 600 iCloud accounts, including those belonging to celebrities, models and their families and friends, as revealed by recently unsealed court documents.


FBI trace celebrity iCloud hacks to computer in Chicago

AVT-PR-Avnet Selected as a 2015 CIO 100 Award Winner by CIO Magazine

Avnet recognized for its new, innovative quoting system that enhances customer service and enterprise effectiveness



AVT-PR-Avnet Selected as a 2015 CIO 100 Award Winner by CIO Magazine

Dell Data Center Innovation - Gartner | Dell

Dell today announced that Gartner Inc. has recognized Dell across enterprise product lines. The IT industry analyst firm positioned Dell as a leader in its 2015 Magic Quadrant for Modular Servers, a visionary in the 2015 Magic Quadrant for Data Center Networking, and gave the company a positive overall rating in its Vendor Rating report.



Dell Data Center Innovation - Gartner | Dell