Daily Tech Digest - February 10, 2018

Think, Do We Rule Technology, or Does Tech Rule Us?

Image: Shutterstock
As CompTIA notes, we can see the dark side of technology every day. Companies misuse or fail to protect data from hackers. Bad data leads to bad decisions. Then, consider our personal lives. Walk into almost any restaurant and see couples on "date night." No talking, just two people looking at their screens. I wonder if some people spend more time talking to Alexa than they do to other humans. "Balance" is about spending an hour without tech. It also means questioning tech decisions. Balance also is about applying the right technology solution to the right problem or opportunity. The saw about "technology for technology's sake" rings true when you see data scientists working on a corporate island soaking up data that holds no relevance to the business. It surfaces when executives say, "We need the IoT," when they have no clue as to why they need it or what IoT really is. The vast majority of technology adoption is for the better, but we still need to ask a few simple questions along the way. Does everyone need it? In fact, does anyone need it?


What Is Cryptojacking? How To Prevent Detect & Recover From It

vulnerable cryptojacking hacking breach security
Hackers have two primary ways to get a victim’s computer to secretly mine cryptocurrencies. One is to trick victims into loading cryptomining code onto their computers. This is done through phishing-like tactics: Victims receive a legitimate-looking email that encourages them to click on a link. The link runs code that places the cryptomining script on the computer. The script then runs in the background as the victim works. The other method is to inject a script on a website or an ad that is delivered to multiple websites. Once victims visit the website or the infected ad pops up in their browsers, the script automatically executes. No code is stored on the victims’ computers. Whichever method is used, the code runs complex mathematical problems on the victims’ computers and sends the results to a server that the hacker controls. Hackers often will use both methods to maximize their return. “Attacks use old malware tricks to deliver more reliable and persistent software [to the victims’ computers] as a fall back,” says Vaystikh.



Generating new revenue streams through intelligent IoT connectivity

Low-bandwidth messaging can be used to send small quantities of data across the core GSM network, which is embedded across the world in 2G and LTE networks. An MQTT-SN-based messaging protocol provides a globally connected network to support the development of new revenue streams. Because this type of connection doesn’t require any form of internet connection that would otherwise leave it prone to external intrusions, greater stability is offered for IoT devices, keeping connectivity levels high and costs low. ... As IoT technology continues to develop, we will gradually see fully automated solutions – which only send data when parameters change – become increasingly commonplace, minimising the need for human interaction. This will enable easy, wide-scale implementation of new, intelligent IoT solutions, presenting increased cost savings for existing streams, while offering further scope to build new business models. It is now crucial that organisations adapt their business models accordingly, allowing them to utilise IoT in further monetising these services.


Governments eye their own blockchain cryptocurrencies

bitcoin security vault
"They've been pretty emphatic," said Brian Behlendorf, executive director of Hyperledger, a collaborative formed to create blockchain technologyfor business use. "They're talking about third-party cryptocurrencies, like bitcoin and the 1,300 other cryptocurrencies out there. But they're not talking about blockchain technology. They're still extremely bullish on that. "They're pushing hard, as many countries are, for using distributed ledgers - using blockchain - to implement their own domestic digital token," Behlendorf added. While blockchain is the foundation for cryptocurrency, it is not anchored to digital currencies. Blockchain distributed ledgers are used for a myriad of business applications, such as authenticating real estate transfers or for digitizing supply chains or tracking international shipments in real time. A government-backed, blockchain-based digital token would offer the benefits of an international currency usable for settlement of global trade and holdings.


Cyber Warranties: What to Know, What to Ask

A cyber warranty is for all services provided by a solutions provider to their customer base. It covers the cost to re-perform services associated with the system update following an external data breach caused by a vendor's product, explains Matt Kletzli, management liability leader at Schinnerer, which recently launched a warranty for tech solutions providers. Schinnerer, an underwriting manager, teamed up with Guidewire, which builds software for the property and casualty (P&C) insurance industry. Its Cyber Warranty uses Cyance, a risk analytics tool from Guidewire, to gauge the risk of vendors' customers so they can customize strategies. The warranty is for small and mid-size solutions providers making $40M maximum each year. "What we're doing is providing the solutions providers with a tangible contractual agreement with every one of their clients where they have a service agreement in place," says Kletzli.


Key iPhone Source Code Gets Posted Online in 'Biggest Leak in History'

Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve. The GitHub code is labeled “iBoot,” which is the part of iOS that is responsible for ensuring a trusted boot of the operating system. In other words, it’s the program that loads iOS, the very first process that runs when you turn on your iPhone. It loads and verifies the kernel is properly signed by Apple and then executes it—it’s like the iPhone’s BIOS. The code says it’s for iOS 9, an older version of the operating system, but portions of it are likely to still be used in iOS 11. Apple has traditionally been very reluctant to release code to the public, though it has made certain parts of iOS and MacOS open source in recent years.


Could Machine Learning Help Startups Beat the Odds?

machine learning helping entrepreneurs
And technology is rapidly reducing the overall cost of starting up. One hundred years ago, the cost to start a business was immense – goods were difficult to transport over long distances. You were limited to a market that immediately surrounded you, and everything had to be done with the help of manual labor. There’s a reason that the average work week was 45.6 hours in 1918, with some estimates placing it at nearly double as industrialization took over later in the century. Today, technology isn’t just industrial in nature. Computer technology is advancing rapidly. Startups can harness the web to gather information and present useful visual data to consumers – just look at how the online gaming industry has become more transparent thanks to big data and ML technology that provides real-time insights. Your smartphone has more technological horsepower than the first space program to successfully reach the moon. Artificial Intelligence (AI) and Machine Learning (ML) allow cars to drive themselves, and computers to beat humans at chess.


Most remain dissatisfied with threat intelligence quality and accuracy

Lack of accuracy and timeliness is among the top complaints about threat intelligence, which in turn hinders its effectiveness and security teams’ ability to quickly mitigate threats. In fact, only 31 percent of respondents cited threat intelligence as actionable. But exchanging threat intelligence amongst peers, industry groups, IT vendors and government bodies can result in more holistic, accurate and timely threat intelligence and a stronger security posture. Two-thirds of respondents (66 percent) reported that threat intelligence could have prevented or minimized the consequence of a data breach or cyber attack, indicating that more infosecurity professionals are realizing the importance of threat intelligence. “Cybersecurity takes a village, and this survey spotlights a real need for the cybersecurity community – and public sector to better cooperate and communicate to share intel on security threats,” said Dr. Larry Ponemon, Chairman of the Ponemon Institute.


The Belgian Federal Computer Crime Unit (FCCU) was able to locate a command and control centre in one of Belgium’s neighbouring countries. Led by the federal prosecutor’s office, the Belgian authorities seized the command and control servers and other servers, while forensic analysis worked to retrieve the decryption keys. ... By sharing the keys with No More Ransom, the Belgian Federal Police becomes a new associated partner of the project, the second law enforcement agency after the Dutch National Police. In recent years, ransomware has eclipsed most other cyber threats, with global campaigns indiscriminately affecting organisations across multiple industries in the public and private sector, as well as consumers. ... The release of the Cryakl decryption keys is yet another successful example of how cooperation between law enforcement and internet security companies can lead to great results, said Europol. 


When should an organization report a data breach?

Notwithstanding requirements, organizations will sometimes notify authorities as soon as possible when there is evidence of a data breach. Doing so always looks good, because it shows you care about your customers’ privacy and ensures your organization is protected. Prompt notifications can also help remedy the situation if data breach details escalate. However, if details worsen, or multiple breaches are involved, notifying the public of each step can lead to unnecessary ‘breach fatigue’. Fallout may occur, as consumers lose trust in an organization beset by confusion. It may also prevent state legislators from incentivizing on cybersecurity regulations, as they become the norm and are considered less urgent. According to databreachtoday.com, “it depends.” Organizations should have established information security management policies and processes well in advance of a data breach.Quote for the day:



Quote for the day:


"Every great movement must experience three stages: ridicule, discussion, adoption." -- Voltaire


Daily Tech Digest - February 08, 2018

What is quantum computing? A machine learning supercharger businesses can’t ignore
CIOs interested in the potential of quantum computing should take stock of early adopters. Volkswagen in March 2017 began using quantum machines from D-Wave Systems to optimize traffic flow for 10,000 taxis in Beijing, China. Volkswagen CIO Martin Hofmann says that his team had to program a quantum chip to address every bit on the chip. "Quantum computing in the next five years will be a dominating technology," Hoffman says. Accenture and 1Qubit are working with Biogen to speed up drug discovery by accelerating the rate at which they can simulate molecules and chemical reactions. J.P. Morgan Chase is working with IBMto use quantum computers for risk analysis and trading strategies. In looking where to apply quantum computing, Brisse says CIOs should identify problems involving large data sets that can't be solved by classic computers, including NP-hard problems, such as the travelling salesman optimization problem. Analyzing death and mortality tables in insurance and calculating risk in securities are a couple of common problems for which Brisse fields inquiries.


Identity fraud enters a new era of complexity

identity fraud complexity
While credit card accounts remained the most prevalent targets for new account fraud, there was significant growth in the opening of new intermediary accounts, such as email payments (e.g. PayPal) and other internet accounts (e.g. e-commerce merchants such as Amazon) by fraudsters. Although not as easily monetized alone, these account types are invaluable in helping fraudsters transfer funds from the existing accounts of their victims. The study also found three significant changes in data breaches in 2017. Nearly a third (30 percent) of U.S. consumers were notified of a breach in the past year, up from 12 percent in 2016. For the first time ever, Social Security numbers (35 percent) were compromised more than credit card numbers (30 percent) in breaches. Data breaches are causing consumers to lose trust in institutions. These trends combined to cause consumers to shift the perceived responsibility for preventing fraud from themselves to other entities, such as their financial institution or the companies storing their data.


Cybersecurity PTSD affects many security professionals

Cybersecurity PTSD affects many security professionals
70 percent of cybersecurity professionals say the cybersecurity skills shortage has had some impact on their organization. Of course, they are living this impact; 63 percent of cybersecurity professionals say the cybersecurity skills shortage has increased the workload on existing staff. More work and stress at the same salary is a surefire recipe for dissatisfied employees and high attrition; 41 percent of cybersecurity professionals say the cybersecurity skills shortage has led to a situation where the infosec staff spends a disproportional amount of time dealing with high-priority issues and incident response. This means that many cybersecurity pros face a high-stress workplace from the beginning to the end of their workdays; 68 percent of cybersecurity professionals believe that a cybersecurity career can be taxing on the balance between one’s personal and professional life. In other words, infosec pros are taking the pressure of their jobs home with them. It’s safe to assume that this can leads to issues like substance abuse and others.


Aryaka enhances SD-WAN with Radware DDoS protection


With this new partnership, Aryaka said users will gain another layer of data security and threat mitigation with Radware DDoS protection. For example, Radware offers its Attack Mitigation service, which protects against DDoS attacks with "always-on detection and mitigation," according to a statement made by Aryaka. In the statement explaining the need for Radware DDoS, Gary Sevounts, Aryaka's chief marketing officer, said, "Today's ever-changing threat landscape necessitates a layered, defense-in-depth approach to security that scales to global enterprise networks and combines advanced threat detection, mitigation and perimeter protection." Aryaka's private network offers customers a foundational layer of security since traffic isn't exposed to the public internet, thereby, avoiding potential outsider threats. Aryaka then offers end-to-end encryption for another layer of protection.


What is Cython? Python at the speed of C

What is Cython? Python at the speed of C
Cython code looks a lot like Python code, by design. If you feed the Cython compiler a Python program, it will accept it as-is, but none of Cython’s native accelerations will come into play. But if you decorate the Python code with type annotations in Cython’s special syntax, Cython will be able to substitute fast C equivalents for slow Python objects. Note that Cython’s approach is incremental. That means a developer can begin with an existing Python application, and speed it up by making spot changes to the code, rather than rewriting the whole application from the ground up. This approach dovetails with the nature of software performance issues generally. In most programs, the vast majority of CPU-intensive code is concentrated in a few hot spots—a version of the Pareto principle, also known as the “80/20” rule. Thus most of the code in a Python application doesn’t need to be performance-optimized, just a few critical pieces. You can incrementally translate those hot spots into Cython, and so get the performance gains you need where it matters most.


More POS malware detected in the wild


The researchers said it is still unclear whether the malware is currently being used in campaigns in the wild, but the co-ordinated use of LogMeIn-themed filenames and command and control (C2) server addresses in Switzerland, coupled with evidence of an earlier Intel-themed variant, suggest that it may well be. The researchers noted that they have been in contact with LogMeIn throughout the investigation to help determine whether its services or products may have been abused as part of the malware deployment process, but no evidence of this was found. “It appears that the use of LogMeIn-themed filenames and C2 domain by the actors behind the malware is a simple lure and ‘camouflage’ technique,” they said, adding that LogMeIn has not been affected or infected in any way. LogMeIn has also issued a statement saying that all legitimate updates for LogMeIn products, including patches, will always be delivered securely in-product.


Ticking Time Bombs in Your Data Center

Programming is the linchpin of the modern data center, the building block for developing all manner of software that makes navigating enterprise IT easier. That being said, one of the data center's biggest threats lies in this foundation of its composition: complex legacy code. If you look at the flaws that lead to most breaches, they aren't so much on algorithmic levels as they are on primary levels, rooted in the legacy code. As the data center moves to the cloud and is forced to update existing protocols, reining in the small but powerful lines of stray programming becomes more critical than ever. In order to compensate for these Achilles' heels, IT teams must ensure that there are proper measures in place to both spot these errors and revise them. If the software is too far down the rabbit hole to be revised at a foundational level, additional layers of security can be enforced through management


5 reasons digital twins matter to your IoT deployment

twin suns
A digital representation of a physical object, digital twins allow businesses to create a crystal-ball-like-view into the future. They enable simulation, analysis and control to test and explore scenarios in a practice setting before initiating changes in the real world. While digital twins have historically been associated with more complex technology environments, its impressive ability to both eliminate problems and deliver next-level operational performance is making these models a must-have technology in every IoT team’s toolkit. Some of the first digital twin cases I’ve witnessed involved complex—and usually expensive—capital assets such as diesel engines, turbines, and heavy-duty mining and construction equipment. Their digital representations are equally complex, comprising finite state machines with potentially tens of thousands of discrete states. However, digital twins offer even the simplest constructs a vast number of benefits.


