A new vulnerability called "Venom" is posing a HUGE threat to unpatched hosting systems. The vulnerability allows attackers to take full control of the compromised environment and make away with critical data. Find out more about Venom on this week's edition of IT Rewind!
IT Rewind Featured Stories:
Did our short segment leave you wanting more? Check out the original articles of stories we covered!
Continuum's Must-Read Blog Post This Week
How would you describe a sales person? Manipulative, annoying and pushy are some of the adjectives that come to mind unfortunately! People often picture the car salesman in a suit talking a mile a minute. In his book, To Sell is Human,bestselling author, Daniel Pink, shatters this misconception, arguing that nearly every person in the world is now in sales.
Whether you’re selling an idea to your team, listing your skills at an interview or building trust on a service call, you are constantly sharing ideas and information with the intent of changing or molding the minds of those you interact and do business with. That doesn’t make you a duplicitous person. It makes you an influencer. Still, whether it’s you or your customers contributing to its proliferation, the stereotype lingers. Here are the top 3 sales stigmas preventing you from taking your managed IT services business to the next level... Read More»
What Else Is New in the IT Channel?
Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!
Fake passwords make great passwords:
The Best Way to Protect Passwords May Be Creating Fake Ones
InfoWorld, @, Jeremy Kirk, @
Angler pushing ransomware:
Angler Exploit Kit Pushing New, Unnamed Ransomware
Threatpost, @, Brian Donohue, @
Microsoft cracks down:
Insecure Consumer Routers Compromised to Form 'Self-Sustaining' Botnet
eWeek, @, Robert Lemos
HEY THERE AND WELCOME TO CONTINUUM’S NETWORK OPERATIONS CENTER HERE IN MUMBAI INDIA FOR THIS VERY SPECIAL EDITION OF IT REWIND!
THIS WEEK I DECIDED TO TAKE A TRIP TO OUR NOC IN ORDER TO MEET SOME OF THE TALENTED TECHNICIANS THAT KEEP YOU AND YOUR CLIENTS HUMMING AND HAPPY. IT’S BEEN AN AMAZING TRIP AND IVE MET A LOT OF EXTRAORDINARY PEOPLE. BUT, THERE IS STILL NEWS TO BE COVERED, SO LETS GET TO IT!
MICROSOFT HAS RELEASED ITS LATEST BATCH OF SECURITY PATCHES, THIS ONE CONTAINING FIXES TO 46 FLAWS. THE FLAWS EXISTED IN WINDOWS, INTERNET EXPLORER AND OFFICE AMONG OTHER MICROSOFT PRODUCTS. THE MOST NOTABLE FIXES CAME IN THE FORM OF THREE BULLETINS THAT WERE DEEMED CRITICAL. THESE BULLETINS, MS15-043 THROUGH 045 ADDRESSED REMOTE CODE EXECUTION ISSUES IN WINDOWS, INTERNET EXPLORER, MICROSOFT.NET FRAMEWORK, MICROSOFT LYNC AND SILVERLIGHT. IT’S WORTH NOTING THAT MICROSOFT PLANS TO BEGIN RELEASING UPDATES ONCE THEY ARE READY INSTEAD OF ON A FIXED SCHEDULE. HOWEVER, COMPANIES WILL HAVE THE OPTION TO DELAY UPDATES BY USING A SERVICE CALLED WINDOWS UPDATE FOR BUSINESS.
A NEW VULNERABILITY CALLED “VENOM” HAS BEEN FOUND IN VIRTUALIZATION PROGRAMS AND COULD ALLOW ATTACKERS TO GAIN CODE EXECUTION ON THE HOST AS WELL AS OTHER VM’S OPERATING ON A GIVEN MACHINE. ONCE ATTACKERS BUY SPACE ON A CLOUD HOSTING PROVIDER, THEY CAN USE THE VULNERABILITY TO MOVE ABOUT THE OTHER VM’S ON THE HOST. IF ACCESS TO THE LOCAL NETWORK IS GAINED, THE ATTACKER CAN MAKE AWAY WITH SENSITIE DATA. ACCORDING TO JASON GEFFNER, A RESEARCHER AT CROWDSTRIKE WHO DISCOVERED THE VULNERABILITY, VENOM LIES IN THE VIRTUAL FLOPPY DISK CONTROLLER COMPONENT OF THE OPEN SOURCE VIRTUALIZATION PACKAGE, QEMU.
THIS WEEK ON THE PARTNER SPOTLIGHT WE FOCUS ON PHIL GEESON. PHIL’S COMPANY, WHICH IS CALLED GEESON, IS BASED IN LONDON AND WAS RECENTLY HIGLIGHTED IN A CASE STUDY. IN IT, GEESON TALKS ABOUT THE IMPORTANCE OF THE NOC AND HOW HE’S BEEN ABLE TO ESCALATE SOME OF HIS MORE COMPLEX ISSUES TO A TEAM OF TECHNICIANS THAT HAS SEEN JUST ABOUT EVERYTHING. TO HEAR MORE OF PHIL’S STORY, SIMPLY CLICK ON THE LINK BELOW.
THAT’S ALL THE TIME WE HAVE FOR THIS SPECIAL MUMBAI, INDIA EDITION OF IT REWIND. I’LL BE BACK IN THE BOSTON STUDIOS NEXT WEEK WITH MORE NEWS FROM THE WORLD OF IT. UNTIL THEN, FIND US ON TWITTER, INSTAGRAM AND VINE AT FOLLOWCONTINUUM. YOU CAN ALSO CONNECT WITH US ON FACEBOOK, LINKEDIN, GOOGLE PLUS AND YOUTUBE. I’LL LEAVE YOU WITH SOME FOOTAGE FROM AN INDIAN DRUMMING CEREMONY THAT TOOK PLACE IN THE NOC EARLIER THIS WEEK. TAKE IT EASY.
By Lily Teplow
By Lily Teplow
By Brian Downey