Entries by Alan Zeichick

,

Patch. Sue. Repeat. That’s the plan with Spectre and Meltdown

Spectre and Meltdown are two separate computer security problems. They are often lumped together because they were revealed around the same time – and both exploit vulnerabilities in many modern microprocessors. The website MeltdownAttack, from the Graz University of Technology, explains both Spectre and Meltdown very succinctly – and also links to official security advisories […]

, , ,

Software Defined Perimeter (SDP), not Virtual Private Networks (VPN)

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined Perimeter (SDP). Firewalls imply that there’s an inside to the enterprise, a place where devices can communicate in a trusted manner. This being so, there must also be an outside where communications aren’t trusted. Residing […]

, ,

Most routine IT operations will soon be handled autonomously

Companies can’t afford downtime. Employees need access to their applications and data 24/7, and so do other business applications, manufacturing and logistics management systems, and security monitoring centers. Anyone who thinks that the brute force effort of their hard-working IT administrators is enough to prevent system downtime just isn’t facing reality. Traditional systems administrators and […]

Are you dead or Alive?

Here’s a scam attempt noteworthy only for its inadvertent humor. Needless to say, any email like this is trying to defraud you. Don’t respond to such messages; simply delete them without asking why an allegedly South African email is coming from a Russian address. Or anything like that. From: “FROM THE DESK OF MR. AKIN […]

,

Pornography is a huge security risk – especially in the workplace

Savvy businesses have policies that prevent on-site viewing of pornography, in part to avoid creating a hostile work environment — and to avoid sexual harassment lawsuits. For security professionals, porn sites are also a dangerous source of malware. That’s why human-resources policies should be backed up with technological measures. Those include blocking porn sites at […]

Being scammed in French – mais non!

This just in, via Facebook Messenger, from an account called “Clemond Fernand.” It’s a scam. Don’t reply to messages like this – block the account instead. Bonjour, Je réponds a tous ceux qui sont dans la mélasse comme moi niveau dossier de surendettement, voilà vous allez voir des propositions allé chantes sur des prêts entre […]

Oklahoma is not okay for spam scammers

It’s like this scammer isn’t even trying. Dr. George is disappointed in me for setting up and missing an appointment. Fortunately he went to bat and convinced someone to pay some fees to save my $5.5 million ATM card. If I reply soon and repay the fees, the cash is mine! (I wonder why scammers […]

, , ,

Five tech predictions for 2018

We all have heard the usual bold predictions for technology in 2018: Lots of cloud computing, self-driving cars, digital cryptocurrencies, 200-inch flat-screen televisions, and versions of Amazon’s Alexa smart speaker everywhere on the planet. Those types of predictions, however, are low-hanging fruit. They’re not bold. One might as well predict that there will be some […]

Dell’s predictions for 2018: open networking digital transformation, merchant silicon

Tom Burns, VP and General Manager of Dell EMC Networking, doesn’t want 2018 to be like 2017. Frankly, none of us in tech want to hit the “repeat” button either. And we won’t, not with increased adoption of blockchain, machine learning/deep learning, security-as-a-service, software-defined everything, and critical enterprise traffic over the public Internet. Of course, […]

, ,

More than a billion exposed and breached data records

From January 1, 2005 through December 27, 2017, the Identity Theft Resource Center (ITRC) reported 8,190 breaches, with 1,057,771,011 records exposed. That’s more than a billion records. Billion with a B. That’s not a problem. That’s an epidemic. That horrendous number compiles data breaches in the United States confirmed by media sources or government agencies. […]

I don’t think this is a real job offer via LinkedIn

Hello, Terry, whatever your email address is. I don’t think you really have a job offer for me. For one thing, if you really connected via LinkedIn, you’d have messaged me through the service. For another, email addresses often match names. For another… well, that’s enough. Don’t reply to messages like this. Just delete them. […]

, ,

IBNS and ASN: Intent-Based Networking Systems and Application-Specific Networking

With lots of inexpensive, abundant computation resources available, nearly anything becomes possible. For example, you can process a lot of network data to identify patterns, identify intelligence, and product insight that can be used to automate networks. The road to Intent-Based Networking Systems (IBNS) and Application-Specific Networks (ASN) is a journey. That’s the belief of […]

All the Russian girls love me!

So many women in Russia are vying for my attention… and all of them, from Alina to Veronika, are using the exact same language. Needless to say, this is a scam. The scammers try too hard. One message might have gotten someone’s attention – but receiving so many nearly-identical versions should set off alarm bells. […]

,

Artificial Intelligence and Machine Learning are the future of software development

Millions of developers are using Artificial Intelligence (AI) or Machine Learning (ML) in their projects, says Evans Data Corp. Evans’ latest Global Development and Demographics Study, released in January 2018, says that 29% of developers worldwide, or 6,452,000 in all, are currently using some form of AI or ML. What’s more, says the study, an additional […]

, , ,

Let’s applaud the new Wi-Fi security standard, WPA3

Wireless Ethernet connections aren’t necessarily secure. The authentication methods used to permit access between a device and a wireless router aren’t very strong. The encryption methods used to handle that authentication, and then the data traffic after authorization, aren’t very strong. The rules that enforce the use of authorization and encryption aren’t always enabled, especially […]

,

How Arizona got its almost-square shape west of New Mexico

A fascinating website, “How Did Arizona Get its Shape?,” shows that continental expansion in North America led to armed conflicts with Native American groups. Collectively known as the American Indian Wars, the conflicts began in the 1600s, and continued in various forms for the next several centuries. Multiple conflicts occurred during the U.S.-Mexican War, as […]