‘Trust Mark’ Certification for IoT Devices

The program, called the IoT Security Trust Mark, is aimed at helping connected device manufacturers embed safety and security by design as well as proactively protect consumers, says Matt Tett, who is chair of IoTAA’s cybersecurity and network resilience workstream enabler and managing director of Enex TestLab. The effort, slated to launch in September, could eventually expand worldwide.

Know more: Freelancing jobs

“The remit is big,” Tett says. “It could be moms and dads in their homes buying TVs and fridges or smart speakers and devices for their kids, or it could be a government department or agency that’s looking to put in the latest conferencing system. There’s a whole gamut of stakeholders.”

There are plenty of examples of connected device security going wrong. For example, an Australian company that sells the TicTokTrack, a GPS-tracking smartwatch for kids, twice introduced a security flaw that could have allowed an attacker to spoof a child’s location.

Tett says the Trust Mark program, which has a rigorous testing component, could help manufacturers avoid those kinds of problems.

Most Challenging Time For India’s IT Sector

India’s information technology sector has never seen challenging times that it is witnessing now due to the Covid-19 impact, according to industry veteran S Mahalingam, but they have come up with innovative ways to deliver services.

Know more about the technology engineer.

As far as export is concerned, Indian IT companies have come out with innovative ways of ensuring that delivery takes place flawlessly from the country, and have been delivering service at a very high level even in the lockdown situation, he said. “That’s a phenomenal kind of thing which shows that both the communication infrastructure as well as the ability to come up with a remote secure environment.

Nothing comes as a comparable thing to what is happening now,” Mahalingam, former chief financial officer and executive director at Tata Consultancy Services Ltd., said in an interview to PTI. “This is the most serious one; impact is going to be phenomenal because while essentially IT Industry has proved (its capability) … but we have to ensure that global businesses resume.

Industry throws weight behind mobile Linux

Today saw the public unveiling of a new cooperative effort among suppliers to further develop the open source operating system Linux for use on consumer mobile devices, such as smartphones and tablet PCs.

The non-profit joint venture, entitled Linaro, includes IT giant IBM, chip designer ARM Holdings and device manufacturer Samsung. It employs around 100 engineers who are working to optimise device components for use with existing Linux-based mobile operating systems, such as Meego, Google’s Android and WebOS, recently acquired by Hewlett-Packard as part of device maker Palm.

Know more @ Linux system administrator jobs

“The dramatic growth of open source software development can now be seen in Internet-based, always-connected mobile and consumer products,” said Linaro CEO Lantzsc in a press statement. Linaro “will help accelerate this trend further by increasing investment on key open source projects and providing industry alignment with the community to deliver the best Linux-based products for the benefit of the consumer.”

The significance of mobile operating systems in general, and of Linux-based examples in particular, was highlighted by HP CEO Mark Hurd yesterday. Speaking at the All Things Digital conference in New York, Hurd confirmed that HP’s $1.2 billion acquisition of Palm was primarily motivated by the company’s ownership of WebOS.

“We didn’t buy Palm to be in the smartphone business”, he said, according to a ZDNet report. “We bought it for the [intellectual property].”


When is a Network Switch Necessary?

A network switch is necessary when there are too few ethernet ports on the router. This could be for a variety of reasons. For example, if you want to install an entertainment system, you will likely need a network switch. In this case, all of the pieces of the entertainment center are will probably be installed in the same general area so the network switch can be placed in a central location without much wiring.

Another situation where a network switch could be helpful is for devices located across your house which you want to be wired into the internet including desktop computers, televisions, or gaming consoles. Having all of those devices on wifi could cause a slower connection for not only the device itself but other technologies that need wifi such as your phone or smart home systems.

Additionally, you should note that ethernet cables tend to be most efficient when they are less than a hundred feet long so you may need to find a central location if you are wiring your entire house for ethernet.

The Switch Network Installer and Repairman’s primary duty is installing, rearranging, or removing switching. The Switch Network Installer and Repairman Job Description also includes tasks such as monitoring the distribution, routing, dialing, and switching equipment utilized in the facility.

The Switch Network Installer and Repairman also provide any technical support required for ground-level installation of communication wiring or communication equipment.

Web Application Supply Chain Threats

Over the past several weeks, I’ve learned more about the supply chain for household items than I’d ever have cared to know. Who knew that the supply chain for toilet paper was so fragile?!

Those of us who focus on defending web applications are increasingly turning our attention to the supply chain that makes up modern web applications. Following a string of fraudsters pilfering payment details in payment skimming attacks, the Payment Card Industry (PCI) has raised awareness of these risks by issuing a series of warnings and educational webinars on the topic. We have repeatedly seen attackers gain control of first or third-party JavaScript running on websites to pull off these attacks.

Know more about the cyber security consultants.

In a recent study of web traffic, researchers at Akamai discovered that 67% of content on the average website is delivered by a third-party. It isn’t surprising that attackers have turned their attention to the supply chain for web applications, since it now has critical mass.

Trends in development suggest that the share of content sourced from third parties will only grow over time as website owners look for faster, cheaper ways to introduce new functionality.

Attackers can also achieve greater yields if they can compromise a provider of third-party JavaScript as it could potentially give them access to trusted JavaScript running on hundreds, or even thousands of websites.

