Wednesday, February 12, 2014

NTP reflection: Mirror, mirror, on the wall, who is the DDoS'iest of them all?

Gigabit Wi-Fi Case Study: Erickson Living upgrades to 802.11ac | Wireless charging moves forward -- rival groups team to adopt standards

Computerworld Networking

Forward this to a Friend >>>


Richi Jennings: NTP reflection: Mirror, mirror, on the wall, who is the DDoS'iest of them all?
Network Time Protocol DDoS vuln only needs one bad apple. In an "ugly" turn of events, a vulnerability in many NTP servers helps hackers deny service to others. Using a reflection attack, they managed to create 400 Gb/s of traffic to a single CloudFlare IP address. Presumably while cackling, "Amplify THIS!" Do you run an NTP server? Have you made sure it's not vulnerable? In IT Blogwatch, bloggers make like they're snow whiter than white. [You're fired -Ed.] Read More


WHITE PAPER: IBM Corporation

Operational Analytics from A to Z
As the market demands faster and more accurate responses to opportunities and threats, operational analytics is becoming the foundation for real-time decision making. The paper outlines the business value and technological foundations of operational analytics. View Now

RESOURCE COMPLIMENTS OF: DEMO Enterprise

What's trending in wearable computing and digital money?
Come to DEMO Enterprise, April 3 in SF to see the best new products in wearable computing, digital money, mobile, health, internet, enterprise, big data and more. All products are handpicked by top VC experts for their innovative design and market potential. Special offer to newsletter subscribers, register and save 40%.

INSIDER
Gigabit Wi-Fi Case Study: Erickson Living upgrades to 802.11ac
Erickson Living, a company that manages 16 Continuing Care Retirement Communities in nine states, faces a unique challenge when it comes to installed a wireless network a each retirement community has common areas where residents share available bandwidth, but there are also individual residential units where end users have their personal phone and Internet connections. Read More

Wireless charging moves forward -- rival groups team to adopt standards
The Alliance for Wireless Power and Power Matters Alliance announced today they have reached an agreement to establish interoperability standards for wireless power charging. Read More

Target breach happened because of a basic network segmentation error
The massive data breach at Target last month may have resulted partly from the retailer's failure to properly segregate systems handling sensitive payment card data from the rest of its network. Read More

Stuart Kippelman: Net neutrality will impact IT
Earlier this month the United States Court of Appeals struck down the FCC's Net Neutrality directive. Just in case you were worried, let me assure you the Internet won't be coming to an end anytime soon. While this decision has been covered extensively in the media, not much has been said about the potential impact to IT organizations. So without further ado, let's discuss what IT departments can and should do about it. Read More


WHITE PAPER: IBM

Smarter analytics on IBM POWER7 for Retail
The retail landscape is changing—industry leaders are enhancing their interactions with customers through insights gained from all channels. Read the white paper and see how IBM POWER7 smarter analytics can gather and analyze shopper information to personalize retail experiences, drive more sales, gain loyalty and improve supplier collaboration. Learn More

Attackers use NTP reflection in huge DDoS attack
Attackers abused insecure Network Time Protocol servers to launch what appears to be one of the largest DDoS (distributed denial-of-service) attacks ever, this time against the infrastructure of CloudFlare, a company that operates a global content delivery network. Read More

Cisco, Innovatio come to Wi-Fi patent agreement
Cisco Systems has come to an agreement with patent firm Innovatio IP Ventures in a dispute over Wi-Fi standards-essential patents that targeted its customers. Read More

INSIDER
Westmont College jumps to Gigabit Wi-Fi for three reasons: "Speed, speed and speed"
Westmont College in Santa Barbara, Calif., was the first school in the country to deploy an all-802.11n network when, four years ago, it rolled out 290 Meraki access points to bring nearly complete coverage to dorms, classrooms and campus buildings. Read More

Hackers try to hijack Facebook, other high profile domains through registrar
The Syrian Electronic Army (SEA), a group of hackers that has hijacked other high-profile domain names, managed to change the domain registration information for Facebook.com, but failed to redirect the domain to a different server. Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 40% of tech support workers had to remove malware from devices after employees visited adult content sites. Is this a problem at your company?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:53 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive