• Many companies that are proud of their ability to identify and clean machines infected with malware are missing a trick and creating a false sense of security, says a veteran security expert.
    “Many IT security teams are failing to think about how threats work,” said Rodney Joffe, senior technologist at communications and analysis firm Neustar.
    The typical approach in many firms is to simply disinfect machines without looking at what happened from the moment of infection, he told Computer Weekly.
    However, Joffe points out that in many of the so-called advanced persistent threat (APT) attacks his company is seeing, attackers are getting into organisations at a low level by targeting a receptionist’s machine, for example.
    Once inside the network, attackers use the initial target “merely as a stepping stone” to move up the hierarchy until they reach their real target.
    According to Joffe, many IT security teams are failing to recognise that while a receptionist’s machine has no value, it is in a direct path to the company executives.
    “They don’t even begin to understand the importance of doing forensics, to track down infections as they move within corporate networks to machines that hold sensitive data,” he said.
    A failure to track infections means that by the time data breaches are discovered, attackers have had access to the corporate network for months and even years without being detected.
    Organisations within the public sector and defence industry are typically the best at coping with attacks that appear to be low level, but are in fact highly targeted at key information assets.
    “These organisations cope with these attacks by building a group that is tasked with forensics and threat analysis to understand the motivations of attackers and trace where infections have gone or are trying to go,” said Joffe.
    Threat analysts are no longer confined to anti-virus companies, but are becoming increasingly common in organisations that really understand the threat and the risk, he said.
    “These organisations are hiring or training people to work through the process, understand the infection point as the starting point, not the end point; and then they trace all the internal contacts that occurred between that system and the rest of the company to its logical conclusion,” said Joffe.
    The importance of this approach, he said, is underlined by cases where the theft of intellectual property that started with a single low-level compromise, has had a financial impact of hundreds of millions of dollars as happened with US chemical firm DuPont two and a half years ago.
    Cyber security has become a top priority for governments, particularly in the UK and the US, where they recognise the potential threat of intellectual property theft on the economy, said Joffe.
    “Companies need to understand what attackers are really targeting and realise that just because they are not aware of anything, it does not mean it is not happening,” he said.




  •  

    Apple unveiled the next-generation iPhone at its headquarters in Cupertino, Calif. on Tuesday. The iPhone 5S — revealed alongside a low-cost iPhone model, the iPhone 5C — keeps the same overall physical design as the previous-generation iPhone 5, but it also has a number of upgrades.
    Calling it the most "forward-looking" iPhone it's ever launched, Apple equipped the iPhone 5S to run 64-bit apps (all previous models ran at 32 bits) thanks to a new processor: the Apple A7. It packs more than 1 billion transistors into a 102mm chip. Apple has re-engineered all the built-in apps — such as Mail, Calendar and iPod — for 64-bit architectures.


    Apple says the new chip makes the iPhone 5S five times faster than the iPhone 5 and 56 times than the original iPhone. The A7 chip supports OpenGL 3.0/ES Version 3.0 for console-level 64-bit graphics. The upcoming Infinity Blade III will be one of the first games to take advantage of the upgrade to deliver improved graphics.

    The iPhone 5S introduces a CoreMotion API for developers, consolidating sensor data from the accelerometer, gyroscope and compass. Apple says it's "optimized for contextual awareness," such as when the user is in a moving vehicle.  

    Apple says the system will empower a new generation of health and fitness apps.
    One of the major additions to the hardware is a fingerprint sensor in the home button, which enables a feature called TouchID. The iPhone 5S scans the fingertip of the person pressing the button, eliminating the need for a lock code. TouchID also means the end of the repeated ritual of entering your Apple ID password every time you download a new app.
    The fingerprint sensor, which has a protective layer of durable sapphire crystal, can store multiple fingerprints and read them from any orientation. They all reside, encrypted, on the A7 chip.


    Major Camera Improvements

    The iPhone's camera is also improved with new sensors that have 15% more area. The Apple-designed lens has five elements with an f/2.2 aperture. The larger sensor translates into bigger pixels that are backed by upgraded image-processing software that automatically sets white balance and exposure level in a dynamic, local tone map of the image
    .
    As predicted, the camera is equipped with a dual-LED flash. The two LEDs have different color temperatures, illuminating a scene with warm and cold light to draw out more natural color. The iPhone's camera also now includes a burst mode that snaps 10 still pictures in one second with automatic image stabilization. (Panorama photos go up to 28 megapixels.)

    Finally, the iPhone 5S camera is capable of capturing HD video at 120 frames per second (fps). The video camera also has a slow-motion mode.


    Gold!

    Battery life is rated as follows: 10 hours 3G talk, 8 hours 3G browsing, 10 hours LTE or Wi-Fi browsing, 10 hours video playback, 40 hours music playback and 250 hours standby.
    Apple is injecting a little more color into its flagship phone as well. The iPhone 5S will be available in white, black and now champagne gold, marking a change from previous generations, which were available only in white and black.

    The iPhone 5S will go on sale Sept. 20 in nine countries: the United States, Canada, China, France, Germany, Japan, Singapore and the UK. Like previous generations, it will come with 16, 32 or 64GB of storage for $199, $299 and $399, respectively — as long as you sign a two-year contract with your wireless carrier (T-Mobile's installment pricing may be a little different).

    By December, Apple plans to sell the iPhone 5S in 100 countries on more than 270 carriers. Apple will also offer dyed leather cases for $39 each.

    Although the iPhone 5S and 5C replace the iPhone 5, Apple will continue to sell the iPhone 4S — albeit with just one storage option, 8GB.

    Rumors have swirled around the iPhone 5S for the past year. Although competition in the smartphone space has heated up considerably in that time, Apple kept to its annual schedule of releasing the new iPhone in the fall.

     The big question is: Will consumers still buy Apple's signature product as they used to?
  • FBSysAdminWeekday2 (3)

    We know how administrators love free tools that make their life easier and, to supplement the list provided on 101 Free Admin Toolshere are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing traffic on your network. Even if you may have heard of some of these tools before, we’re sure you’ll find a gem or two amongst this list – and if you know of any others, leave us a comment below!

    1. Microsoft Network Monitor

    Microsoft Network Monitor is a packet analyser that allows you to capture, view and analyse network traffic. This tool is handy for troubleshooting network problems and applications on the network. Main features include support for over 300 public and Microsoft proprietary protocols, simultaneous capture sessions, a Wireless Monitor Mode and sniffing of promiscuous mode traffic, amongst others.
    MicrosoftNetworkMonitor
    When you launch Microsoft Network Monitor, choose which adapter to bind to from the main window and then click “New Capture” to initiate a new capture tab. Within the Capture tab, click “Capture Settings” to change filter options, adapter options, or global settings accordingly and then hit “Start” to initiate the packet capture process.

    2. Nagios

    Nagios is a powerful network monitoring tool that helps you to ensure that your critical systems, applications and services are always up and running. It provides features such as alerting, event handling and reporting. The Nagios Core is the heart of the application that contains the core monitoring engine and a basic web UI. On top of the Nagios Core, you are able to implement plugins that will allow you to monitor services, applications, and metrics, a chosen frontend as well as add-ons for data visualisation, graphs, load distribution, and MySQL database support, amongst others.
    Tip: If you want to try out Nagios without needing to install and configure it from scratch, download Nagios XI and enable the free version. Nagios XI is the pre-configured enterprise class version built upon Nagios Core and is backed by a commercial company that offers support and additional features such as more plugins and advanced reporting.
    Note: The free version of Nagios XI is ideal for smaller environments and will monitor up to seven nodes.
    NagiosXI
    Once you’ve installed and configured Nagios, launch the Web UI and begin to configure host groups and service groups. Once Nagios has had some time to monitor the status of the specified hosts and services, it can start to paint a picture of what the health of your systems look like.

    3. BandwidthD

    BandwidthD monitors TCP/IP network usage and displays the data it has gathered in the form of graphs and tables over different time periods. Each protocol (HTTP, UDP, ICMP, etc) is color-coded for easier reading. BandwidthD runs discretely as a background service.
    bandwidthD
    Installation is easy. Download and install Winpcap version 3.0 or above (you’ll already have this installed if you have Wireshark on the same box), unzip BandwidthD to a specified folder, edit the ../etc/bandwidthd.conf file accordingly, double click on the “Install Service” batch file and then start the BandwidthD services from the services.msc console. Once the service is running, give it some time to monitor network traffic and load the index.html page to start viewing bandwidth statistics.

    4. EasyNetMonitor

    EasyNetMonitor is a super lightweight tool for monitoring local and remote hosts to determine if they are alive or not. It is useful for monitoring critical servers from your desktop, allowing you to get immediate notification (via a balloon popup and/or log file) if a host does not respond to a periodic ping.
    EasyNetMonitor
    Once you launch EasyNetMonitor, it will appear as an icon in the notification area on your desktop where the IP addresses / host names of the machines you want to monitor can be added. Once you’ve added the machines you wish to monitor, be sure to configure the ping delay time and notification setting.


    5. Capsa Free

    Capsa Free is a network analyzer that allows you to monitor network traffic, troubleshoot network issues and analyze packets. Features include support for over 300 network protocols (including the ability to create and customize protocols), MSN and Yahoo Messenger filters, email monitor and auto-save, and customizable reports and dashboards.
    Capsa
    When you launch Capsa, choose the adapter you want it to bind to and click “Start” to initiate the capture process. Use the tabs in the main window to view the dashboard, a summary of the traffic statistics, the TCP/UDP conversations, as well as packet analysis.


    6. Fiddler

    Fiddler is a web debugging tool that captures HTTP traffic between chosen computers and the Internet. It allows you to analyze incoming and outgoing data to monitor and modify requests and responses before they hit the browser. Fiddler gives you extremely detailed information about HTTP traffic and can be used for testing the performance of your websites or security testing of your web applications (e.g. Fiddler can decrypt HTTPS traffic).
    Fiddler
    When you launch Fiddler, HTTP traffic will start to be captured automatically. To toggle traffic capturing, hit F12. You can choose which processes you wish to capture HTTP traffic for by clicking on “All Processes” in the bottom status bar, or by dragging the “Any Process” icon from the top menu bar onto an open application.


    7. NetworkMiner

    NetworkMiner captures network packets and then parses the data to extract files and images, helping you to reconstruct events that a user has taken on the network – it can also do this by parsing a pre-captured PCAP file. You can enter keywords which will be highlighted as network packets are being captured. NetworkMiner is classed as a Network Forensic Analysis Tool (NFAT) that can obtain information such as hostname, operating system and open ports from hosts.
    NetworkMiner
    In the example above, I set NetworkMiner to capture packets, opened a web browser and searched for “soccer” as a keyword on Google Images. The images displayed in the Images tab are what I saw during my browser session.
    When you load NetworkMiner, choose a network adapter to bind to and hit the “Start” button to initiate the packet capture process.

    8. Pandora FMS

    Pandora FMS is a performance monitoring, network monitoring and availability management tool that keeps an eye on servers, applications and communications. It has an advanced event correlation system that allows you to create alerts based on events from different sources and notify administrators before an issue escalates.
    pandorafms
    When you login to the Pandora FMS Web UI, start by going to the ‘Agent detail’ and ‘Services’ node from the left hand navigation pane. From here, you can configure monitoring agents and services.

    9. Zenoss Core

    Zenoss Core is a powerful open source IT monitoring platform that monitors applications, servers, storage, networking and virtualization to provide availability and performance statistics. It also has a high performance event handling system and an advanced notification system.
    ZenossCore
    Once you login to Zenoss Core Web UI for the first time, you are presented with a two-step wizard that asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs to configure Zenoss Core and review reports and events that need attention.


    10. PRTG Network Monitor Freeware

    PRTG Network Monitor monitors network availability and network usage using a variety of protocols including SNMP, Netflow and WMI. It is a powerful tool that offers an easy to use web-based interface and apps for iOS and Android. Amongst others, PRTG Network Monitor’s key features include:
    (1) Comprehensive Network Monitoring which offers more than 170 sensor types for application monitoring, virtual server monitoring, SLA monitoring, QoS monitoring
    (2) Flexible Alerting, including 9 different notification methods, status alerts, limit alerts, threshold alerts, conditional alerts, and alert scheduling
    (3) In-Depth Reporting, including the ability to create reports in HTML/PDF format, scheduled reports, as well as pre-defined reports (e.g. Top 100 Ping Times) and report templates.
    Note: The Freeware version of PRTG Network Monitor is limited to 10 sensors.
    PRTGNetworkMonitor
    When you launch PRTG Network Monitor, head straight to the configuration wizard to get started. This wizard will run you through the main configuration settings required to get the application up and running, including the adding of servers to monitors and which sensors to use.


    11. The Dude

    The Dude is a network monitoring tool that monitors devices and alerts you when there is a problem. It can also automatically scan all devices on a given subnet and then draw and layout a map of your network.
    TheDude
    When you launch The Dude, you first choose to connect to a local or remote network and specify credentials accordingly. Click ‘Settings’ to configure options for SNMP, Polling, Syslog and Reports.

    12 Splunk

    Splunk is a data collection and analysis platform that allows you to monitor, gather and analyze data from different sources on your network (e.g. event logs, devices, services, TCP/UDP traffic, etc). You can set up alerts to notify you when something is wrong or use Splunk’s extensive search, reporting and dashboard features to make the most of the collected data. Splunk also allows you to install ‘Apps’ to extend system functionality.
    Note: When you first download and install Splunk, it automatically installs the Enterprise version for you to trial for 60 days before switching to the Free version. To switch to the Free version straight away, go to Manager > Licensing.
    Splunk
    When you login to the Splunk web UI for the first time, add a data source and configure your indexes to get started. Once you do this you can then create reports, build dashboards, and search and analyze data.

    13. Angry IP Scanner

    Angry IP Scanner is standalone application that facilitates IP address and port scanning. It is used to scan a range of IP addresses to find hosts that are alive and obtain information about them (including MAC address, open ports, hostname, ping time, NetBios information, etc).
    AngryIpScanner
    When you execute the application, go to Tools > Preferences to configure Scanning and Port options, then go to Tools > Fetchers to choose what information to gather from each scanned IP address.


    14 ntopng

    ntopng (‘ng’ meaning ‘next generation’) is the latest version of the popular network traffic analyzer called ntop. ntopng will sit in the background and gather network traffic, then display network usage information and statistics within a Web UI.
    Note: Although originally aimed for use on Unix-based systems, there is a Windows version available for a small fee, or a demo version limited to 2000 packets. If you are comfortable running ntopng on a Unix-based box then you can get the full version for free.
    ntopng
    The image above shows the ntopng dashboard after a few minutes of network traffic collection. In this example, I am using the Windows version. After installation, I simply executed the redis-server.exe file from ..\Program Files (x86)\Redis and fired up the Web UI (http://127.0.0.1:3000).


    15. Total Network Monitor

    Total Network Monitor continuously monitors hosts and services on the local network, notifying you of any issues that require attention via a detailed report of the problem. The result of each probe is classified using green, red, or black colors to quickly show whether the probe was successful, had a negative result or wasn’t able to complete.
    TotalNetworkMonitor
    When you launch Total Network Monitor, go to Tools > Scan Wizard to have the wizard scan a specified network range automatically and assign the discovered hosts to a group. Alternatively, create a new group manually to start adding devices/hosts individually.

    16. NetXMS

    NetXMS is a multi-platform network management and monitoring system that offers event management, performance monitoring, alerting, reporting and graphing for the entire IT infrastructure model. NetXMS’s main features include support for multiple operating systems and database engines, distributed network monitoring, auto-discovery, and business impact analysis tools, amongst others. NetXMS gives you the option to run a web-based interface or a management console.
    NetXMS
    Once you login to NetXMS you need to first go to the “Server Configuration” window to change a few settings that are dependent on your network requirements (e.g. changing the number of data collection handlers or enabling network discovery). You can then run the Network Discovery option for NetXMS to automatically discover devices on your network, or add new nodes by right clicking on “Infrastructure Services” and selecting Tools > Create Node.

