More stories

  • in

    Cybersecurity has a desperate skills crisis. Rural America could have the answer

    Written by

    Owen Hughes, Senior Editor

    Owen Hughes
    Senior Editor

    Owen is a senior editor at ZDNet. Based in London, UK, Owen covers software development, IT workforce trends and the evolution of tech and work.

    Full Bio

    Image: Chris Pagan/Discover Manistique
    The Upper Peninsula of Michigan is home to 30% of the county’s landmass, but just 3% of its population. Boasting dense technicolour forests dotted with waterfalls and surrounded by dazzling turquoise lakes, the Upper Peninsula (UP) lures explorers and lovers of the outdoors and is a world away from the noisy, kinetic streets of the Michigan capital of Detroit some 350 miles away.

    When J.R. Cunningham arrived in the tiny rural town of Manistique in UP 13 years ago, it soon became apparent that he was something of a novelty in a town in which most of the workforce is employed in retail, manufacturing and the service industry. “When I got to Manistique, what I quickly realised was there were no IT people there – like, none,” Cunningham tells ZDNet.  “If you think about it, really the profession hadn’t existed. We didn’t even start using the term ‘cybersecurity’ until about 10 years ago. Before then we called it information security.”Cunningham has been working in cybersecurity for 25 years. Now the chief security officer (CSO) of managed security service provider Nuspire, Cunningham has spent much of his career trying to spread awareness of the cybersecurity profession and the opportunities it presents to young people.Downtown Manistique, MI.
    Image: Discover Manistique
    “When I started in the profession you could kind of hold the whole thing in the palm of your hand,” he says.”Today, if you say I want to be a cybersecurity practitioner, it’s really such a multifaceted career that you kind of have to match the part of the profession with what tickles your fancy and where your interests lie.”Cunningham moved to Manistique, MI with his family in 2009. His wife, an occupational therapist, specialises in small communities and children, meaning the town was “a natural fit”As the new curiosity in a town of fewer than 3,000 residents, Cunningham soon found himself being approached by people who were interested in what he did. “I can’t tell you how many people have sat at my dinner table and asked questions about the profession and then went on to, if not be a cybersecurity professional, at least go to school and get into IT,” he says.SEE: There’s a critical shortage of women in cybersecurity, and we need to do something about itOne of those kids was Josh Hentschell. Now senior security solutions engineer for Little Caesars Pizza in the Metro Detroit area, Hentschell discovered his passion for cybersecurity after being invited to shadow Cunningham when he was 16.”Growing up in Manistique in a very small town, there was really only one cybersecurity professional there, and that was J.R.,” Hentschell tells ZDNet. “He would set up client meetings and I would participate in the meetings. I wouldn’t say anything, I was just sitting there as a bystander, but it was really cool to watch him and get a feeling of how those things are done at that age.” Josh Hentschell, senior security solutions engineer at Little Caesars Pizza.
    Image: Josh Hentschell
    ×josh-hentschell-headshot.jpgHentschell’s interest in cybersecurity blossomed from there. By the time he reached college age, Eastern Michigan University had launched an accredited information assurance degree – one of the first schools in the state to launch a dedicated cybersecurity programme – which Hentschell was referred to by one of his professors.”I started my freshman year in just a basic computer programming class,” he explains. “I did that for a year, but I still really wanted to do cybersecurity.”  “And so I basically packed up my bags and I moved downstate and I transferred to Eastern Michigan University, and then I went on and got my bachelor’s degree.” Without the mentoring he received from Cunningham, Hentschell is convinced he would never have discovered a path into cybersecurity. It’s a reflection of both the challenges and opportunities faced by communities that want to attract high-paying jobs but don’t always have access to the networks – or a resident CSO – to help make it happen. “In the State of Michigan alone, there are 7,000 to 8,0000 unfilled cybersecurity jobs,” says Doug Miller, who runs the Upper Peninsula Cybersecurity Institute (UPCI) at MNU. SEE: Remote-working jobs: These are the highest paying tech and management rolesThe university provides certification training to students through academic partnerships via Cisco, CompTIA and the EC-Council, and engages with high school and middle school students to help provide pathways into cybersecurity careers.   In January 2022, the UPCI was designated a Center of Academic Excellence in Cybersecurity (CAE-C) by the US National Security Agency (NSA). “I’m convinced that there are people out in those rural populations that can help us solve that problem, and fill those jobs, if we can provide the opportunities for education and training to them,” he says. Doug Miller runs the UPCI at Northern Michigan University.
    Image: UPCI
    Employers face a severe shortage of qualified IT and tech staff as companies increase their investments in digital innovation and shift on-premises infrastructure to the cloud. Yet organizations have traditionally focused their hiring efforts on the area in which their offices are located – typically major towns and cities – which limits their own recruitment efforts while also severely limiting employment opportunities for anyone who lives outside of metro areas. “Part of the challenge with the rural population is that we are a resource extraction-focused economy up here,” says Miller. “One of the only zinc mines in the United States is right down the road [and] we’re heavily invested in logging.” Miller stresses that there is nothing wrong with these jobs: on the contrary, they’re critical to the economy and are very much needed, “especially given the price of lumber nowadays.” “But there are other opportunities – not everyone wants to be a logger; not everyone wants to work in the mine,” he adds. “There are other jobs that are out there that are available.” Country life, city wageRemote working has encouraged tech companies to look beyond the walls of major cities for talent, meaning it’s also made it possible for people to get jobs in the tech industry without having to relocate. That’s a huge selling point for people who want to be part of the tech world without giving up their rural lifestyle, says Miller: “It’s a lifestyle out here of being outdoors – being able to ski and fish and mountain bike five minutes from your house.” Doug Miller is convinced people can enjoy a rural lifestyle while earning a big city wage, thanks to improved connectivity and remote hiring.
    Image: Discover Manistique
    Two of the biggest challenges for the region have been internet connectivity and the geographical dispersion of the population. Miller points out that rural economies don’t benefit from the same economies of scale as more populated regions. So, if there are only two students who want to take a cybersecurity class, it doesn’t make financial sense to hire a teacher to teach the subject. Remote learning, therefore, enables more students to participate in courses when they might not otherwise be able to, Miller adds. Back in 2017, MNU started an initiative called the Education Access Network, an internet service provided by Northern Michigan University that enables broadband access to educational resources across the Upper Peninsula. To date, the network has served more than 16,000 households spanning some 87 rural communities.In some of UPCI’s most recent cybersecurity courses, none of the students have been physically present, says Miller, and have instead been connecting in from “90, 100 miles away on the other side of the Peninsula.” “That ability to reach out and hold those classes virtually has been key in being able to reach those populations,” he adds. SEE: Cybersecurity training isn’t working. And hacking attacks are only getting worseReaching those populations could also enable tech companies to connect with talent they would have otherwise missed. With more companies looking at upskilling as a means to fill talent gaps, organizations are more accepting of candidates with less traditional tech backgrounds who can demonstrate transferrable core skills. Another major challenge facing cybersecurity is an apparent lack of interest – or at least, awareness – around the nature of the industry, and what a career in the cybersecurity professional can offer. This problem isn’t just limited to tech: research suggests that in the UK, fewer students are opting to take IT subjects at school and appear pessimistic or otherwise unsure of their capability to match the needs of employers in tech careers. A key part of this challenge comes down to messaging: educators and employers simply have to do a better job of demystifying the cybersecurity landscape and enabling students to engage with technology at a younger age. “One of the things we try to reinforce every time we’re with students in classes is that you do not have to be a technical expert,” says Miller who, as part of a UPCI initiative, is working with five school districts in Houghton, Michigan on a year-long planning effort for computer science and cybersecurity initiatives. Encouraging young people to take up cybersecurity careers is critical to solving skills shortages and getting more adults into skilled, well-paying jobs.
    Image: UPCI
    “Cybersecurity is a team sport,” he adds. “You need people that can programme; you need people that can solve problems; you need people that can communicate; you need people that have a lot of other skills besides the very technical ones and zeroes of trying to capture packets, or write some malicious code, or defend against malicious code.” Of course, a lack of teacher training is also an issue, particularly in more rural populations – again, looping back to the issue of economies of scale. Miller says that, while the schools UPCI is working with are committed to figuring out a way to bring cybersecurity courses into their schools, many simply don’t have the staffing resources to do so. “The struggle is that the teachers themselves have not been trained in a lot of these concepts,” he adds. Miller says the eventual goal is to ensure staff who are teaching cybersecurity courses are either certified or trained to more capacity: “We’re putting them through some of our certification courses, [and] we’re working with them on activities they can do with their students to help bridge that gap.”A life’s work In any case, it’s clear that educators and employers need to radically rethink how they engage with young people, and particularly those living in rural areas, if they hope to make any sort of meaningful progress in bridging the skills gap in cybersecurity, and tech more widely. Cunningham is convinced that the appetite is there – but the messaging needs to evolve first. “What I’ve come to learn is that there is so much talent that’s sitting out in rural North America,” he tells ZDNet.J.R. Cunningham, CSO at Nuspire.
    Image: Nuspire
    ×businessattire-jrcunningham-square.jpg”The tech companies have not done justice to either the IT or security fields because they’ve gotten the reputation of, ‘they grind you into the dirt until you quit’. I don’t view it that way, I view it as a vocation. It’s a life’s work. It’s something that you actually wake up in the morning and put the badge on and go do your thing, and when you go to bed at night you feel pretty good that you made a difference in the world.”Hentschell agrees: “I would say that the cybersecurity field is a very challenging field, but also very rewarding. It’s also constantly changing, something that we need to keep up on, so you’re constantly learning new things every day,” he says. “There are so many cybersecurity jobs out there now that are unfulfilled. To me, if you’re really interested in the work, it doesn’t matter where you come from – you can do whatever you want to do, in whatever you set your mind to.”

    More about remote work More

  • in

    CISA adds actively exploited critical F5 BIG-IP bug to its must-patch list

    The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a critical bug in F5’s Big-IP software that is being actively exploited. The network and application delivery firm on May 4 disclosed a critical authentication bypass affecting the iControl REST component in multiple versions of its Big-IP software. The bug, tagged as CVE-2022-1388, had a CVSSv3 severity score of 9.8 out of 10 in part because of its ease of exploitation. 

    ZDNet Recommends

    Within days of F5’s advisory, security researchers saw potential attackers scanning for vulnerable F5 system admin interfaces exposed on the internet.      SEE: Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breachesRon Bowes at security company Rapid 7 expects exploitation attempts to increase because the bug is easy to exploit. Also, exploit code that provides root access to affected devices is publicly available.However, Bowes reckons there are only about 2,500 F5 BIG-IP devices exposed on the internet based on a shodan.io search.Affected organizations should patch the critical F5 Big-IP bug swiftly. Palo Alto Networks says that on Wednesday it observed over 2,500 scanning and active exploitation attempts within just 10 hours. “We observed this signature triggered 2,552 times between 4:47 and 14:00 UTC on May 10. We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts,” the security firm’s Unit 42 group said.  CISA notes that F5 BIG-IP contains a missing authentication in critical function vulnerability that can allow for remote code execution, creation or deletion of files, or disabling services.The F5 bug is the only new addition this month to CISA’s Known Exploited Vulnerabilities Catalog. Federal civilian agencies are expected to apply the F5 patch by 31 May under CISA’s binding operational directive. However, it recommends organizations beyond the scope of the directive apply the patch too. In March, CISA ordered agencies to fix 95 and 66 bugs, many of them older bugs in what appeared to be a massive clean up effort. It added seven bugs in April and five more last week. More

  • in

    Hackers are using tech services companies as a 'launchpad' for attacks on customers

    A warning from international cybersecurity agencies has urged IT service providers and their customers to take action to protect themselves from the threat of supply chain attacks.  The cybersecurity agencies warn that Russia’s invasion of Ukraine has increased the risk of cyberattacks against organisations around the world. But they also suggest a number of actions that IT and cloud service providers, along with their customers, can take to protect networks from supply chain attacks, where attackers gain access to a company that provides software or services to many other companies.”As this advisory makes clear, malicious cyber actors continue to target managed service providers, which is why it’s critical that MSPs and their customers take recommended actions to protect their networks,” said Jen Easterly, director of US’s Cybersecurity and Infrastructure Security Agency (CISA). 

    “We know that MSPs that are vulnerable to exploitation significantly increases downstream risks to the businesses and organisations they support. Securing MSPs are critical to our collective cyber defense, and CISA and our interagency and international partners are committed to hardening their security and improving the resilience of our global supply chain,” she added. SEE: A winning strategy for cybersecurity (ZDNet special report)The warning comes from the UK’s National Cyber Security Centre (NCSC), CISA, Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), along with the National Security Agency (NSA), and Federal Bureau of Investigation (FBI). Steps that can be taken to prevent initial compromise include hardening remote access VPN solutions and defending against brute force password-spraying attacks by ensuring users use strong passwords and ensuring that accounts are defended with multi-factor authentication.  Organisations should also make sure they’re able to defend against phishing attacks by having appropriate tools in place to filter out spam emails, as well as educating staff on how to detect potentially malicious messages. It’s also vital for organisations to monitor their networks and ensure that that logging processes are recorded, as this can help to detect and disrupt suspicious activity and prevent an incident in the first place – as well as being able to build a story of what happened if attackers do breach the network. It’s recommended that logs are stored for at least six months, because some cyberattacks can take months to detect. Among other things, it’s also recommended that IT suppliers and their customers should apply security updates as soon as possible, in order to prevent potential intruders from being able to exploit known vulnerabilities to gain access to the network.  It’s also vital for suppliers and customers to be transparent about cyber risks and they should clearly define who is responsible for managing systems securely. For example, a customer should fully understand that applying security updates from a supplier is their responsibility and they could be at risk of cyberattacks if they don’t follow best-patching procedures. SEE: Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breachesNot only are supply chain attacks a vital tool in cyber campaigns by hostile nation states, it’s also possible for cyber criminals to breach supply chains for the purposes of ransomware and other malware attacks because they know supply chains are such a vital part of the business ecosystem. “Managed service providers are vital to many businesses and, as a result, a major target for malicious cyber actors,” said Abigail Bradshaw, head of the Australian Cyber Security Centre. “These actors use them as launch pads to breach their customers’ networks, which we see are often compromised through ransomware attacks, business email compromises and other methods. Effective steps can be taken to harden their own networks and to protect their client information,” she added. The advice was issued on the second day of the NCSC’s Cyber UK conference, where several senior figures from the cybersecurity agencies have met to discuss the threat of global cyber threats. “We are committed to further strengthening the UK’s resilience, and our work with international partners is a vital part of that,” said Lindy Cameron, CEO of the NCSC. “Our joint advisory with international partners is aimed at raising organisations’ awareness of the growing threat of supply chain attacks and the steps they can take to reduce their risk.” MORE ON CYBERSECURITY More

  • in

    Elon Musk: Russian efforts to jam Starlink are 'ramping up'

    Elon Musk has said that Russian attempts to jam or otherwise hack the Starlink satellite communications network have been thwarted so far, but these efforts continue – and are ramping up. The Starlink and Tesla chief was responding to a news story about how the European Union and the US with its Five Eyes partners were blaming the Russian military for a cyberattack on Viasat’s KA-SAT network earlier this year. 

    Networking

    The attack occurred on February 24, one hour before Russian military invaded Ukraine. It caused communication outages across public authorities, businesses and users in Ukraine, and also affected users in several EU member states, the EU said in its statement.SEE: What is ransomware? Everything you need to know about one of the biggest menaces on the webViasat last month confirmed modem-wiping malware knocked out very small-aperture terminals (VSAT) on Viasat’s fixed broadband service in Ukraine and parts of Europe connected to its KA-SAT satellite network. Posting a link to a story about the Viasat attack, Musk noted on Twitter: “Starlink has resisted Russian cyberwar jamming & hacking attempts so far, but they’re ramping up their efforts.”After Russia’s invasion of Ukraine damaged the country’s internet infrastructure, Ukraine’s vice prime minister and minister of digital transformation Mykhailo Fedorov requested help from Musk, who responded by sending Starlink terminals to the country, and has faced attempts to jam or hack the network since.Earlier this month, Fedorov said there were around 150,000 active users of Starlink per day in the country. “This is crucial support for Ukraine’s infrastructure and restoring the destroyed territories,” he said.Satellite communication has become a key tool, but also a key target for hacking attacks. The National Security Agency (NSA) has updated its advice for satellite operators and their customers to protect networks from cyberattacks for espionage and disruption.”The recent U.S. and European Union public statements noted the Russian military launched cyberattacks against commercial satellite communications to disrupt Ukrainian command and control in February 2022,” the NSA said on Tuesday. “This cyber activity against Ukraine further underscores the risk to VSAT communications for both espionage and disruption.”A month before Viasat’s multi-day outage in Europe, the NSA released recommendations, aimed at US government agencies, to protect VSAT communications because they often aren’t encrypted in transit. The NSA warned that VSAT’s virtual network separation “cannot be trusted to provide access control, separation, or confidentiality of sensitive information” and recommended the use of VPNs for confidential VSAT communications.The updated advisory from the NSA remains largely the same but includes a new passage acknowledging EU and US attribution to Russian military attacks on VSATs. “According to a recent U.S. and European Union statements, the Russian military launched cyber attacks in late February against commercial satellite communications networks to disrupt Ukrainian command and control during the invasion, and those actions had spillover impacts into other European countries.”  The activity disabled VSATs in Ukraine and across Europe, including tens of thousands of terminals outside of Ukraine that, among other things, support wind turbines and provide internet services to private citizens, it adds.  It is extremely rare for the EU to attribute a cyberattack to a third nation. However, it has applied EU-wide sanctions to individuals in North Korea, Russia and China for their roles in past cyberattacks on European countries, albeit several years after attacks like WannaCry and NotPetya took place.SEE: These are the problems that cause headaches for bug bounty huntersAs foreign policy think tank German Institute for International and Security Affairs (SWP) highlighted in a study of recent cyberattacks, that attribution at the EU level is difficult, partly because only some EU member nations – such as Sweden, the Netherlands, Estonia, Austria, France and Ger­many – have the technical capability or political will to do so. Also, under the guidelines of the EU’s 2017 cyber diplomacy toolbox, the EU has refrained from attributing cyberattacks to third states because it is a sovereign political decision for each member state. SWP looked at several recent cyberattacks, including WannaCry and NotPetya from 2017, Operation Cloud Hopper in 2016, the 2015 Bundestag hack, and the 2018 attack on the Organization for the Prohibition of Chemical Weapons. “While the Five Eyes intelligence alliance (con­sisting of the US, the UK, Canada, Australia and New Zealand) coordinates its attribution and public naming and shaming in a manner which has a high media impact, the coordination processes in the EU 27 are naturally slower: months, if not years, pass between a cyber incident and the implementation of sanctions,” SWP argued.The EU said the Russian military attack on Viasat’s network was “contrary to the expectations set by all UN Member States, including the Russian Federation, of responsible State behaviour and the intentions of States in cyberspace.” More