Teenager suspected of crippling Dutch banks with DDoS attacks


The attacks began more than a week ago when ABN Amro, one of the Netherlands’ bigger banks, fell victim to the first DDoS attack. Customers could not log into their online banking accounts or use the bank’s mobile app. After the first attacks were fended off, a new wave struck, this time also hitting other banks, such as Rabobank, and some other organisations. The Dutch Tax Authority was attacked, as well as DigiD, the country's login system for governmental services. The attacks on both the banks and institutions continued throughout the week, and later affected popular technology website Tweakers.net. As the waves of DDoS attacks crippled the Netherlands’ financial system, many experts started speculating about who was behind them. Fingers were quickly pointed at Russia. Although no concrete evidence emerged, many found the timing of the attacks to be a little coincidental – a matter of days after the news of the AIVD findings broke, so a retaliatory attack seemed a possibility.


The future of work: How to thrive through IT’s latest revolution

The future of work: How to thrive through IT’s latest revolution
“What does an exponential IT worker look like?” asks Jeff Schwartz, human capital principal at Deloitte Consulting. “What part of her work is problem solving? How much is routine? What communication is required in her job? What supervision is required?” If she oversees several people, consider what that oversight might entail, he says. “Is it scheduling a bunch of people, which could be done by algorithm, or is it people talking and seeing and interacting with each other?” With automation, the scheduling function could be handled by a chatbot. Our hypothetical IT employee might still hold a daily meeting with her team, but now they could spend that time solving work problems or discussing priorities. “I look at it and say there’s an opportunity to boost productivity,” Burns says. “In general, I don’t think people like doing mundane tasks. They genuinely want to focus on adding value and these machines help them add more value than they could on their own.”





Quote for the day:


"It is a fine thing to have ability, but the ability to discover ability in others is the true test." -- Elbert Hubbard


Daily Tech Digest - February 07, 2018

AMD lands Dell as its latest Epyc server processor customer

AMD lands Dell as its latest Epyc server processor customer
AMD scored a significant win in its efforts to retake ground in the data center with Dell announcing three new PowerEdge servers aimed at the usual high-performance workloads, like virtualized storage-area networks (VSAN), hybrid-cloud applications, dense virtualization, and big data analytics. The servers will run AMD's Epyc 7000 series processors. What’s interesting is that two of the three new Dell servers, the PowerEdge R6415 and R7415, are single-socket systems. Usually a single-socket server is a small tower stuck in a closet or under a desk and running as a file and print server or departmental server, not something running enterprise workloads. The R7425 is the only dual-socket server being introduced. AMD said the reason is simple. With up to 32 cores and 64 threads on one CPU, up to 4TB of memory capacity, 128 lanes of PCI Express interconnects, and support for up to 24 direct NVMe SSD drives, the servers can do with one processor what would normally require a dual-socket system.


Security vs. Speed: The Risk of Rushing to the Cloud

There's a lot of assumption when it comes to cloud responsibility. "Some businesses think the whole security issue is something you put into the provider's realm," says Jim Reavis, CEO of the Cloud Security Alliance. "The cloud provider may have security services and capabilities, which you can order as an extra, but a lot of responsibilities shift to the cloud." Cloud providers typically own the hardware, network, host operator, and virtual machines, says Dan Hubbard, senior security architect at Lacework. The customer owns everything above that: operating systems, containers, applications, and all of the related access controls. "This is where things get a little muddy from a corporate perspective," he explains. Most companies have parameters in traditional data centers, and their core principles and rules don't apply in the public cloud.


Identity and the smart city

Smart city internet of things with security camera
Once the smart city blossoms, our smart identity will move out of our homes, into our cars, and onwards through the city walls. Identity is the backbone of digital transactions. And smart innovations can use the power of identity to enable online transactions. Our smart identity will allow us to interact with our smart cars, send money to our partner with a click, use remote patient care by sharing patient-generated data, and secure our entry into the smart airport. Of course, all of this could come with a heavy price – our privacy. All of the transactions are based on sharing identity data of some sort. It is inevitable that our digital identity will be drawn into the machinery of the smart city, but it has to be done with privacy respectful implementation. And, privacy of data and IoT security are intrinsically linked, here is some further reading on the security concerns around IoT devices. But privacy has its own special place in the smart city and our identity may hold the key to the solution.


Six ways by which hackers can crack your password

While you might think of Rainbow Table as eclectic colorful furniture but it is a sinister form of stealing your credentials. The Rainbow Table that we are talking about are used to crack passwords and are yet another tool in the hacker’s evergrowing arsenal. This method requires a good knowledge of computers and coding. Rainbow Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what the plaintext password might be. It’s possible for two different passwords to result in the same hash so it’s not important to find out what the original password was, just as long as it has the same hash. The plaintext password may not even be the same password that was created by the user, but as long as the hash is matched, then it doesn’t matter what the original password was.


Oracle’s cloud bravado masks its database despair

Oracle’s cloud bravado masks its database despair
Originally the biggest threat to Oracle’s database dominance seemed to come from the NoSQL crowd, given how data has changed over the past ten years. For decades, the traditional relational database, with its assembly of data into neatly ordered rows and columns, served us well. As data volumes, variety, and velocity changed, the venerable RDBMS seemed outdated. Perhaps it is, but that doesn’t mean enterprises can afford a rush to the exits in favor of the flexible schema that NoSQL offers. As Adrian puts it, “When someone has invested in the schema design, physical data placement, network architecture, etc. around a particular tool, that doesn’t get lifted and shifted easily, something that Gartner calls ‘entanglement.’” As nice as “rip and replace” may sound, once an enterprise has bolted dozens of systems to a particular database, replacing that database may also mean replacing some or many of those interconnected systems.


14 leading tools for predictive analytics and machine learning

Forrester Research has identified 14 leading tools for predictive analytics and machine learning. Venfors included in the research firm's assessment included: Alpine Data, Angoss, Dataiku, Domino Data Lab, FICO, H2O.ai, IBM, KNIME, Microsoft, RapidMiner, Salford Systems, SAP, SAS, and Statistica. Each of these vendors has a comprehensive, differentiated PAML solution; a standalone PAML solution; install base and revenue history; and motivated client inquiries. ... “Angoss KnowledgeSEEKER is a must-have for data science teams that wish to use beautiful and comprehensive visual tools to build decision and strategy trees,” according to Forrester. “It also offers KnowledgeSTUDIO for building models, InsightOPTIMIZER for numerical optimization, and KnowledgeMANAGER for model management. Angoss recently added a coding environment that allows data scientists to use programming languages including R, Python, and the language of SAS.


When is it best to deploy a mesh Wi-Fi network?


While they're still considered inferior when compared with fully wired WLAN implementations, there are a growing number of use cases where a mesh makes sense. In this article, we're going to explore three common scenarios where mesh deployments can prove to be a viable option -- if deployed properly. Before we get into some of these scenarios, it's important to point out a few nuances of mesh Wi-Fi -- and ideal deployment settings where the technology will work best. For one, wireless mesh intelligence has improved significantly compared to years ago. Algorithms have been developed, so wireless repeaters can talk to multiple wireless gateway devices to calculate the optimal path to the wired network based on data such as noise, interferenceand wireless link quality. However, these advancements are gained only when your deployment is configured in a multipoint setting, where repeaters establish connectivity to two or more gateways.


How UN law enforcement tracks global cybercriminals

Like any crime the first point is recognition that it's actually happened. And everything we see around the world, especially in cybercrime is that that often takes a large amount of time. In fact, there's some statistics out there that say that before a cybercrime, for example, an infiltration of the system, is detected could be 13, 14, 15 months, maybe even longer. So a start point is recognition that something has happened, and then if you're a business, what do you do? Do you call the police, or do you not? And some places just choose not to call in law enforcement because they're concerned about their share value, others will then make that call. And then that's where the investigative start point will come to look at what's happened, how has it happened, what are the indicators of compromise, how have cyber criminals or those associated with them done their business?


What is NFV and what are its cost, performance and scaling benefits?

virtualization
Network functions virtualization (NFV) enables IT pros to modernize their networks with modular software running on standard server platforms. Over time, NFV will deliver high-performance networks with greater scalability, elasticity, and adaptability at reduced costs compared to networks built from traditional networking equipment. NFV covers a wide range of network applications, but is driven primarily by new network requirements, including video, SD-WAN, Internet of Things and 5G. According to ETSI, the goal of NFV is to transform the way that network operators architect networks by evolving standard IT virtualization technology to consolidate many network equipment types on to industry standard high-volume servers, switches and storage, which could be located in the data center, in the network or at end-customer premises. NFV replaces traditional, custom-designed network equipment (black boxes) that continues to dominate the installed base of networks.


Cortana explained: How to use Microsoft's virtual assistant for business

“Cortana is always looking out for you, remembering things so you don’t have to, proactively suggesting things you might need to do and helping you do more with less effort,” said Kiesha Clayton, senior communications manager at Microsoft. However, Microsoft’s ability to compete in the increasingly competitive voice assistant market is being tested by rivals with deep pockets and big plans. Amazon, Google and to a lesser extent, Apple, are all adding valuable features to their own voice-activated assistants, increasing interoperability and enabling more complex commands and scenarios. The battle for what many see as the next frontier for computing – and a superior method for interacting with software and hardware – has become fierce. Almost every connected device showcased at CES 2018 in January was equipped with Alexa, Google Assistant or both.



Quote for the day:


"You Can't Lead Just From The Chair In An Office, For People To Follow You, You Have To Be Going Somewhere." -- Gordon TredGold


Daily Tech Digest - February 06, 2018

Logistic Regression Using Python

The goal of a binary classification problem is to predict a class label, which can take one of two possible values, based on the values of two or more predictor variables (sometimes called features in machine language terminology). For example, you might want to predict the sex (male = 0, female = 1) of a person based on their age, annual income and height. There are many different ML techniques you can use for binary classification. Logistic regression is one of the most common. Logistic regression is best explained by example. ... This article explains how to implement logistic regression using Python. There are several machine learning libraries that have built-in logistic regression functions, but using a code library isn't always feasible for technical or legal reasons. Implementing logistic regression from scratch gives you full control over your system and gives you knowledge that can enable you to use library code more effectively.


