article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

Additionally, be cautious when adding new friends; verify their authenticity through known offline connections. If your internet provider offers IPv6, be sure to implement security precautions tailored for this protocol. Even harmless details, such as pet names or birthplaces, can be used by hackers to reset passwords.

Network 82
article thumbnail

Technology Short Take #51

Scott Lowe

I’m not sure if this falls here or into the “Cloud Computing/Cloud Computing” category, but Shannon McFarland—fellow co-conspirator with the Denver OpenStack Meetup group—has a nice article describing some design and deployment considerations for IPv6 in the OpenStack Kilo release.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 166

Scott Lowe

Nick Buraglio discusses IPv6 Unique Local Addressing (ULA). Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Rob Novak shares his experience in replacing Meraki with TP-Link Omada. This time I’m including two of his articles.

IPv6 74
article thumbnail

Kubernetes on OpenStack: The Technical Details

Scott Lowe

Side note: Kubernetes isn’t yet very IPv6-friendly, so Lees recommends avoiding putting IPv6 addresses on Kubernetes nodes.). The last connection point that Lees discusses is the Keystone password authentication plugin that sets up an authenticator to work against Keystone.

article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

ipv6 is designed to overcome the problems of ipv4 address exhaustion. So it would be very, very hard to scan for all the ipv6 addresses. We just scan the ipv4 space and ipv6 as a very large address space, which makes it very, a lot more difficult to scan. So fortunately, we were able to fingerprint it before the authentication.

article thumbnail

Technology Short Take #65

Scott Lowe

Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). Want to run Docker Swarm with IPv6? Now you have no excuses for not using 2FA with your vSphere environment. Cloud Computing/Cloud Management. VMware’s Cloud-Native Apps group recently released v0.8

Vmware 60
article thumbnail

What matters about Matter, the new smart home standard

The Verge

We are secure by design, we take a zero-trust approach, we use specific industry-standard encryption technology, and every device gets authenticated before it joins the network,” says Michelle Mindala-Freeman, head of marketing at CSA. Every message is secured on the network, and Matter supports secure over-the-air updates.”.

Apple 71