Tuesday, October 21, 2014

Researcher creates proof-of-concept worm for network-attached storage devices

EMC to buy OpenStack cloud guru Cloudscaling | Red Hat CEO Jim Whitehurst on the impact of cloud and mobile

Network World Storage

Researcher creates proof-of-concept worm for network-attached storage devices
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.Earlier this year, Jacob Holcomb, a security analyst at Baltimore-based firm Independent Security Evaluators, started researching the security of NAS devices. He selected popular devices from 10 manufacturers and found that they were all were susceptible to root compromise. In addition, he found that exploiting half of them did not require authentication.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Kaminario

Testing of VMware View VDI on Kaminario K2 storage
This technical report covers detailed performance and efficiency tests for the Kaminario K2 array supporting VMware Horizon View virtual desktops that quantify its ability to support a range of critical VDI workloads. Learn More>>

WHITE PAPER: Tintri Inc.

Scaling Virtual Environments with Tintri Smart Storage
Tintri VMstore and Tintri Global Center offer IT organizations the best choice for building and scaling virtualized environments. VMstore is the industry's leading storage solution designed for virtualized environments, and Tintri Global Center adds the visibility and control to enable all VMstore systems to function as one. Read now!

EMC to buy OpenStack cloud guru Cloudscaling
An EMC spokesperson this afternoon confirmed that the company will buy Cloudscaling, which builds clouds based on the OpenStack software.The deal would mark the latest in a wave of consolidation in the cloud industry, with previous big acquisitions including HP snapping up Euclayptus and Cisco buying OpenStack vendor Metacloud. It also comes as there is some shakeup in the OpenStack community, with one of the forefathers of the movement, Joshua McKenty leaving his post as CTO of Piston Cloud Computing Co. and landing at Pivotal, the VMware/EMC spinout that is focused on the open source Cloud Foundry platform as a service. The move also comes just before the latest Juno release of the project and as the community gears up for its semi-annual summit to be held in Paris.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Tintri Inc.

Application-Aware Storage
Server virtualization brings tremendous value in terms of adding operational agility and significant cost savings through consolidation, increased utilization, and workload portability, but storage can be an inhibitor to realizing that value. Learn more

Red Hat CEO Jim Whitehurst on the impact of cloud and mobile
Last month, I wrote about what Red Hat CEO Jim Whitehurst had to say about applications finally overshadowing infrastructure. But the rise of apps is only one of the big changes roiling the IT landscape. Cloud computing has had an equally dramatic effect.Has the cloud already won? Yes… and noSo I asked Whitehurst if the cloud had already won the war for IT infrastructure, but he gave me a more nuanced response than I expected: “I think there’s a new architecture combining computing and storage in an easily managed centralized data center,” he said. “Scaling out that architecture… That’s clearly winning.”To read this article in full or to leave a comment, please click here Read More


WEBCAST: Dell | Symantec

Solve Mobile Conflicts between IT and Users
Effective mobile security does not have to be a battlefield between IT and users. Join this Webcast to hear how to strike a balance between users' mobile desires and IT's need for control Learn More.

Dropbox used for convincing phishing attack
Dropbox’s file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.The security vendor said it detected a batch of phishing emails advising recipients that they’ve been sent a large file and included a link to Dropbox-hosted page.“The email claims the document can be viewed by clicking on the link included in the message,” wrote Nick Johnston of Symantec in a blog post. “However, the link opens a fake Dropbox login page, hosted on Dropbox itself.”By hosting the fake login page on Dropbox, the scammers gain some benefits over hosting it on a random, strange-looking domain name. The phishing page is contained within Dropbox’s user content domain, similar to shared photos or files, Johnston wrote.To read this article in full or to leave a comment, please click here Read More

Apple's iCloud targeted in man-in-the-middle attack in China
Following the iPhone 6 launch in China, Apple's iCloud service began facing a "man-in-the-middle" style attack in the country, in an apparent attempt to steal username and password information, according to an anti-censorship watchdog group.As of Monday, the attack was still ongoing, said GreatFire.org, which began noticing two days before that certain connections made to Apple's iCloud site in China were no longer responding with a trusted digital certificate, putting them at risk of decryption.Man-in-the-middle attacks eavesdrop on communications by pretending to each party to be the one at the other end. The attacker will trick victims into believing they are visiting a site over a secure connection, when in fact all communications are being monitored.To read this article in full or to leave a comment, please click here Read More

Namifying has gotten out of controlify
Chris Johnson, a Seattle-based branding consultant operating as The Name Inspector, has been watching a company name trend for several years now that is likely attributable to the success of Spotify: slapping “ify” on the end of otherwise perfectly good words.  Dating back to 2007, Johnson has counted some 337 such company names; 101 last year and 73 so far this year. The chart he fashioned is a bit big to be legible here, so let’s just list this year’s batch of namified names (prepare for some scrolling):To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

How giant companies see the cloud

16 large enterprises talk about their use of the cloud, their plans, challenges they've run into and how they're approaching the skills issues.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Reorg fallout downplayed by Cisco engineering exec

2. Windows 10: A guided tour

3. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

4. Why Apple's new iPads are irrelevant

5. Is your Ethernet fast enough? Four new speeds are in the works

6. Life as an IT contractor

7. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

8. The Snappening: Snapsaved admits to hack that leaked SnapChat photos

9. Apple's iPad 2 vs. Google's Nexus 9: Comparing the two new tablets

10. 10 Tips to Ensure Your IT Career Longevity


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: