Search This Blog

Tuesday, June 02, 2015

SOHO router security audit uncovers 60 flaws in 22 models

Cisco's two presidents resigning | Users of free VPN Hola vulnerable to hacking, researchers warn

Network World Network Optimization

SOHO router security audit uncovers 60 flaws in 22 models
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers. Read More


WHITE PAPER: Okta

Secure your Mobile Workforce
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce. Learn more

WEBCAST: Rimini Street

Navigating Operating Costs and Roadmap Uncertainties for SAP
Listen to this discussion about new innovation and updates in core ERP lag as SAP focuses all its attention on a long-term, high-risk "re-platform" strategy with its newly announced S/4HANA suite. Learn More

Cisco's two presidents resigning
Cisco's co-presidents plan to resign on the eve of the company's new CEO taking the reins. Rob Lloyd and Gary Moore will step down July 25 as incoming CEO Chuck Robbins implements a flatter organizational structure. Read More

Users of free VPN Hola vulnerable to hacking, researchers warn
Free P2P VPN Hola sold users' bandwidth which was then used for botnets; researchers say to uninstall Hola now as it makes users vulnerable to hacking. Read More

Intel cranks up speed of Thunderbolt 3, builds in support for USB
Intel is giving Apple and other laptop makers a reason to put its Thunderbolt high-speed data ports back in their next ultrathin laptops: Thunderbolt 3.0 ports will use the same Type C connector as USB 3.1—but when connected to other Thunderbolt devices, will run up to four times as fast. Read More


: Red Hat

Building an Open Hybrid Cloud
Smart IT leaders are looking closely at an open hybrid cloud to deliver the full value and promise of cloud computing. In this KnowledgeVault, see how an open hybrid cloud can leverage your existing IT investments in hardware, software and training-allowing you to build a cloud in an evolutionary way, reducing costs and risks. Learn More

Google cloud strategy focuses on analyzing big data
Google may not have caught up to Amazon in the cloud market, but that's OK, according to a Google executive. The company is heading in a slightly different direction with cloud computing that involves helping customers analyze their data. Read More

Backup and Restore on the Cisco ASA 9.3
In a recent blog post, I examined some of the new features available in the Cisco Adaptive Security Appliance (ASA) 9.3 code and promised to cover some of these here at the blog. With that said, let's examine the Backup and Restore functionality that is now built in to these devices. Read More

Who should get the blame in IRS breach?
If cybercrime is visualized as a river, its headwaters may be in a doctor's office in places such as South Florida. It's here where a cellphone photograph of a medical form filled out by a patient can be sold for a minimum of $10. Read More


WHITE PAPER: IBM

Data and Storage Reduction: Some Existing Options
Spending the same amount to store all types and pieces of data—or even to keep any data which has no positive value to an organization—is a suboptimal approach from many perspectives. Read more to learn how to store and spend less on data. Learn More.

Nokia wants to build data centers for mobile operators
Nokia wants to help mobile network operators launch new services and cut their costs with a new range of servers, switches and storage they can use to virtualize their networks. Read More

Recommended reading: Cisco Visual Networking Index (VNI) update
Cisco provided an update to its annual Visual Networking Index (VNI), predicting that IP Traffic will triple from 2014 to 2019 with much of the growth driven by increasing mobile access and demand for video services. The data shows that by 2019, there will be about 3.9 billion Internet users, representing 51% of the world's projected population. Read More

Like routers, most USB modems also vulnerable to drive-by hacking
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites. The flaws could allow attackers to steal or manipulate text messages, contacts, Wi-Fi settings or the DNS (Domain Name System) configuration of affected modems, but also to execute arbitrary commands on their underlying operating systems. Read More


SLIDESHOWS

Windows 10: Which classic Microsoft default apps should be killed?

Based on what we've seen in Microsoft's Windows 10 preview editions, here's our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 7 rumor rollup: Getting chippy, Force Touch all around

2. Cisco's two presidents resigning

3. 11 pointless but awesome Linux terminal tricks

4. Google Android developer advocate: everyone's doing wrong

5. VMware 6.0: Faster, smarter, more resilient

6. Review: Ubuntu 15.04 is an amazing release, but I hate it

7. Users of free VPN Hola vulnerable to hacking, researchers warn

8. Why did Microsoft skip Windows 9 and jump to Windows 10

9. Microsoft will reportedly release Windows 10 RTM in June

10. Thieves using a $17 power amplifier to break into cars with remote keyless systems


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: