Today’s IP news roundup highlights some of the latest headlines in virtualization, network security and more:
- According to a Lancope study, “more than 65 percent of IT/security professionals do not think, or were unsure whether, they had experienced any security incidents within the last 12-18 months”. The study also revealed that only 38% of respondents believe that recent security incidents had no impact on their organizations. However, Lancope states that even the most common malware attacks will have some financial impact on an organization. For more information, download the “Enterprises in Denial Regarding Network Security” study.
- Virtualization can help you get more life out of your PCs. According to CIO.com, when organizations adopt desktop virtualization, their “PCs can be repurposed to run as thin clients—given a new lease on life, usually with better performance. This allows the IT organization to focus on improving data security, supporting workplace mobility, and driving down the day-to-day costs of desktop management.” The article also cites examples of organizations that have reduced their hardware costs and achieved greater efficiencies through desktop virtualization. For more information on how virtualization can help you get more mileage out of your PCs, see CIO.com.
- BlackHat 2013 presenters say it’s time to switch to elliptical curve cryptography to prevent a “Cyber Pompei”. According to SearchSecurity.com, the experts believe “there’s a real—though perhaps not overwhelming—possibility that much of the Internet’s encryption will soon become completely unraveled. This grand unveiling of secrets, they contended, could arrive within a handful of years. To avoid what they jokingly called a ‘Cyber Pompei,’ they strongly encouraged a switch from algorithms based on the Diffie-Hellman and RSA systems to elliptical curve cryptography.” For more information on how to make the switch to elliptical curve cryptography, see SearchSecurity.com.
- Hackers target video conferencing software developer to spy on confidential meetings. Researchers from Dell SecureWorks revealed that Chinese hackers used the remote-access Trojan Comfoo to infiltrate more than 100 global businesses and governments. According to Computerworld, the researchers believe the hackers targeted a major, unnamed video conferencing software provider’s network, “for information on vulnerabilities in the software, which they could then exploit at other targets to put eyes and ears on confidential industry and government meetings.” The researchers said that this type of spying is “unusual”. For more information on Comfoo, see Computerworld.
- And finally … Motherboard has published some stunning images of what WiFi would look like if you could see it. The images are a great visualization of how everything is interconnected. Be sure to check them out.
What is your take on today’s news? Feel free to share your opinions below.