High-tech

High-tech
Light

Friday, February 27, 2015

Hackers exploit router flaws in unusual pharming attack

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 27, 2015 6:22 AM
Subject: Hackers exploit router flaws in unusual pharming attack
To: <aquarianm@gmail.com>
Cc:

How Google avoids downtime.

The 11 People You Meet on (Nearly) Every Open Source Project.

NETWORKWORLD
Network World Daily News AM
February 27, 2015

Hackers exploit router flaws in unusual pharming attack

An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim's Web traffic.The technique exploited security flaws in home routers to gain access to the administrator console. Once there, the hackers changed the routers' DNS (Domain Name System) settings, a type of attack known as pharming.Pharming is tricky to pull off because it requires access to an ISP's or an organization's DNS servers, which translate domain names into the IP addresses of websites. Those DNS systems are typically well-protected, but home routers often are not.Security firm Proofpoint wrote in a blog post Thursday that launching the attack via email was a novel approach since pharming is normally a network-based attack.To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. How Google avoids downtime

2. The 11 People You Meet on (Nearly) Every Open Source Project

3. INSIDER CIOs report that spending is on the rise

4. LTE can mooch off of Wi-Fi spectrum with new Qualcomm chipset

5. Net neutrality rules passed, but we don't know how it works yet

6. Why our bad mental diet leads us to question if security even matters

7. Ericsson seeks to block sales of Apple products in US, stepping up patent dispute

8. INSIDER How enterprises can use artificial intelligence

9. D-Link remote access vulnerabilities remain unpatched

10. Republican bill would overturn FCC municipal broadband decision

11. INSIDER Emerging enterprise techs to watch

12. Google shares code to help server software digest HTTP/2

13. Net neutrality: The second two most boring words in the English language says HBO's John Oliver

14. INSIDER Desktop virtualization review: VMware Workstation vs. Oracle VirtualBox

15. New Forescout CEO wants to make partners an offer they can't refuse

16. 15 of the best Google Chrome experiments ever

Resource compliments of: LinkTek

Hidden Problem with Migrations to the Cloud

Invalid characters are a known problem when migrating to the cloud. But there is another often unknown and hidden problem that can also result in costly disruptions and lost data -– broken file links! LinkFixer Advanced automatically finds and fixes broken file links during cloud migrations. Click now to download your FREE trial of LinkFixer Advanced today!

How Google avoids downtime

Google offers lots of services and it has pretty good reliability. How does the company do it?Much of that is up to Ben Treynor, Google's vice president of engineering, and founder of the company's site reliability team. And he's developed an interesting approach at Google for thinking about reliability.+ MORE AT NETWORK WORLD: 10 Tips for ensuring you don't get... READ MORE

The 11 People You Meet on (Nearly) Every Open Source Project

A colorful cast of charactersImage by Collaborating on open source in public. Igal Koshevoy/Flickr.Open source projects are built collaboratively, across organizations, by professionals and hobbyists alike. This is a formula for a colorful cast of occasionally exasperating characters. In the spirit of this list of terrible IT archetypes I compiled last year, I asked people who had been involved in... READ MORE

INSIDER

CIOs report that spending is on the rise

IT leaders will see bigger technology budgets in the coming year, according to CIO's most recent Tech Poll, which is conducted regularly to gauge IT spending and stages of implementation in key technology categories.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

LTE can mooch off of Wi-Fi spectrum with new Qualcomm chipset

A chipset Qualcomm is introducing at Mobile World Congress next week is likely to make mobile operators happy and some Wi-Fi fans nervous.Amid a scramble for spectrum among cellular carriers, Qualcomm will demonstrate a chipset that lets LTE cells operate in a radio band used by Wi-Fi networks. The new silicon could double the amount of spectrum subscribers can use... READ MORE

Net neutrality rules passed, but we don't know how it works yet

No one outside of the FCC has seen the 317-page net neutrality order. But we do know that net neutrality will come from the FCC regulating the utility like a utility. The FCC Chairman's vote was broadcast on CSPAN, deciding three to two in favor of the order.How this will be implemented won't be clear, not even after the order... READ MORE

White Paper: Rackspace

Do You Know Who is Running Your Cloud?

