Cisco VNI Says 3x More Data by 2019

  Cisco’s survey of Global network traffic is being reviewed by Network Daily, so I thought I would discuss some of its ramifications for IT security. White paper link: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.pdf   Network World Link: “Cisco Sees Internet Half Full” http://www.networkworld.com/article/2928657/cisco-subnet/cisco-sees-internet-half-full.html 24 Billion devices will be on the Internet by 2019 up from 14 Billion in 2014.   … Read more

Are We Falling Behind on Patching Computers?

I.e. Bruce Schneier quote: Can we patch vulnerabilities faster than attackers can exploit them?   The University of maryland, College park has a website project: https://www.umiacs.umd.edu/~tdumitra/blog/2015/04/15/impact-of-shared-code-on-vulnerability-patching/ In my opinion the crux of their vulnerability survey is in this graph(also from Univ of Maryland link):   The end result of this survey was that how long vulnerabilities … Read more

Another Major Security Flaw (Website Encryption Technology) Called Logjam

A new report came out  https://weakdh.org/imperfect-forward-secrecy.pdf     The group of researchers created a website to explain their findings: The Logjam Attack (https://weakdh.org) It looks like they also did a scan of the Internet (this is typical of security researchers using zmap.io) and found over 8.4% of Top1 million domains were at risk. This means … Read more

IT Security work seems like we are in “Groundhog Day” the movie

You know the movie which makes Phil(Bill Murray) relive the same day until he gets it right.  http://www.imdb.com/title/tt0107048/ I asked Google how many days are in the movie “Groundhog Day”?   8 years, 8 months and 16 days, the director said 10 years.   IT security is just like that except it should be called … Read more

Does it Pay to be a Criminal Hacker?

Before i answer this question let me give you a screenshot of the following FBI Cyber most wanted: from www.fbi.gov/wanted/cyber Alexsey Belan: Belan allegedly stole the user data and the encrypted passwords of millions of accounts and then negotiated the sales of the databases. Two separate federal arrest warrants for Belan have been issued. One … Read more