  • in

    Qualcomm plunges into the robotics market with new platform

    Written by

    Greg Nichols, Contributor

    Greg Nichols
    Contributor

    Greg Nichols covers robotics, AI, and AR/VR for ZDNet. A full-time journalist and author, he writes about tech, travel, crime, and the economy for global media outlets and reports from across the U.

    Full Bio

    Qualcomm RB6 Robotics Platform
    Qualcomm
    Qualcomm is taking a big dive into robotics. At its 5G Summit event, the company announced a new robotics platform that serves as an off-the-shelf developer kit for creating autonomous mobile robots (AMRs) and drones, utilizing 5G and edge AI for next-gen autonomy.In practical terms, this could set off huge changes in the expanding AMR market and the upstart enterprise drone market. Currently, the space is dominated by a handful of robotics firms that build AMRs or drone-in-a-box solutions and lease them on an as-a-service model. A robust developer’s kit and underlying robotics architecture from Qualcomm could open up the playing field, leading to more customer-specific customization and enterprise in-house robotics development. 

    ZDNet Recommends

    The best photography drones

    This lineup of aerial hardware fits a variety of enterprise photography and video use cases.

    “Building on the successful growth and traction of Qualcomm Technologies’ leading robotics solutions, our expanded roadmap of solutions will help bring enhanced AI and 5G technologies to support smarter, safer, and more advanced innovations across robotics, drones, and intelligent machines,”said Dev Singh, Senior Director of Business Development and Head of Autonomous Robotics, Drones and Intelligent Machines at Qualcomm Technologies, Inc. Qualcomm is using the 5G rollout as its entry point into robotics. Because of the speed and bandwidth 5G affords, it will have major implications for autonomous systems. One of the current constraints of real-world autonomy is that on-board data-processing power is expensive — and coordination across multiple autonomous platforms is highly dependent on high speed networks. Cloud-based solutions bridge the gap, but network issues have throttled development and deployment. 

    The arrival of 5G is expected to initiate a new phase of autonomous systems development, including enterprise drones. After years of slow movement, the FAA is signaling broader acceptance of commercial drone use, setting the table for the industry to take off in a big way. Qualcomm has taken note, and its RB6 platform makes it a new, powerful player in the robotics market. The expansible platform brings edge AI and video processing capabilities (essential for navigation and machine vision) through the Qualcomm AI Engine, with support for 70–200 Trillion-Operations-Per-Second (TOPS). The integration of 5G and AI makes the platform ideal for developers in industrial use cases across sectors like government service applications, logistics, healthcare, retail, warehousing, agriculture, construction, and utilities. These are all expected growth areas for robotics.In addition to the robotics platform, Qualcomm also unveiled a reference design of an AMR called RB5 AMR, which is a small wheeled robot designed to deliver packages and handle materials. More

  • in

    Elon Musk plans to reverse Donald Trump's permanent ban on Twitter

    Written by

    Aimee Chanthadavong, Senior Journalist

    Aimee Chanthadavong
    Senior Journalist

    Since completing a degree in journalism, Aimee has had her fair share of covering various topics, including business, retail, manufacturing, and travel. She continues to expand her repertoire as a tech journalist with ZDNet.

