Cisco

Cisco Combines Linux, IOS For Internet of Things

Networking equipment giant Cisco Systems said that it is combining elements of the open source Linux operating system to its IOS firmware, launching a new architecture it calls “IOx” that will connect the billions of intelligent devices that will make up the Internet of Things. The new architecture was announced at Distributech in San Antonio – a trade show for the utility industry, on Wednesday. The company said IOx will make it easier for its customers to connect Internet of Things devices to back-end resources and the larger Internet.  As it stands, the Internet of Things ecosystem is fragmented. Intelligent devices like the Nest Thermostat typically communicate back to proprietary cloud resources and might communicate with their surroundings using any one of a number of wireless protocols, including Bluetooth, Bluetooth Low Energy, Zigbee, Z-Wave, and so on.  That balkanization has made it hard to create IoT solutions that span different families […]

Parsing Google’s Internet of Things Acquisitions

Google has gone on an acquisition tear in the last six weeks that has many tech industry watchers wondering about the company’s future direction – particularly when it comes to the Internet of Things.   Since the beginning of the fourth quarter, 2013, Google has acquired 14 companies with the latest, a $650 million buy of UK-based artificial intelligence software firm DeepMind Technologies hitting the wires yesterday. In addition to the DeepMind buy, Google spent $40 million on Flutter, a maker of gesture recognition technology and $23 million on FlexyCore, maker of the DroidBooster App for Android. Earlier this month, it plunked $3.2 billion down for super hot smart home gear maker Nest. Google’s size makes the exact amount spent on the other acquisitions is something of a matter of speculation. Google only has to disclose transactions that are deemed ‘material’ to the company’s finances – a number somewhere between $10m […]

Cisco Eyes Security Services For Connected Cars

Connected vehicles are a big new area of investment. We saw evidence of that at the recent Consumer Electronics Show (CES) and we’re  hearing a lot more about it this week, as carmakers strut their stuff at the North American International Auto Show.   Security isn’t generally part of the conversation, but as we’ve noted here on more than one occasion: connected vehicles introduce a myriad of challenging security problems, from authentication to communications and system integrity, not to mention data privacy. [Read more Security Ledger coverage of connected vehicles here.] Now networking giant Cisco says that it sees a role for its technology in protecting vehicle area networks (VANs), just as the company’s networking equipment enabled and protected local and wide area networks (LANs and WANs) over the last two decades. In a blog post, Cisco said it is rolling out “a range of products and services” that it […]

Cisco Survey: 100% of Fortune 500 Hosting Malware?

If you’re working in IT at a Fortune 500 firm, Cisco Systems has some unwelcome news: you have a malware problem. According to the 2013 Annual Security Report from the networking giant, 100 percent of 30 Fortune 500 firms it surveyed sent traffic to Web sites that host malware. Ninety-six percent of those networks communicated with hijacked servers operated by cyber criminals or other malicious actors and 92 percent transmitted traffic to Web pages without content, which typically host malicious activity. “It was surprising that it was 100 percent, but we know that it’s not if you’re going to be compromised, but when,” said Levi Gundert, a technical lead in Cisco’s Threat Research, Analysis and Communications (TRAC) group in an interview with The Security Ledger. Among the high points (or low points) in Cisco’s Report: Cisco observed the highest number of vulnerabilities and threats on its Intellishield alert service in the 13 years […]

NSA Toolbox Included Hacks For Juniper, Cisco, Dell

The German magazine Der Spiegel made headlines this week with its story detailing the US National Security Agency’s (NSAs) offensive hacking capabilities. The story is based on classified NSA documents absconded with by former contractor Edward Snowden and lays bare a Webster’s Dictionary full of classified hacking tools and programs.   Among the highlights of the story: + The NSA developed and deployed a wide range of hacking tools that could compromise hardware from leading IT and networking equipment makers including Cisco Systems, Juniper Networks and the Chinese vendor Huawei and Dell Inc.   + The NSA tools were designed to provide persistent access that allowed the NSA to monitor activity on the compromised endpoint, avoid detection by third party security software and survive software and firmware updates. One such tool, DEITYBOUNCE, provided persistent access to Dell’s PowerEdge servers by “exploiting the system BIOS” and using “System Management Mode to […]