Search This Blog

Monday, July 21, 2014

Cisco counterfeiter gets 37 months in prison, forfeits $700,000

Network World Cisco - Newsletter - networkworld.com
  Cisco, Microsoft chasing clouds | The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)

 
  Network World Cisco

Forward this to a Friend >>>


Cisco counterfeiter gets 37 months in prison, forfeits $700,000
A company and its CEO has been whacked by a US federal court for conspiring to build and sell counterfeit Cisco gear.  According to U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations and court records, ConnectZone.com, LLC and owner, Daniel Oberholtzer conspired with a Chinese company to produce counterfeit Cisco Systems network products that were later sold on websites operated by ConnectZone as genuine products.  +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)+To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: McAfee

The Only Next Gen Firewall to Stop AETs
The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization on multiple protocol layers. View Now

WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

Cisco, Microsoft chasing clouds
Cisco this week expanded its data center arrangement with Microsoft with a multiyear sales and go-to-market effort for integrated products. The deal builds upon one agreed to 15 months ago, when the two companies combined cloud offerings under their respective Cisco Unified Data Center and Microsoft Fast Track 3.0 architectures. As a follow on to that, Cisco and Microsoft will both invest in sales, marketing and engineering resources to align and more deeply integrate products and operations in cloud and data center markets. Like last year's agreement, this one will also include Cisco's Unified Computing System (UCS) and Nexus switches, with Microsoft Cloud OS software, including Windows Server, System Center, SQL Server and Azure.To read this article in full or to leave a comment, please click here Read More
 

The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)
2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development Read More
 

MIT invention to speed up data centers should cheer developers
A breakthrough by researchers at the Massachusetts Institute of Technology could change the way Web and mobile apps are written and help companies like Facebook keep the cat videos coming.Their main innovation is a new way to decide when each packet can scurry across a data center to its destination. The software that the MIT team developed, called Fastpass, uses parallel computing to make those decisions almost as soon as the packets arrive at each switch. They think Fastpass may show up in production data centers in about two years.In today's networks, packets can spend a lot of their time in big, memory-intensive queues, lined up like tourists at Disney World. That's because switches mostly decide on their own when each packet can go on to its destination, and they do so with limited information. Fastpass gives that job to a central server, called an arbiter, that can look at a whole segment of the data center and schedule packets in a more efficient way, according to Hari Balakrishnan, MIT's Fujitsu Professor in Electrical Engineering and Computer Science. He co-wrote a paper that will be presented at an Association for Computing Machinery conference next month. The co-authors included Facebook researcher Hans Fugal.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Fujitsu America
 
Network Management Challenges & the Benefits of Outsourcing
Virtually every business needs to do more with less, and IT is no exception. At the same time, the network has to meet the growing demands of the business. New research conducted by IDG explores the network management challenges that IT and telecom leaders face and how they are dealing with them. Learn more about the research results. Learn more >>

Cisco customers are brutally consolidating too
CEO Chambers says only 1/3 of large enterprises will be around in 20 years Read More
 

The Black Hat Quiz 2014
How well do you know the security conference's revelations about NSA, pwned cars, spying cell phones and more? Read More
 

Dumping an open source Honeypot on Rachel: FTC reloads on liquidating robocallers
FTC The Federal Trade Commission today announced the rules for its second robocall exterminating challenge, known this time as Zapping Rachel Robocall Contest. "Rachel From Cardholder Services," was a large robocall scam the agency took out in 2012. The Zapping Rachel contest will take place at DEF CON 22 in Las Vegas Aug. 7-10, and offers partakers $17,000 in cash prizes for developing open-source packages that could be used to build an advance robocall honeypot, circumvent or trick a honeypot, or analyze data from an existing honeypot, the FTC said.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Fujitsu America
 
Why Managed Network Outsourcing Makes Good Business Sense
A recent survey by IDG Research Services indicates there are significant benefits to partnering with an experienced company capable of handling network management. The right partner can also eliminate the need to build, manage and maintain a network operations center. Learn more >>

Net neutrality a key battleground in growing fight over encryption, activists say
  Both carriers and government now have an interest in how users keep their online lives private Read More
 

Home router security to be tested in upcoming hacking contest
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.The contest is called SOHOpelessly Broken—a nod to the small office/home office space targeted by the products—and follows a growing number of large scale attacks this year against routers and other home embedded systems.The competition is organized by security consultancy firm Independent Security Evaluators and advocacy group the Electronic Frontier Foundation (EFF), and will have two separate challenges.The first challenge, known as Track 0, will require researchers to demonstrate exploits for previously unknown, or zero-day, vulnerabilities in a number of popular off-the-shelf consumer wireless routers.To read this article in full or to leave a comment, please click here Read More
 

Big data security analytics 'plumbing'
According to ESG research, 44% of enterprise organizations (i.e. those with more than 1,000 employees) consider their security data collection and analysis a "big data" application, while another 44% believe that their security data collection and analysis will become a "big data" application within the next 2 years (note: I am an ESG employee). Furthermore, 86% of enterprises collect "substantially more" or "somewhat more" security data than they did 2 years ago.The ongoing trend is pretty clear – large organizations are collecting, processing, and retaining more and more data for analysis using an assortment of tools and services from vendors like IBM, Lancope, LogRhythm, Raytheon, RSA Security, and Splunk to make the data "actionable" for risk management and incident prevention/detection/response.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: