I Left My NoSQL Heart at the MarkLogic Conference
February 18, 2016
MarkLogic is a headlining company in the field of NoSQL enterprise databases, allowing companies to process, search, scale through massive data stores as well as build Web applications to handle the onslaught. As a respected enterprise leader, MarkLogic occasionally holds a conference to teach IT professionals as well as potential customers about its software benefits. This year MarkLogic will host the MarkLogic World 2016 US in San Francisco, California from May 9-12 at the Park Central Hotel.
The conference is described as:
“We kick the week off on Monday with three different hands-on workshops to choose from and end our week Thursday afternoon with our traditional closing keynote with our Founder and Chief Architect, Christopher Lindblad. New this year, we are including a special Partner Track, exclusive to MarkLogic partners and those interested in becoming one. If you are developing with MarkLogic, transitioning from RDBMS to MarkLogic, building apps on MarkLogic, or if you are just starting out on MarkLogic, this is the event for you. Sessions span from MarkLogic basics to technical deep dives covering data modeling, semantics, much & more.”
A Partner Track? That is a new feature at the MarkLogic convention, but what is its purpose? Will it be a daylong event where MarkLogic partners advertise their services or wares otherwise known as a commercial seminar without a free lunch? Will it be an informative explanation about how MarkLogic partners are shaping the NoSQL enterprise industry and combining their talents to advance the field? Maybe it is just a mix and mingle for networking?
The only way to know is to sign up for the conference and if you use the promo code “MLEMJAN” you can get in for free. It is also an excuse to visit San Francisco and ride the cable cars.
Whitney Grace, February 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Anonymous Hacks Turkish Cops
February 17, 2016
No Dark Web needed.
Anonymous has struck again, this time hacking the Turkish General Directorate of Security (EGM) in its crusade against corruption. The International Business Times reports, “Anonymous: Hacker Unleashes 17.8 GB Trove of Data from a Turkish National Police Server.” It is believed that the hacker responsible is ROR[RG], who was also deemed responsible for last year’s Adult Friend Finder breach. The MySQL-friendly files are now available for download at TheCthulhu website, which seems to be making a habit of posting hacked police data.
Why has Anonymous targeted Turkey? Reporter Jason Murdock writes:
“Anonymous has an established history with carrying out cyberattacks against Turkey. In 2015 the group, which is made up of a loose collection of hackers and hacktivists from across the globe, officially ‘declared war’ on the country. In a video statement, the collective accused Turkish President Recep Tayyip Erdo?an’s government of supporting the Islamic State (Isis), also known as Daesh. Turkey is supporting Daesh by buying oil from them, and hospitalising their fighters,’ said a masked spokesperson at the time. ‘We won’t accept that Erdogan, the leader of Turkey, will help Isis any longer. If you don’t stop supporting Isis, we will continue attacking your internet […] stop this insanity now Turkey. Your fate is in your own hands.’”
We wonder how Turkey will respond to this breach, and what nuggets of troublesome information will be revealed. We are also curious to see what Anonymous does next; stay tuned.
Cynthia Murrell, February 16, 2016
A Guide to Google-Ize Your Business
February 16, 2016
To Google is a verb, meaning to search specifically for information on the Google search engine. If a user is unable to find information on Google, they either change their key words or look for a different option. In other words, if you are not pulling up on Google than you might as well not exist. Perhaps it is a little drastic to make the claim, but without a Web presence users, who double as consumers, are less likely to visit your business. Consumers take an active approach to shopping these days by doing research before they visit or purchase any goods or services. A good Web presence alerts them to a company’s capabilities and how it can meet the consumers’ needs.
If you are unsure of how to establish a Web presence, much less a Google Web presence then there is a free eBook to help you get started. The Reach Local blog posted information about “Master Google My Business With Our New Ebook.” Google My Business is a free tool from Google about how to publish your business information in Google+, Google Maps, and local search results.
“Without accurate and up to date information on Google, you could be missing out on leads and potential customers either by having the wrong phone number and address listed or by not appearing at all in local search results for products and services relevant to your business. We want to help you take control of your information on the web, so we put together a helpful eBook that explains what Google My Business is, how to set up and verify your business, and tips for managing your information and tracking your progress.”
The free eBook “Your Guide To Google My Business” written by the Reach Local folks is an instruction manual on how to take advantage of the Google tool without going through the headache of trying to understand how it works. Now if only Windows 10 would follow a similar business pattern to help users understand how it works.
Whitney Grace, February 16, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
d
The UK Government Invests in Secure Startups
February 15, 2016
The UK has been criticized as being one of the most invasive countries when it comes to monitoring individuals and having security cameras everywhere, even on garbage cans. While the question, “how much is too much?” runs around people’s heads, there is also a concern about the lax of security developments. The UK is much like its former colony the United States in that is interested in beefing up security technology InfoSecurity says in the article, “Government Start-up Support Creates A ‘Very Exciting Time.’”
Government support for UK security tech start-ups is one of the main driving forces in the industry. It demonstrates that the UK government is invested in advancing new ideas and help new companies get the leg up they need to develop the best possibly product before it is delivered to a bigger market. It also proves that the government is taking cybersecurity as a very serious risk that needs bolstering to counteract actions taken by terrorists and rogue nations.
“This week, the UK government announced a £250,000 Early Stage Accelerator Programme to help start-ups in the space get advice, support and funding to develop their products and services and bring them to market. It will be run by Cyber London—described as “Europe’s first cybersecurity accelerator and incubator space”—and the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast.”
While venture corporations are usually the first place start-ups turn to for investments, the government plays a crucial role in regulating the technology and helping companies grow beyond their initial roots. It also allows the new security start-ups to make important connections with the right government officials to build strategic relationships.
It is wonderful that western governments are taking cyber threats more seriously and take preemptive action against dangerous threats. It would be even better if smaller law enforcement agencies at the city and state level in the US were more capable of handling cyber attacks.
Whitney Grace, February 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Dark Web Crime Has Its Limits
February 12, 2016
The Dark Web is an intriguing and mysterious phenomenon, but rumors about what can be found there are exaggerated. Infomania examines what is and what is not readily available in that murky realm in, “Murder-for-Hire on the Dark Web? It Can’t Be True!”
Anonymity is the key factor in whether certain types of criminals hang out their shingles on the TOR network. Crimes that can be more easily committed without risking identification include drug trafficking, fraud, and information leaks. On the other hand, contract assassins, torture-as-entertainment, and human trafficking are not actually to be found, despite reports to the contrary. See the article for details on each of these, and more. The article cites independent researcher Chris Monteiro as it summarizes:
The dark web is rife with cyber crime. But it’s more rampant with sensationalized myths about assassination and torture schemes — which, as Chris can attest, simply aren’t true. “What’s interesting is so much of the coverage of these scam sites is taken at face value. Like, ‘There is a website. Therefore its contents must be true.’ Even when mainstream media picks it up, very few pick it up skeptically,” he says.
Take the Assassination Market, for example. When news outlets got wind of its alleged existence in 2013, they ran with the idea of “Murder-for-hire!!” on the Internet underground. Although Chris has finally demonstrated that these sites are not real, their legend lives on in Internet folklore. “Talking about the facts — this is how cybercrime works, this is how Tor and Bitcoin work — is a lot less sexy than saying, ‘If you click on the wrong link, you’ll be kidnapped, and you’ll end up in a room where you’ll be livestreamed, murdered, and you’re all over the internet!’” Chris says. “All I can do is point out what’s proven and what isn’t.”
So, next time someone spins a scary tale about killers-for-hire who are easily found online, you can point them to this article. Yes, drug trafficking, stolen data, and other infractions are big problems associated with the Dark Web, but let us not jump at shadows.
Cynthia Murrell, February 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Reviews on Dark Web Email Providers Shared by Freedom Hacker
February 10, 2016
The Dark Web has many layers of sites and services, as the metaphor provided in the .onion extension suggests. List of secure Dark Web email providers in 2016 was recently published on Freedom Hacker to detail and review the Dark Web email providers currently available. These services, typically offering both free and pro account versions, facilitate emailing without any type of third-party services. That even means you can forget any hidden Google scripts, fonts or trackers. According to this piece,
“All of these email providers are only accessible via the Tor Browser, an anonymity tool designed to conceal the end users identity and heavily encrypt their communication, making those who use the network anonymous. Tor is used by an array of people including journalists, activists, political-dissidents, government-targets, whistleblowers, the government and just about anyone since it’s an open-source free tool. Tor provides a sense of security in high-risk situations and is often a choice among high-profile targets. However, many use it day-to-day as it provides identity concealment seamlessly.”
We are intrigued by the proliferation of these services and their users. While usage numbers in this article are not reported, the write-up of the author’s top five email applications indicate enough available services to necessitate reviews. Equally interesting will be the response by companies on the clearweb, or the .com and other regular sites. Not to mention how the government and intelligence agencies will interact with this burgeoning ecosystem.
Megan Feil, February 10, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google: A Cyber Caliphate Target?
February 4, 2016
I don’t think of Google as a particularly good target for hackers. However, if the information in “ISIS Affiliate Cyber Caliphate Announces Plans to Hack Google” is accurate, my favorite search service is on notice.
