Linux

206 articles
Automotive networks can benefit from security layers

Automotive networks can benefit from security layers

By Tim Radzykewycz Last year, at the Black Hat conference in Las Vegas, Charlie Miller and Chris Valasek reported their security research on a Jeep Cherokee.  They were able to remotely break into the system and take control of steering, brakes, and other safety critical systems on the vehicle, as well as systems not normally considered safety critical such as…
The Role of System Updates in IoT

The Role of System Updates in IoT

By Tim Radzykewycz In the brave new world that the Internet of things (IoT) is shaping, operational technology (OT) and information technology (IT) are quickly converging. Up until now, IT was seen as defining a restricted range of technologies pertaining to information processing, mainly generating and communicating data. OT was the domain of machinery, mainly physical equipment that was doing…
Linux Containers: Where Enterprise Meets Embedded Operating Environments

Linux Containers: Where Enterprise Meets Embedded Operating Environments

By Bruce Ashfield As more and more internet of things (IoT) services are being pushed to the edge of the network or onto smaller devices, the need of flexible, connected platforms is on the rise. Exciting open source technologies are brought forth to fill in the gap between embedded and enterprise platforms to service IoT needs, and containerization is an…
Develop. Deploy. Defend.

Develop. Deploy. Defend.

By Davide Ricci The factory floor is geting a makeover with intelligent connected devices. The server room is no longer a stuffy place. A majority of enterprises are strategically on the Internet of Things (IoT) path, and the developer ecosystem is rapidly changing as well.  It seems we’re well on the way to reach industry forecast of 200 billion connected…
Can OpenStack Be Viable For Virtual CPE?

Can OpenStack Be Viable For Virtual CPE?

By Charlie Ashton Virtual Customer Premise Equipment (vCPE) is a hot topic right now for companies focused on business opportunities in network virtualization. IHS Infonetics surveyed service providers worldwide and concluded that virtual Business CPE (vBCPE) was the top use case for Network Functions Virtualization (NFV) in 2016.  A report from Analysys Mason concluded that vBCPE can generate new revenue…
Security Vulnerabilities with Fingerprinting: Linux Considerations

Security Vulnerabilities with Fingerprinting: Linux Considerations

By  Tim Radzykewycz Various tools, such as nmap, can be used to help determine what operating system a particular computer is running, based on the network responses it generates to crafted network probes. This is called “fingerprinting.” Fingerprinting is a security concern.  It doesn't make it possible to exploit anything that isn't already exploitable.  However, it significantly trims the search…
Are you DROWNing?

Are you DROWNing?

By Mark Hatle An attack on the SSLv2 protocol, was disclosed this week by security researchers. Visit https://drownattack.com if you want to get straight to the scoop. This is yet another in a long string of attacks on the SSLv2 protocol, including the well publicized Heartbleed issue from a few years ago. This protocol was considered to be so insecure…
What is CVE-2015-7547?

What is CVE-2015-7547?

By Andreea Volosincu Some of the uncovered common vulnerabilities capture the world’s attention to the point of being attributed a nickname (e.g. heartbleed). Others are fixed and get popular just in engineering circles. CVE-2015-7547 is one for engineers to know about. The latest reported common vulnerability has not received a nickname, but this is not to say CVE-2015-7547 isn’t important. Exploring…
More than NFV: Transformations in Networking Bring Challenges and Opportunities

More than NFV: Transformations in Networking Bring Challenges and Opportunities

By Charlie Ashton With all the industry hype around Network Functions Virtualization (NFV), it’s easy to lose track of the fact that telecom infrastructure is not the only segment of the networking market that’s undergoing radical transformation. Business of all kinds are benefitting from the wide-ranging evolutions of the networks they depend on. Billions of consumers, most of  whom are…
Two to Tango: When Hardware Met Software

Two to Tango: When Hardware Met Software

By Andreea Volusincu Try going incognito on Google (as if you’re on a covert mission), and type “Why is embedded software so” and see what you get. It’s an interesting a dilemma. Autocomplete is a wonderful thing. You can certainly question how accurately the suggested word fits your search, but it still says a lot about what popular perceptions and…