How to focus on solutions, rather than playing the blame game between business and IT

istock-635719038.jpg
This perennial blame game follows us in our personal lives as well, especially after recent political events. Hop onto your favorite 24-hour cable or radio news show, and it seems the world is on the brink of destruction due to the opposing political party. Every ill in the world, and there are dozens of new ones every day, is the fault of the other side. Take a moment to flip up or down a few channels, and you'll find a station representing the other political party, equally outraged at a world teetering on the brink of destruction due to the actions of your party. ... Amplifying grievances, both real and imagined, has become a big business and surrounds us in our professional and personal lives. It's easy to see why: when you can blame all your professional and personal problems on another party, one that you're unable to change or impact, you're absolved of any accountability or control over your own destiny.


Here's What Happens When Your Mom Or Dad Steals Your Identity

KJ Barnaby Jr. and his mom Trina Patterson.
Minors are attractive targets for identity theft. Because of their young age, they have clean credit reports and often don't discover the theft until they reach adulthood and apply for credit, John Krebs, identity theft program manager with the Federal Trade Commission, told BuzzFeed News. And their social security number and other personal information is easily available to family members — so easily available that there are cases of parents secretly using their adult children's information to open lines of credit. Hailee, a 23-year-old community college student in Pennsylvania, told BuzzFeed News she is working off $500 in debt on a credit card she didn't know existed until recently. Her mother opened the account in her name in 2015 and used it to replace a broken air conditioner. Hailee said she didn't discover the account until Wells Fargo began pestering her about late payments.


Data Science is Changing and Data Scientists will Need to Change Too


There’s a sea change underway in data science. It’s changing how companies embrace data science and it’s changing the way data scientists do their job. The increasing adoption and strategic importance of advanced analytics of all types is the backdrop. There are two parts to this change.  One is what is happening right now as analytic platforms build out to become one-stop shops for data scientists. But the second and more important is what is just beginning but will now take over rapidly. Advanced analytics will become the hidden layer of Systems of Intelligence (SOI) in the new enterprise applications stack.  Both these movements are changing the way data scientists need to do their jobs and how we create value. Advanced analytic platforms are undergoing several evolutionary steps at once. This is the final buildout in the current competitive strategy being used by advanced analytic platforms to capture as many data science users as possible.


Why Linux is better than Windows or macOS for security

Linux, macos and Windows security locks up data
The OS you deploy to your users does make a difference for your security stance, but it isn’t a sure safeguard. For one thing, a breach these days is more likely to come about because an attacker probed your users, not your systems. A survey of hackers who attended a recent DEFCON conference revealed that “84 percent use social engineering as part of their attack strategy.” Deploying a secure operating system is an important starting point, but without user education, strong firewalls and constant vigilance, even the most secure networks can be invaded. And of course there’s always the risk of user-downloaded software, extensions, utilities, plug-ins and other software that appears benign but becomes a path for malware to appear on the system. And no matter which platform you choose, one of the best ways to keep your system secure is to ensure that you apply software updates promptly.

APIs Pose 'Mushrooming' Security Risk

"APIs represent a mushrooming security risk because they expose multiple avenues for hackers to try to access a company's data," explains Terry Ray, CTO of Imperva. "To close the door on security risks and protect their customers, companies need to treat APIs with the same level of protection that they provide for their business-critical web applications.” Nevertheless, APIs remain greatly important for business and IT strategy. "The greatest revenue potential (APIs) provide is removing barriers to growing revenue by integrating platforms and apps so organizations can quickly launch new business models and scale fast," explains Louis Columbus, an enterprise software strategist and principal at IQMS, a manufacturing ERP vendor, in a Forbes piece last year. What's more, APIs are also fueling new methods of developing and deploying software. As organizations seek means to deliver and tweak software faster, they're increasingly breaking up large monolithic code bases into smaller chunks of independent code called microservices.


What is the Industrial IoT? And why the stakes are so high

industrial iot
The industrial internet of things is also referred to as the industrial internet, a term coined by GE, and Internet of Industrial Things. Whatever you call it, the IIoT is different from other IoT applications in that it focuses on connecting machines and devices in industries such as oil and gas, power utilities and healthcare. IoT includes consumer-level devices such as fitness bands or smart appliances and other applications that don’t typically create emergency situations if something goes wrong. Simply stated, there is more at stake with IIoT deployments where system failures and downtime can result in life-threatening or high-risk situations. The IIoT brings computers from IT to operational technology, opening up vast possibilities for instrumentation, leading to major efficiency and productivity gains for almost any industrial operation.