Choosing a partner with deep cloud expertise, a track record of leadership, an understanding of your industry, and insight into your business' unique requirements is the clear path for migrating your operations into a scalable, highly available cloud solution. Learn More

Why our bad mental diet leads us to question if security even matters

"I guess that just proves that what we do in security doesn't matter. Maybe we don't matter."This sort of response tends to pop up when the industry is presented with evidence that security breaches don't create any or lasting harm for companies and consumers.Does the evidence in those reports suggest we don't matter?Hardly.But it can be discouraging. We all seek... READ MORE

Ericsson seeks to block sales of Apple products in US, stepping up patent dispute

Some Apple products may be banned from sale in the U.S. if Ericsson gets its way after filing a barrage of patent lawsuits.The Swedish telecommunications equipment vendor filed nine lawsuits against Apple on Thursday, seven in the U.S. District Court for the Eastern District of Texas and two in the U.S. International Trade Commission, alleging infringement of a total of... READ MORE

INSIDER

How enterprises can use artificial intelligence

Enterprise IT shops are finding that artificial intelligence isn't just for robotics anymore.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

D-Link remote access vulnerabilities remain unpatched

D-Link routers have several unpatched vulnerabilities, the worst of which could allow an attacker to gain total control over a device, according to a systems engineer in Canada.Peter Adkins, who does security research in his free time, released details of the flaws on Thursday. Adkins said in a phone interview that he has been in intermittent contact with D-Link since... READ MORE

Republican bill would overturn FCC municipal broadband decision

It didn't take long for congressional Republicans to attack the Federal Communications Commission's vote to strike down two state laws that prevent municipal broadband networks from expanding.Seven Republican lawmakers introduced a bill on Thursday, just hours after the FCC vote, that would prohibit the agency from preempting state laws that limit municipal broadband networks. The main sponsors of the bill... READ MORE

White Paper: IBM

Building a Complete View of Your Account Information

Answer a few simple questions about your business and your environment and download a paper that's personalized to help your business leverage all of its customer information for deep customer insight. Learn More

INSIDER

Emerging enterprise techs to watch

New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum computing, gamification, reactive programming, augmented reality, transient computing electronics and Named Data Networking.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Google shares code to help server software digest HTTP/2

Potentially offering a boost for web server software worldwide, Google has released as open source a framework for HTTP/2, the newly updated standard for transmitting Web pages and Web applications over the Internet.The software, called gRPC, handles remote procedure calls (RPC) between servers and clients, such as browsers or mobile applications. It is based on HTTP/2, which was ratified as... READ MORE

Net neutrality: The second two most boring words in the English language says HBO's John Oliver

HBO's John Oliver took apart the net neutrality issue in a piece from his Last Week Tonight with John Oliver HBO show in 2014. To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Desktop virtualization review: VMware Workstation vs. Oracle VirtualBox

Few technologies have had a greater impact on business efficiency and IT productivity than virtualization. While most of the impact has been felt in the data center and in the cloud, virtualization has also transformed IT work on the desktop, where it retains an important role. Here I compare the two leading products in this category: VMware Workstation and Oracle... READ MORE

New Forescout CEO wants to make partners an offer they can't refuse

ForeScout has named Michael DeCesare new CEO ForeScout has named a new CEO who has big plans for making the company's products the remediation layer of choice for other vendors' security offerings that find problems with endpoints but can't fix them.Michael DeCesare, 49, who starts March 1, is joining the company from Intel where he was president of its security... READ MORE

15 of the best Google Chrome experiments ever

What a long, strange series of web gizmos it's beenImage by RedSpider2008Clever web designers have been testing the boundaries of what's possible in a web browser via Google Chrome experiments for nearly six years – and earlier this week, Google announced that the 1,000th Chrome experiment had gone live. Here's a look at some of the more memorable ones.To read... READ MORE

White Paper: IBM

Master Data Management: The Key to Leveraging Big Data

IBM InfoSphere Master Data Management software helps support large transaction loads and high-availability operational environments. Learn More

SLIDESHOWS

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Lenovo's Superfish nightmare may be the tip of the iceberg

2.

...

No comments:

Post a Comment