Skip to main content


Showing posts from February, 2020

Cisco Working on Patches for New Kr00k WiFi Vulnerability

Cisco today announced that it is working to patch multiple products that are affected by the recently CVE-2019-15126 ) was announced yesterday by security researchers at ESET and can be leveraged by an unauthenticated attacker to decrypt data frames captured from a nearby vulnerable device. disclosed Kr00k vulnerability in WiFi chips from Broadcom and Cypress.  The flaw ( Read the article over at Bleeping Computer over here .

How to Monitor SD-WAN

There are several factors that should be considered when implementing an SD-WAN solution. One of them is network monitoring. In this post, we review some SD-WAN challenges and how network monitoring can help overcome them. Read the blog post over at Netbeez over here .

AT&T Employees Pay Price for SDN

AT&T’s six-year effort to virtualize its core network functions with SDN and other technologies is poised to lead to dramatic job losses this year. The company today said it plans to cut $1.5 billion in labor-related costs in 2020. Read the article over at sdxcentral over here .

Top 3 Challenges for SD-WAN Performance

In a Software-Defined Wide Area Network (SD-WAN), a branch router uses two or more network connections to dynamically route traffic over one another based on its profile. For example, real-time Voice-over-IP (VoIP) traffic is sent through a low latency MPLS circuit, while high bandwidth applications that don’t require low latency are routed over a broadband Internet connection. Another benefit of SD-WAN routers is that traffic is dynamically distributed between links, on a per-packet basis, based on links’ congestion, latency, and loss. Read the blog post over at Netbeez over here .

Watch: A look at Teraco’s epic new Isando data centre

Teraco will complete work on the first phase of a massive new expansion to its data centre campus in Isando, east of Johannesburg, by the middle of the year and is looking to complete a second phase by year-end. Watch the video over at TechCental over here .

Effective Web Content Filtering and Clean Internet using MikroTik RouterOS

This presentation will show users how to create a robust Internet Content Filter as well as human readable reports into their Internet traffic using the MikroTik RouterOS.

Public Key Cryptography

Geeks developed it, and the government tried to control it. But without public key cryptography we would not have the internet as we know it. Listen to the podcast over here .

Heavy Networking 502: Get Off My VLAN! Old Network Engineers On What New Engineers Should Know

‘The intelligence coup of the century'

For decades, the CIA read the encrypted communications of allies and adversaries. Reade the article over at the Washington Post over here .

Inside the West’s failed fight against China’s ‘Cloud Hopper’ hackers

Eight of the world's biggest technology service providers were hacked by Chinese cyber spies in an elaborate and years-long invasion, Reuters found. The invasion exploited weaknesses in those companies, their customers, and the Western system of technological defense. Read the article over at Reuters over here .

What the cell...? Telcos around the world were so severely pwned, they didn't notice the hackers setting up VPN points

Revealed: Long-running espionage campaign targets phone carriers to snoop on VIPs' location, call records Read the article  over at el Reg over here .