Not only are these attacks growing in frequency, but attackers are drawing inspiration from techniques previously observed in endpoint malware evasion. The Pipka strain of malware discovered by Visa’s fraud team demonstrated the capability to remove itself from the .html once it has executed. This type of technique is common in malware observed in corporate networks, but is novel for malware embedded in website JavaScript.

Attackers have also been observed employing domain generation algorithms (DGA) for the command and control (C2) component of formjacking attacks, another example of borrowing a technique long observed in desktop malware. The DGA has the impact of making static blacklists of C2 infrastructure less useful. The ongoing evasions are to be expected and will continue to challenge web defenders.

Want to Start a Career in IT?

So, you are considering a career in information technology? How exciting! By now you’ve probably heard that IT careers are booming and expected to continue this growth trend over the course of many years.

Beginning a career in this area allows you to stay on top of technology and pick a path that’s right for you. A career in the many different areas of information technology give you the ability to make your own path.

With so many diverse areas of study and practice, the sky is the limits for how far you will go. With everything from management to security to program development – there are many directions your IT career can take you.

Why a certification?
Entering an IT career is very different from many other occupational paths. While most careers begin inside the walls of a college campus – this field is different. The standard path to securing the job of your dreams is to earn certifications in those areas you plan to work. Employers look for IT pros who possess the certifications that are most suitable for their needs.

Know mroe about the IT analyst salary.

Instead of spending years earning a college degree, IT certifications allow you to choose the track that is right for you and advance to the level you choose. Let’s take a look at five of the top certifications you can earn to be on your way to a new and lucrative career in the IT field.

New Windows 10 Low Key Upgrade Causes High Profile Problems

Problems with KB4540673 are getting worse. In a new report, Windows Latest states that multiple users are now facing audio problems (particularly with older sound cards) and uninstalling the update, rolling back to an older version of Windows and reinstalling drivers does not fix it. In addition to this, KB4540673 is resulting in a user profile bug which causes Windows 10 to load a temporary user profile when booting up.

Read more: Workstation PC

Users have been able to log back into their original profiles and remove the temporary account, but it’s an irritating fault which also has a depressing sense of deja vu. Beyond these, there are also isolated cases of Internet connectivity problems, freezes and app crashes being reported. Back to the drawing board with this one, Microsoft.

Important additional update news today (via BleepingComputer) with Microsoft announcing it has patched a critical Windows 10 vulnerability in Microsoft Server Message Block 3.1.1 (SMBv3). The update – KB4551762 – patches “a network communication protocol issue that provides shared access to files, printers, and serial ports.” It is rolling out to Windows Update now but can also be manually installed via the Microsoft Update Catalog.

“We recommend that you apply this update to your affected devices with priority,” states Microsoft with the company noting that no real world exploits have been developed, though with the problem now out in the open that will be only a matter of time.

The exploit, known as SMBGhost or EternalDarkness, affects 1903 and 1909 versions of Windows 10 and Windows Server. Edit: following the Bleeping Computer report, there is an excellent analysis of the problem from Davey Winder here.

Challenges Faced by Network Operation Engineer

The core of NOC Engineer: Their responsibilities are wide. The expertise needed for a NOC or Network Operations Center includes network administration, Network Support, management, switching, and routing.

Challenges Faced by Network Operation Engineer:

It is due to the difficulties involved with existing system networks and services, particularly in light of the acceptance of cloud setup and SaaS-based solutions, there are many challenges that network operations face.

NOC Engineers, also known as Network Operations Center Engineers, monitor and control large computer networks from a central location. These skilled IT professionals are responsible for network troubleshooting and alarm response.

System Architect and Technical Lead Skills

What you get to do :

  1. Brainstorm with the business team and figure the right technology solutions to the problem
  2. Run quick prototyping , build quick wins and extend the same to be production ready
  3. Work with multiple vendors and partners for development
  4. Build a team that can eventually build and support these systems

A System Architects think through a business objective as well as the company size, budget, and resources to identify the type of computing power it requires. They also consider the amount of data storage the company expects, the capacity, system, and speed.

The primary goal of System Architects is to support the best user experience a company wishes to create for their customers.

The Systems Architect primarily plans a unique configuration such as hardware, software, web integration, intranet, firewalls, internet connection, servers, and security. The job responsibilities will also include installation of both software and hardware assembly during the setup along with their maintenance.

Duties of NOC Engineers

  • Operation of network and system monitoring systems for clients
  • Act on alarms and other associated commands or messages displayed on monitors / display
  • Perform system administration tasks and maintain the database of monitored objects
  • Health checks and compilation of reports
  • Develop an awareness of a wide spectrum of IT technologies
  • First line support offered
  • Continuously monitoring of client’s infrastructure, according to SLA
  • Timeously responding to exceptions according to SLA
  • Standard report generated on request
  • Monitoring centre kept neat and tidy at all times

The NOC is part of our Managed Service Department and responsible for monitoring client systems for abnormal operating events and to provide appropriate resolution to issues as they arise. The ability to multi-task, prioritize and analyze best path to resolution, in a fast paced environment is essential.

The core of NOC Engineer: Their responsibilities are wide. The expertise needed for a NOC or Network Operations Center includes network administration, Network Support, management, switching, and routing.