Capacity alone won't assure good cloud performance

Capacity alone won't assure good cloud performance
Truth be told, performance testing is often an afterthought that typically comes up only when there is a performance problem that the users see and report. Moreover, performance usually becomes an issue when the user loads surpass a certain level, which can be anywhere from 5,000 to 100,0000 concurrent sessions, depending on the application. So you discover a problem only when you’re got high usage. At which point you can’t escape the blame. An emerging best practice is to build in performance testing into your devops or cloud migration process. This means adding performance tests to the testing mix and look at how the application workload and connected database deals with loads well beyond what you would expect.  This means looking for a performance testing tool that is compatible with your application, the other devops tools you have, and the target cloud platform where the application is to be deployed. 


securitylock.jpg
Since threat rigidity occurs when FUD is spread, Weeks suggests that a successful cybersecurity professional will carefully communicate to management how prior incidents were handled and convey new ideas on how to eliminate the current threat. "Any message to a group must contain the minimal amount of critical information needed to support the reaction to a threat," explains Weeks. "Not only evaluating all data points, messaging also carefully considers how the recipient perceived those data points. Knowing an audience and what preconceived ideas and hypothesis they may bring is central to proper communications, especially in a threat-response scenario." ... "Ensuring an organization is confident that a cybersecurity professional is managing a response is arguably just as important, if not more so, than implementing a technical control," Weeks writes, adding it is the only way a cybersecurity professional can maintain his or her credibility.


Using blockchain to solve IoT security challenges

In effect, a “permissioned and private” blockchain could be used to safely on-board IoT and other connected devices, registering them in a private blockchain ledger. New devices attempting to access the network would have to be approved, and found to follow the same security policies to be verified and granted access to the chain – thereby eliminating the possibility for “zombie devices” like the ones that carried out the Dyn DDoS attack. Through this model, IoT devices can communicate with like-IoT devices to determine if the “newbie” is up to par on its security settings, making sure that it only has access to data that authorized IoT devices have permissions for, and that it isn’t siloing data or acting as a ‘thingbot’. For instance, if an employee wants to connect their Fitbit while at work, all they need to do is connect it with another IoT device, which would let the Fitbit know what it needs to do in order to be considered secure enough to receive a connection.



Quote for the day:


"You must have long term goals to keep you from being frustrated by short term failures." -- Charles C. Noble


Daily Tech Digest - February 05, 2018

The new gold rush: A look inside cryptocurrency fraud

inside cryptocurrency fraud
There are two main ways that threat actors are currently fraudulently mining cryptocurrencies: botnets and crypto jacking. Botnets were first used to mine Bitcoin in 2014 but the complexity of doing so made it financially unviable however it is now making a comeback as newer cryptocurrency like Monero are easier to ‘mine’. As such Digital Shadows has observed botnets available to rent for $40, one such offering has ‘flown off the shelves’ with almost 2,000 rentals so far. One new tool is a new mining software called “Crypto Jacker”, which combines Coinhive, Authedmine and Crypto-Loot into a WordPress plugin (cj-plugin), with added SEO functionality. Available since November 2017 for just $29, the software allows users to clone popular websites that can then be sent out in spam campaigns. According to the Crypto Jacker site, the software “provides a way to earn crypto currency from people who visit your links, even when you’re sharing other websites that you don’t own.



Knowing where an engineer's policies have "gone off the rails" is a big help in keeping networks running smoothly, said Andrew Froehlich, the president of consulting firm West Gate Networks, based in Loveland, Colo. "For network administrators, this is a huge win, because it will help them to pinpoint where problems are occurring when people start shouting the network is slow." Cisco has tied the analytics engine to a troubleshooting library of what the company has identified as the most common network failure scenarios. As a result, when an engineer makes a change to the network, the Assurance Engine can determine, based on its knowledge base, where the modification could create a problem. Initially, the Assurance Engine will cover only the Nexus 9000 switches required for an ACI fabric. Later in the quarter, Cisco plans to extend the software's capabilities to firewalls, load balancers and other network services from Cisco or partners.


Revolutionize Your Finance Industry Business With FinTech Mobile Apps

App developers understand the opportunities and challenges offered by the FinTech revolution. You need to understand how these have affected the finance industry and business in order to create FinTech mobile apps that can be of maximum benefit to the finance industry and prevent a financial crisis. With the increased use of mobiles and digital revolution, every business has been disrupted, and financial services are no exception to this. There has been a drastic change in the way people are now accessing financial products and services. Customers are now looking out for FinServes that offer mobile apps and wearable technology to uninsured millennials. Insurance companies associating with FinTechs is on a rise and FinServes are increasingly leveraging new technologies to enhance customer experience.


8 Eearly Warning Signs Of IT Disaster

8 early warning signs of IT disaster
“Hidden work with late nights, minor but unexplained outages, simple tasks taking increasingly longer to complete — a death by a thousand paper cuts is all too frequently occurring in organizations,” says Adam Serediuk, director of operations at xMatters, a notification and collaboration platform. A certain amount of inefficiency is inherent in any organization, and most processes trade efficiency for effectiveness, Serediuk admits. But when the same systems continue to break over and over, and no one takes proactive steps to prevent it from happening, it creates a hole that's incredibly difficult to climb out of. "There's always a moment when somebody decides to leave an organization," he says. "Like when they've spent their entire week dealing with the same problem for the 10th time, and a recruiter sends them a message on LinkedIn. It's like, 'You know what? I've had enough of this.' And they move on."