    17. Xymon

    Xymon is a web-based system – designed to run on Unix-based systems – that allows you to dive deep into the configuration, performance and real-time statistics of your networking environment. It offers monitoring capabilities with historical data, reporting and performance graphs.
    Xymon
    Once you’ve installed Xymon, the first place you need to go is the hosts.cfg file to add the hosts that you are going to monitor. Here, you add information such as the host IP address, the network services to be monitored, what URLs to check, and so on.
    When you launch the Xymon Web UI, the main page lists the systems and services being monitored by Xymon. Clicking on each system or service allows you to bring up status information about a particular host and then drill down to view specific information such as CPU utilization, memory consumption, RAID status, etc.

    18. WirelessNetView

    WirelessNetView is a lightweight utility (available as a standalone executable or installation package) that monitors the activity of reachable wireless networks and displays information related to them, such as SSID, Signal Quality, MAC Address, Channel Number, Cipher Algorithm, etc.
    WirelessNetView
    As soon as you execute WirelessNetView, it automatically populates a list of all reachable Wi-Fi networks in the area and displays information relevant to them (all columns are enabled by default).
    Note: Wireless Network Watcher is a small utility that goes hand in hand with WirelessNetView. It scans your wireless network and displays a list of all computers and devices that are currently connected, showing information such as IP adddress, MAC address, computer name and NIC card manufacturer – all of which can be exported to a html/xml/csv/txt file.
    WirelessNetworkWatcher

    19. Xirrus Wi-Fi Inspector

    Xirrus Wi-Fi Inspector can be used to search for Wi-Fi networks, manage and troubleshoot connections, verify Wi-Fi coverage, locate Wi-Fi devices and detect rogue Access Points. Xirrus Wi-Fi Inspector comes with built-in connection, quality and speed tests.
    XirrusWiFiInspector
    Once you launch Wi-Fi Inspector and choose an adapter, a list of available Wi-Fi connections is displayed in the “Networks” pane. Details related to your current Wi-Fi connection are displayed in the top right hand corner. Everything pretty much happens from the top ribbon bar – you can run a test, change the layout, edit settings, refresh connections, etc.

    20. WireShark

    This list wouldn’t be complete without the ever popular WireShark. WireShark is an interactive network protocol analyzer and capture utility. It provides for in-depth inspection of hundreds of protocols and runs on multiple platforms.
    WireShark
    When you launch Wireshark, choose which interface you want to bind to and click the green shark fin icon to get going. Packets will immediately start to be captured. Once you’ve collected what you need, you can export the data to a file for analysis in another application or use the in-built filter to drill down and analyze the captured packets at a deeper level from within Wireshark itself.

  • Macs don't get viruses.

    The more megapixels your camera has, the better it is.

    Shelling out more money for expensive cables is worth it.
    These (and more!) are some of the most common myths revolving around the technology we use every day. From battery draining to deleting files off your computer, we've explained and debunked some of these popular beliefs.

    1. You should let your phone's battery drain before recharging.

    Apple
    A common myth surrounding phone and laptop batteries is that it's always best for the life of the battery to let it drain fully before charging it again. 

    This is true in some cases. When a device uses a Nickel-Cadmium battery, for example, you'd want to let your phone fully drain before charging it again. Why? Nickel-Cadmium batteries, unlike Lithium-Ion batteries, suffer from what's known as "memory effect." When they are charged and discharged hundreds of times, they start to lose the ability to charge up to 100%, draining your battery life significantly over time.

    There was a time when most electronics ran on Nickel-Cadmium batteries. Cordless telephones and answering machines all ran on Nickel-Cadmium. In 2006, most NiCd batteries were replaced with technology that used Lithium-ion batteries. These can be found in all Apple devices and do not suffer from "memory effect" the way NiCd batteries do.

    "Lithium-ion polymer batteries have a high power density," Apple says on its website, "and you can recharge a lithium-ion polymer battery whenever convenient, without requiring a full charge or discharge cycle."

