High-tech

High-tech
Light

Tuesday, July 22, 2014

Cybercrime: still only a tiny percentage of GDP, but it’s growing

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 21, 2014 2:45 PM
Subject: Cybercrime: still only a tiny percentage of GDP, but it's growing
To: <aquarianm@gmail.com>
Cc:

A guide to the confusing Internet of Things standards world

Open Wireless Router firmware aims for better router security, network performance

Network World Daily News PM
July 21, 2014
Share this email

Cybercrime: still only a tiny percentage of GDP, but it's growing

The annual cost of cybercrime is either staggering, or a mere blip on the world's economic bottom line, depending on how you look at it.It is notoriously difficult to quantify, since a majority of cybercrime incidents go unreported, some companies don't even realize they have been compromised and many are not able to put a dollar value on intellectual property (IP) that they still have, but is now also in the hands of a competitor, a thief or another nation state.But most estimates put global losses in the hundreds of billions of dollars. One report released last month, by the Center for Strategic and International Studies (CSIS) and titled "Net Losses: Estimating the Global Cost of Cybercrime," puts it between $375 billion and $575 billion.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. A guide to the confusing Internet of Things standards world

2. Open Wireless Router firmware aims for better router security, network performance

3. Microsoft consolidates enterprise IT conferences

4. INSIDER BYOD morphs from lockdown to true mobility

5. The Cisco ASA 1000V

6. Surveys point to increased adoption of VoIP and wireless substitution

7. Verizon amps FiOS upload speeds for all residential customers

8. 3 keys to getting started with devops

9. Cisco enterprise controller going through paces

10. Microsoft welcomes home 785 prodigal enterprises customers

11. Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

12. New products of the week 07.21.14

13. Meet the Online Tracking Device That is Virtually Impossible to Block

14. Ping Identity rolls mobile one-swipe authentication; takes aim at RSA tokens

15. Google takes a tiny step toward fixing Glass's reputation

WHITE PAPER: APC by Schneider Electric

Data Center Projects: Advantages of Using a Reference Design

It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. In this paper reference designs are defined and their benefits are explained. Learn more

A guide to the confusing Internet of Things standards world

Google's recently announced Thread standard for communication between devices connected to the Internet of Things joins several similar efforts. READ MORE

Open Wireless Router firmware aims for better router security, network performance

Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.The first experimental version of the firmware, called the Open Wireless Router was released Sunday and is mainly aimed at developers and hackers who can assist with finding bugs and improving the software overall.The project's main goals are focused on allowing router owners to securely set up public Wi-Fi networks for passers-by to use, which the EFF and other organizations argue helps conserve radio spectrum, benefits business and economic development and can spark innovation. However, some of the firmware's other planned features could also improve the overall security of routers that run it, even if their owners don't decide to share their Internet bandwidth with strangers.To read this article in full or to leave a comment, please click here READ MORE

Microsoft consolidates enterprise IT conferences

Microsoft will hold next year a new conference that encompasses its enterprise IT products, including the productivity and server Office software, IT management wares and development tools, and replaces several shows that are narrower in scope.Described as a "unified technology event for enterprises," it will be held in May of 2015 in Chicago, and will apparently fuse Management Summit, TechEd and individual conferences for Exchange, SharePoint, Lync and Project.It's not clear whether Build will also be folded into this new conference. Microsoft didn't immediately respond to a request for comment."If you've attended TechEd or Microsoft Management Summit, this the place for you to be. It's everything you've come to know and love and more. You'll find what you're familiar with and you'll learn more about Lync, Microsoft Azure, Microsoft Exchange, Office 365, Project, SharePoint, SQL Server, System Center, Visio, Visual Studio, Windows, Windows Intune, Windows Server and lots more," Microsoft said in a blog post.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

BYOD morphs from lockdown to true mobility

Many companies that have had BYOD policies for a while have matured their thinking. They've grown from looking at employees' personal devices as something to lock down to allowing them in a limited fashion to fully embracing them.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

The Cisco ASA 1000V

Cisco first impressed me with virtual data center technologies with their Nexus 1000V. This is a software replacement for the Distributed Virtual Switch (DVS) of VMware. The idea is to have Cisco engineers feel much more comfortable working with the network switch (although software-based) that the virtual machines are connecting to in software. The Nexus 1000V provides a consistent operating system and set of features that Cisco network engineers are completely comfortable with. In fact, Cisco even created a physical appliance, the Nexus 1010 to host the software powering the 1000V. This product has been replaced with the Nexus 1100. Now engineers feel very comfortable as they are actually connecting to a physical box for management and configuration of the virtual switch. To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Gravitant, Inc.