Microsoft is about to kill off its weirdest Windows 10 experiment

Anyway, that update simply wouldn't install. (At least one other person had the same problem last week.) And troubleshooting the update problem led to a comedy of errors. The broken update isn't available in the Microsoft Update Catalog; it's only available via Windows Update. The Windows Update Troubleshooter ran but (incorrectly) reported no problems. On Windows 10 S, you can't use a command prompt or PowerShell to run any diagnostic tools or scripts. So the tedious but often-effective manual option to reset Windows Update wasn't available to me. Upgrading to version 1709 manually wasn't possible, either, because that would have required running Setup.exe from a mounted ISO or from the Update Assistant, which is forbidden in the strict Windows 10 S sandbox. ,,, The underlying concept of Windows 10 S is still valid. An operating system that doesn't allow people to be tricked into installing malware is a good thing. But when those same restrictions make the system literally unmanageable, something's wrong.


What is LLVM? The power behind Swift, Rust, Clang, and more

What is LLVM? The power behind Swift, Rust, Clang, and more
LLVM makes it easier to not only create new languages, but to enhance the development of existing ones. It provides tools for automating many of the most thankless parts of the task of language creation: creating a compiler, porting the outputted code to multiple platforms and architectures, and writing code to handle common language metaphors like exceptions. Its liberal licensing means it can be freely reused as a software component or deployed as a service. The roster of languages making use of LLVM has many familiar names. Apple’s Swift language uses LLVM as its compiler framework, and Rust uses LLVM as a core component of its tool chain. Also, many compilers have an LLVM edition, such as Clang, the C/C++ compiler (this the name, “C-lang”), itself a project closely allied with LLVM. And Kotlin, nominally a JVM language, is developing a version of the language called Kotlin Native that uses LLVM to compile to machine-native code.


What Leonardo da Vinci Can Teach Us About Digital Innovation

“If you’re going to be a disrupter, you occasionally need to let your reach extend your grasp,” said Walter. He explained that innovation sometimes depends on challenging yourself and the people around you—and sometimes failing. “With Leonardo, he wanted to make a flying machine. But you can’t do it. We still don’t have a self-propelled flying machine. Leonardo studied different aspects of birds’ flight extensively and tried to develop flying machines throughout his life. After a while, Leo figured out why it can’t be done based on his studies of birds— their anatomy, how wind effects flight and other factors.” After researching and writing about Leonardo, Steve Jobs and other digital innovators, Walter said, “It’s cool to allow your reach to extend your grasp, try something that’s impossible and then discover why it’s impossible. That’s what we do every day in disruptive industries. We sometimes say, ‘I’m willing to fail but let me see why.’”


3 ways to reshape your workforce in the age of AI

istock-802508588.jpg
"To achieve higher rates of growth in the age of AI, companies need to invest more in equipping their people to work with machines in new ways," Mark Knickrehm, group chief executive of Accenture Strategy, said in a press release. "Increasingly, businesses will be judged on their commitment to what we call Applied Intelligence - the ability to rapidly implement intelligent technology and human ingenuity across all parts of their core business to secure this growth." While many fear that AI will replace low-level jobs, most businesses are optimistic about the impact on their companies, the report found: 63% of senior executives said they think their company will create net job gains in the next three years due to AI, while 62% of workers said they believe AI will have a positive impact on their work. Here are three ways business leaders can shape their future workforce in the age of AI, according to Accenture:


Microsoft Teams updates streamline search, sharing features


The Microsoft Teams updates also include a personal view of user apps within Teams that allow users to access tasks, issues or requests they have been assigned to. Users can view recently accessed items such as OneNote notebooks or videos from Microsoft Stream. Microsoft also added a new app, called Who, which uses capabilities from Microsoft Office Graph to let users search for people within their organization by name or topic. Microsoft has also integrated its automated workflow service, Flow, with Teams. The integration allows users to create and manage workflows, review approval requests and launch workflows from within Teams. Constellation Research analyst Alan Lepofsky said in a blog post that the Microsoft Teams updates are good enhancements, but some features, such as the commands for searching and sharing information, will take some getting used to.


Akamai: IoT the new 'shadow IT' of the enterprise

Despite security vendors pushing the idea of "password hygiene" at length, another big problem facing the enterprise is the result of users still having the same username and password across multiple accounts, Sullivan told ZDNet. With a distributed denial of service (DDoS) attack the attackers typically want to make as much noise on the network as possible, but with credential stuffing it is the opposite, as they want to be stealthy. "So they all basically distribute attacks to a target through a massive set of proxy servers ... they're trying to circumvent controls looking at a high request rate from a given IP address and they have commandeered so many IoT devices that they can distribute those requests so far and wide," he explained. "We see about 10 times more IPs participating in credential stuffing attacks than we do DDoS."



Quote for the day:


"If you want to achieve widespread impact and lasting value, be bold." -- Howard Schultz