    Apple does advise, however, that you should let the device go through at least one charge cycle each month to help keep the electrons moving (as opposed to a NiCd battery which needs to go through a full charge cycle every few days). Letting the device drain from 100% to fully shutting off at 0% helps to maintain the life of the battery.

    2. Jailbreaking is illegal.

    luccawithcheese/Flickr
    It's important to note that "jailbreaking" and "unlocking" a device mean different things. Unlocking a device means you've freed your device to work on any carrier, not just the one you bought it from, while jailbreaking refers to bypassing Apple's security to install modifications that are not allowed in the App store.

    The U.S. Library of Congress deemed it illegal to unlock any phone purchased after January 26, 2013 using a third-party vendor, but jailbreaking your iPhone is still legal until at least 2015 under an exemption in the Digital Millennium Copyright Act (DMCA). Note thatjailbreaking your iPad is illegal. Some catch, right?

    3. More bars means more service.

    DeadZones.com
    Bars on your smartphone actually indicate your signal strength to the cell phone tower closest to you. Your service depends on how many devices those towers are serving at a given time.

    Metropolitan areas are equipped to handle the dense population of people trying to use their phones in one confined space. In unexpected situations (say, a music festival where there are a lot of people in a small area), your phone can be showing lots of bars, but service will be impossible to find; everyone's trying to tap into that one cell tower.


    4. The higher the megapixels, the better the camera.

    Gord McKenna/Flickr
    Every year, the number of megapixels on the latest digital cameras seems to increase, with ad campaigns sending the frantic message that you need to be upgrading for the bigger and better version of your perfectly functional camera.

    More megapixels mean clearer photos to a certain extent, but there is often a misconception of just how many megapixels are needed to produce a quality photo you can enjoy on your phone or computer screen. For those, just three megapixels will do the trick, and even allow room for cropping. With seven megapixels, you can blow a photo up to the size of a poster with no issue.

    For the amateur photographer using a point-and-shoot device to capture casual moments, more megapixels does not translate into a better camera, or better photos.


    5. Emptying the trash or recycle bin means your files are permanently deleted.

    Surat Lozowick/Flickr
    Drag a file to the trash, then empty the trash can and your files are permanently deleted, right?

    Not so fast. Deleting something, and then deleting it again from trash, just frees up the space it had taken up on the hard drive, leaving fragments behind that could theoretically be revived. 

    On a Mac, choose "Secure Empty Trash" as a final step in the deletion process. On a PC, download a program like SDelete, which helps to securely wipe all free space. 



    6. Private browsing keeps you anonymous.



    Setting your browser to incognito tells your browser not to save any information about where you've visited or what you've typed while you were there, but it does not keep you anonymous. Your visits can still be recorded, and files you download while incognito will still live in your computer, phone, or tablet. 




    7. Improperly removing a USB drive will delete all your data.


    sandiskBetter to be safe than sorry.

    If you're working with a USB Drive and have removed it after all of the files have transferred, you should be fine. You might also be okay if you accidentally remove the USB while it's in the middle of transferring, but you run the risk of losing your data or experience software clashes.

    It's best to go through the short steps to remove the USB safely, taking all of the precautions to protect your work and workstation. 



    8. Macs don't get viruses.


    IntelFreePress/Flickr
    Macs can be infected by viruses. Up until a few years ago, Windows was the most common operating system. Now that Macs are becoming more and more prevalent in homes and offices alike, they're becoming a more vulnerable target.

    "The OS X operating system isn’t susceptible to the thousands of viruses plaguing Windows-based computers," Apple says on its website. 

    But Macs are still susceptible to viruses created to target Apple products and operating systems.



    9. Expensive cables are better than cheap ones.



    Last year, MythBusters Jamie and Adam determined there was no difference between a cheap cable and an expensive cable. 

    As should be abundantly clear, expensive HDMI cables are simply not worth purchasing for normal use. In the case that you are running cable in a permanent fashion through walls or ceilings, it may be prudent to spend a little extra for heavier-duty cables for the sake of longevity, but if you’re spending extra on gold-plated connectors and the like, you are doing little more than embedding hard-earned cash in the walls of your home.