A Better Way to Manage and Deliver Cloud Services

As more enterprises make the transition to cloud, a new type of management option is emerging: cloud services brokerage. Neovise reviews the Gravitant cloudMatrix offering, outlining the unique value it provides in the right cloud and provider Learn More

Surveys point to increased adoption of VoIP and wireless substitution

FCC, CDC studies confirm increase VoIP adoption, wireless substitution. Nearly half of U.S. consumer wireline voice services are VoIP, with 15% of businesses using VoIP. READ MORE

Verizon amps FiOS upload speeds for all residential customers

Previously, FiOS service tiers offered upload speeds of anywhere from one-half to one-fifth of the advertised download speed. The new scheme will see those equalized – so entry-level consumers with 15Mbps download connections will get 15Mbps upload speeds as well, as opposed to the 5Mbps they currently receive.+ALSO ON NETWORK WORLD: Surveys point to increased adoption of VoIP and wireless substitution + Cisco, Microsoft chasing cloudsTo read this article in full or to leave a comment, please click here READ MORE

3 keys to getting started with devops

Devops could be the latest and greatest buzzword, but it could also mean big and important changes - for the better- at many organizations in how applications are built and deployed.The idea of devops is to better streamline the work of developers and operation professionals. This integrated approach, in theory, will allow developers to build applications faster and operators to launch them quicker and with fewer errors. It's juxtaposed to an idea of a separate development and operations organizations; when these groups act in silos, problems are more likely to arise (developers build an app one way and ops folks need to deploy it another way). "It's really a philosophy, an approach," says Andi Mann, VP of products, strategy and marketing at CA Technologies, who is a leading thinker on the devops movement. "The core of devops is about development and operations working together well."To read this article in full or to leave a comment, please click here READ MORE

Cisco enterprise controller going through paces

Cisco is adding its APIC Enterprise Module, an enterprise controller for its programmable Application Centric Infrastructure (ACI), to its software development community to ready it for general release.APIC EM is intended to allow IT to extend policy-based automation and configuration to WAN and access networks. It is in beta and early field trials now, and general availability will be based on the progress of those trials. Initially, it was to be available in the second quarter of this year.In addition to the betas and field trials, APIC EM is being hammered on by software developers in Cisco's DevNet community, a network of software coders writing applications for Cisco hardware. DevNet coders are evaluating APIC EM APIs and build applications to harness and extend its capabilities.To read this article in full or to leave a comment, please click here READ MORE

Microsoft welcomes home 785 prodigal enterprises customers

It's no secret that Microsoft is locked in a battle with Google for the enterprise market, and while Google gives away much more of its enterprise offerings than Microsoft, for almost one thousand firms, that wasn't enough.Microsoft announced at its Worldwide Partner Conference in Washington D.C., that in the past 18 months, 785 enterprise customers that the company had lost to Google's offerings have since returned. Microsoft put up a slide with the names of some of those prodigal children, and they are a broad mix of very large firms.If there is one thing enterprises don't like to do, it's rip and replace. So these firms either weren't really invested in Google's apps or they really, really didn't like them. They may have been using cloud apps and services, but that's still a lot of time spent on ending licenses, getting new ones, deploying apps/services, etc.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: VCE

Oracle & VCE The Next Step in Integrated Computing Platforms

In order to keep up with today's insatiable demand for data, high performance databases require high throughput, low latencies, and flexible scalability. In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and reliability. Learn More

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.The new ransomware threat is called CTB-Locker (Curve-Tor-Bitcoin Locker), but Microsoft anti-malware products detect it as Critroni.A. Its creator has been advertising the program to other cybercriminals on Russian-language forums since the middle of June and it seems that he's been trying to fix most of Cryptolocker's faults.Critroni uses a file encryption algorithm based on elliptic curve cryptography, which its creator claims is significantly faster than encryption schemes used by other ransomware threats. This also makes decrypting the affected files impossible without paying the ransom, if there are no implementation flaws.To read this article in full or to leave a comment, please click here READ MORE

New products of the week 07.21.14

Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Product name: Thunder SPE appliancesTo read this article in full or to leave a comment, please click here READ MORE

Meet the Online Tracking Device That is Virtually Impossible to Block

iStockphoto This story was co-published by ProPublica with Mashable. A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com. First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it.To read this article in full or to leave a comment, please click here READ MORE

Ping Identity rolls mobile one-swipe authentication; takes aim at RSA tokens

Identity and access management vendor Ping Identity today unveiled software-based multi-factor authentication that lets users to sign onto an enterprise service or system with a swipe of their smartphone.PingID for Apple iOS or Google Android mobile devices is an app that works to generate one-time passwords on a smartphone which lets users access applications and services, says Jeff Nolan, senior director of marketing at Ping Identity. This one-time password capability can be used as the primary or the secondary form of security authentication.+More on network World: Gartner: Cloud-based security as a service set to take off+To read this article in full or to leave a comment, please click here READ MORE

Google takes a tiny step toward fixing Glass's reputation

Google Glass "Basecamps" are a small but useful step toward eliminating the Glassholes stereotype. READ MORE

WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®

Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6

...

No comments:

Post a Comment