Earlier this week, one of our customer service managers shared a video that captures three men placing a card skimmer on a store machine. All they had to do was distract the cashier for a few seconds–bam, PoS attacks. The machine looks exactly the same even when the skimmer is placed on top, so it is unlikely for anybody to notice the change just by looking at it.
Author: Alienor
Does the FBI iPhone Hack Fall Under Ethical Hacking?
The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters. Now, the FBI is refusing to inform Apple how it accomplished this. In this post, I’d like to discuss the implications of the tension between the FBI and Apple, as well as whether the FBI iPhone hack falls under ethical hacking.
Why Is My Computer Connecting to Akamai Technologies?
Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications. It’s a huge headache, because I have to read dozens of names I don’t recognize and somehow distinguish between the crucial processes and the ones I can throw out. I’ve seen many people going through a similar confusion because they find out that their computer is constantly connecting to Akamai Technologies—a name not everyone is familiar with.
VMware DFW IPFIX Support
The VMware DFW (Distributed Firewall) is part of the NSX feature set and provides a way to manage which connections are permitted or denied within a VMware Software-Defined Data Center (SDDC). The DFW is capable of even more, however, when configured to export IPFIX to a flow collector, like Scrutinizer, for analysis.
Big Data and NetFlow
Big data is popping up in all things IT these days. It impacts a good percentage of business applications across all verticals from government to healthcare to media, and no surprise, it can have a significant impact on network performance as well. More and more companies are collecting huge volumes of data—terabytes or even petabytes—from their network every day, and these volumes are expected to continue to increase. IT teams need to figure out not only how to store big data, but how to recall and analyze it so that it can be put to good use. Read more