According to the write up:
IS affiliate ‘Cyber Caliphate’ forms a Google Hacking Team to Hack Google Remember Cyber Caliphate? Yes, the hacking group affiliated to IS or ISIS/Daesh is planning to hack Google. According to International terrorism watchdog group Terror Monitor, the Islamic State “cyber army” has announced plans to hack Google.
I am not sure what “hack Google” means, but the message seems less than positive.
The Googlers have a reasonably good security system. Worth watching the developments if there are any beyond what seems to be a news release type message.
Stephen E Arnold, February 4, 2016
Bing Clocks Search Speed
February 4, 2016
Despite attempts to improve Bing, it still remains the laughing stock of search engines. Google has run it over with its self-driving cars multiple times. DuckDuckGo tagged it as the “goose,” outran it, and forced Bing to sit in the proverbial pot. Facebook even has unfriended Bing. Microsoft has not given up on its search engine, so while there has been a list of novelty improvements (that Google already did or copied not long after their release) it has a ways to go.
Windows Central tells about the most recent Bing development: a bandwidth speed test in “Bing May Be Building A Speed Test Widget Within Search Results.” Now that might be a game changer for a day, until Google releases its own version. Usually to test bandwidth, you have to search for a Web site that provides the service. Bing might do it on command within every search results page. Not a bad idea, especially if you want to see how quickly your Internet runs, how fast it takes to process your query, or if you are troubleshooting your Internet connection.
The bandwidth test widget is not available just yet:
“A reader of the site Kabir tweeted a few images displaying widget like speed test app within Bing both on the web and their phone (in this case an iPhone). We were unable to reproduce the results on our devices when typing ‘speed test’ into Bing. However, like many new features, this could be either rolling out or simply A/B testing by Microsoft.”
Keep your fingers crossed that Microsoft releases a useful and practical widget. If not just go to Google and search for “bandwidth test.”
Whitney Grace, February 4, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Enterprise and Online Anonymity Networks
February 3, 2016
An article entitled Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes from Computer World UK discusses the inevitable enterprise concerns related to anonymity networks. Tor, The Onion Router, has gained steam with mainstream internet users in the last five years. According to the article,
“It’s not hard to understand that Tor has plenty of perfectly legitimate uses (it is not our intention to stigmatise its use) but it also has plenty of troubling ones such as connecting to criminal sites on the ‘darknet’, as a channel for malware and as a way of bypassing network security. The anxiety for organisations is that it is impossible to tell which is which. Tor is not the only anonymity network designed with ultra-security in mind, The Invisible Internet Project (I2P) being another example. On top of this, VPNs and proxies also create similar risks although these are much easier to spot and block.”
The conclusion this article draws is that technology can only take the enterprise so far in mitigating risk. Reliance on penalties for running unauthorized applications is their suggestion, but this seems to be a short-sighted solution if popularity of anonymity networks rise.
Megan Feil, February 3, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Encrypted Enterprise Search
February 3, 2016
Another enterprise software distributor has taken the leap into a proprietary encrypted search engine. Computer Technology Review informs us that “VirtualWorks Releases Its Encrypted Enterprise Search Platform ViaWorks Built On Hitachi Technology.” VirtualWorks’s enterprise search platform is called ViaWorks and the company’s decision to release an encrypted search engine comes after there has been a rise in data security breaches as well as concern about how to prevent such attacks. We will not even mention how organizations want to move to the cloud, but are fearful of hacking. More organizations from shopping in person on the Internet, banking, healthcare, government, and even visiting a library use self-service portals that rely on personal information to complete tasks. All of these portals can be hacked, so trade organizations and the government are instituting new security measures.
Everyone knows, however, that basic rules and a firewall are not enough to protect sensitive information. That is why companies like VirtualWorks stay one step ahead of the game with a product like ViaWork built on Hitachi’s Searchable Encryption technology. ViaWorks is a highly encrypted platform that does not sacrifice speed and accuracy for security
“ViaWorks encrypted enterprise search features are based on AES, a worldwide encryption standard established by NIST; special randomization process, making the encrypted data resistant to advanced statistical attacks; with key management and encryption APIs that store encryption keys securely and encrypt the original data. ViaWorks provides key management and encryption APIs that store encryption keys securely and encrypt the original data, respectively. Users determine which field is encrypted, such as index files, search keyword or transaction logs.”
VirtualWorks already deployed ViaWorks in beta tests within healthcare, government, insurance, and finance. Moving information to the cloud saves money, but it presents a security risk and slow search. A commercial encrypted search engine paired with cloud computing limits the cyber risk.
Whitney Grace, February 3, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph