Network World Daily News AM | | As Arista Networks reviews the infringement complaints Cisco filed against it last week, the company is firing back, accusing Cisco of resorting to the same tactics it faced from legacy vendors and derided 20 years ago. In a blog post, former Cisco executive Dan Scheinman, who was Cisco's general counsel in 1990s when the company was sued by IBM and others, essentially said the company's come full circle since that time.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Feds' bid to seize Irish emails threatens US citizen's privacy, Microsoft says 2. Power company plugs data center directly into high-voltage grid 3. US court extends NSA surveillance rules in current form 4. Hackers leak top Sony executives' emails 5. Forgotten subdomains boost risk of account hijacking, other attacks 6. PlayStation turns 20 7. With Comcast's Ethernet @Home, your holiday break could be even more like work 8. Microsoft sues AT&T customer for activating pirated copies of Windows 7 & Office 2010 9. Top 10 states for tech workers willing to relocate 10. INSIDER Building a Private Cloud, of Sorts, with OwnCloud (free reg) | WHITE PAPER: BMC Software Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More | U.S. demands to seize emails stored on a Microsoft server in Ireland are threatening the privacy of U.S. citizens, Microsoft said in its appeal in an ongoing lawsuit that threatens international relations and may violate European privacy laws.Microsoft is battling a U.S. district court ruling to hand over emails to U.S. law enforcement. The company was ordered to hand over the data despite it being stored on a server in Dublin, Ireland. According to the district court, the location of the data is not relevant and seeking cooperation with Irish authorities is not necessary for a warrant's powers to reach abroad.However, there is "no way" the U.S. government would accept the reasoning the district court is using if other countries wanted to access data stored on U.S. soil, Microsoft said in a brief filed with the U.S. Court of Appeals for the Second Circuit on Monday. If the warrant is carried out it would open the door to such seizures in the U.S., endangering the privacy of U.S. citizens, Microsoft said.To read this article in full or to leave a comment, please click here READ MORE | A power company in Arizona is building a data center that plugs directly into its high-voltage transmission grid, a first of its kind project that could cut the cost of providing compute services and avoid the need for unsightly new power lines.Data centers, like most other buildings, typically connect to the grid far downstream from where power is produced. But the utility in Phoenix, called Salt River Project, is building a data center at one of its power stations directly on top of a high-voltage transmission line.That has a couple of benefits, said Clint Poole, a manager with SRP's telecom division. The power supply is far more reliable close to where it's produced, meaning the data center should be able to operate without the need for a costly generator for backup power.To read this article in full or to leave a comment, please click here READ MORE | A U.S. secret court has extended the authorization of the National Security Agency to continue surveillance of phone records in its current form, after a reform bill ran into difficulties in the Senate.Besides stopping the NSA from collecting bulk phone records of Americans from phone companies, the USA Freedom Act aimed to restrict access of the NSA to these records by requiring the use of targeted selection terms.It also has a provision for the appointment of a special advocate tasked with promoting privacy interests in closed proceedings in the secret court.The Foreign Intelligence Surveillance Court has reauthorized the NSA program for another 90 days at a request from the government, according to a statement Monday by the offices of the Attorney General and the Director of National Intelligence. The order expires on Feb. 27 next year.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: CenturyLink and Intel The importance of infrastructure in getting the right performance in the enterprise context and a persuasive business case for making the move from internal hosting to the public cloud. Learn More | The email boxes of two top Sony executives were leaked online on Monday, the latest release of potentially embarrassing corporate information following a major hack on the company's computer networks two weeks ago.The files were uploaded to file-sharing sites and the Bit Torrent file-sharing network, and links to them were posted in a message that claimed to be from the same hacking group behind the Sony attack."We have already given our clear demand to the management team of Sony, however, they have refused to accept," said the message pointing to the files. "We are sending you our warning again."The hackers said the email boxes belong to Steve Mosko, president of Sony Pictures Television, and Amy Pascal, co-chairman of Sony Pictures Entertainment.To read this article in full or to leave a comment, please click here READ MORE | Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.Back in October, a Web security firm called Detectify warned that many companies have created subdomains to use with third-party services, such as remotely hosted helpdesk systems, code repositories and blogs, but then forgot to disable them after closing their accounts on those third-party services.As a result, attackers can now open accounts with the same services, claim the subdomains pointed there as their own, and create credible phishing pages, the Detectify researchers explained at the time. This is possible because online services often don't verify the ownership of subdomains.To read this article in full or to leave a comment, please click here READ MORE | PlayStation turns 20 It's been 20 years since Sony made the leap into computer games and launched the first PlayStation console on December 3rd, 1994. Back then, Nintendo and Sega dominated the console landscape... From: Network World Views: 0 0 ratings Time: 01:59 More in Science & Technology READ MORE | RESOURCE COMPLIMENTS OF: SolarWinds® SolarWinds® Log & Event Manager is a comprehensive SIEM for any security pro. Increase security visibility with 24x7 automated monitoring and real-time analysis. Tackle log management and compliance monitoring with expert developed, pre-packaged templates. Perform rapid root cause analysis with built-in intelligence and strong visualization. Gain the power of SIEM without spending a fortune or hiring an army. Download a free, fully-functional trial and start analyzing your log files within an hour. | Work follows millions of people home every night, and Comcast Business wants to take that bittersweet reality to another level.The company's ethernet @Home service allows an employer to extend Comcast ethernet service from corporate facilities to telecommuters' homes. Instead of logging in to a VPN (virtual private network), employees who use it can get secure access to the enterprise ethernet network instantly, the same way they would go online at work, Comcast said. The service became available across the Comcast Business network on Monday.Working from home is common for many white-collar employees, well beyond the physicians, corporate executives, IT specialists and pro sports players that Comcast cites as potential users of ethernet @Home. For example, doctors may want to see images of their patients as soon as they're available in order to make a diagnosis, and IT managers may need high-speed access to systems during off hours. Helping workers get online and stay connected to enterprise resources over VPNs and remote desktop systems can add to the burdens of IT departments.To read this article in full or to leave a comment, please click here READ MORE | Other than knowing Microsoft is very opposed to having its products pirated, it's somewhat rare to learn how Microsoft uses suspicious product activation patterns to determine pirated products. Yet a complaint (pdf) Microsoft filed a in a U.S. District Court in Seattle, Washington, gives us some insight into how the company's cyberforensic team identifies suspicious activation patterns.In 2014, there were several examples of what we normally hear in regard to Microsoft fighting piracy. Microsoft released a white paper titled "The Link Between Pirated Software and Cybersecurity Breaches: How Malware in Pirated Software is Costing the World Billions" (pdf). Microsoft also joined efforts with attorney generals in Louisiana and Oklahoma in order to tackle overseas software piracy such as has been rampant in China. At the start of December, Microsoft Germany cracked down on deceptive sales of products keys for Windows and Office by blocking 50,000 license keys. The keys to activate products had been included in "temporary licenses for trial versions or OEM licenses that had been sold illegally."To read this article in full or to leave a comment, please click here READ MORE | Are you willing to move for your next position? Using data provided by Dice.com, CIO.com counts down the 10 most desirable states for relocation as told by tech professionals. READ MORE | Getting cloudy has always been a mixed proposition in the IT world. Your users want the convenience of using a variety of devices and having their work accessible on all of those devices from wherever they are, whereas you still have to worry about data security, lost computers, federal regulation and the control that is necessary to ensure your organization's information technology resiliency. Add the fact that most cloud services like OneDrive, Google Drive or Dropbox -- let's face it, the ones that your users want -- are consumer-oriented services that lack the ability to be managed and controlled centrally, and you have a face-off for the ages.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: Kaspersky Lab, Inc. Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Learn More | | | | | | | |
No comments:
Post a Comment