    Full Bio

    Image: Getty Images
    Elon Musk has described Twitter’s decision to permanently suspend former US President Donald Trump from the social media platform as a “morally bad decision” and “foolish in the extreme”, adding that he would reverse the ban. “I would reverse the permanent ban,” said Musk at the Financial Times conference. He added that banning Trump was “a mistake because it alienated a large part of the country” and that it “it didn’t end Trumps voice”, rather it only amplified it among the right, which is why the ban was “morally wrong and flat-out stupid”.”Now, that doesn’t mean that somebody gets to say whatever they want to say if they say something that is illegal or otherwise just destructive to the world then should be perhaps a passive timeout, a temporary suspension, or that particular tweet should be made invisible or have very limited traction,” he said.”But I think permanent bans just fundamentally undermine trust in Twitter as a town square where everyone can voice their opinion.”Read: Twitter founder Jack Dorsey regrets playing a role in centralising the internet According to Musk, who struck a deal last month to buy Twitter for $44 billion, his views are shared by Twitter founder Jack Dorsey.  Twitter made the decision to permanently suspend Trump’s account on 8 January 2021 after he published inflammatory tweets that encouraged rioters to attack the US Capitol. Musk also noted during the FT conference that Twitter needs to be “much more even-handed”. “It currently has a strong left bias because it’s based in San Francisco … this fails to build trust into the rest of the United States and also perhaps in other parts of the world,” he said. See also: No, Elon, Twitter will never be a platform for ‘Free Speech’ Musk also envisions that his plans for Twitter will revolve around building trust by making the platform’s algorithm open-source. “I would literally put the Twitter algorithm on GitHub and say, ‘Hey, anyone want to suggest changes to this? Please go ahead’,” he said. “You really want transparency to build trust and any sort of adjustments to tweets or any human intervention with any account on Twitter should be highlighted as a Twitter person took the following action with your account or with this tweet, so that you’re not sitting there in the dark wondering, ‘Why did this tweet not get any attention?'” The remarks by Musk follows a similar message he delivered when he announced his billion-dollar deal with Twitter where he described “free speech” as the “bedrock of a functioning democracy, and that “Twitter is the digital town square where matters vital to the future of humanity are debated”. Despite Musk’s stand for free speech, a filing revealed last week that he is happy to get the Twitter deal done with the backing of noted bastions of repression, Qatar and Saudi Arabia.   Related Coverage More

  • in

    Five Eyes pin Russia for pre-Ukraine invasion attack on Viasat

    Written by

    Chris Duckett, APAC Editor

    Chris Duckett
    APAC Editor

    Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and is now the Australian Editor of ZDNet.

    Full Bio

    Ukrainian flag waving over Parliament in Kyiv, Ukraine.
    Image: Getty Images
    The Five Eyes nations consisting of the United States, United Kingdom, Australia, New Zealand, and Canada, as well as the European Union and Ukraine have pinned Russia for a series of cyber incidents leading up to the invasion of Ukraine. Pulling up short of absolutely attributing the attack, the UK said it was “almost certain” that Russia caused the Viasat outage in February that began an hour before the invasion of Ukraine commenced. “Although the primary target is believed to have been the Ukrainian military, other customers were affected, including personal and commercial internet users. Wind farms in central Europe and internet users were also affected,” the UK said. The UK added tens of thousands of Viasat terminals were rendered inoperable thanks to the attack. The United States said Russia had deployed multiple families of wiper malware including WhisperGate against the Ukrainian government and private sector networks. “In the months leading up to and after Russia’s illegal further invasion began, Ukraine experienced a series of disruptive cyber operations, including website defacements, distributed denial-of-service attacks, and cyber attacks to delete data from computers belonging to government and private entities — all part of the Russian playbook,” the US said. The Canadian attribution further pinned Russia for targeting Ukraine’s banking sector in February, historically exploiting the big SolarWinds vulnerability of 2021, going after Canadian COVID vaccine research, and interfering in Georgia’s parliamentary elections in 2020. “Russian government cyber actors have compromised a number of Ukrainian civilian entities since October 2021 that would be involved in crisis response activities, including networks related to emergency services, energy, transport and also communications,” the Australian government said. New Zealand said it would be sanctioning eight individuals and entities involved in the attacks and “Putin’s campaign of disinformation”. “President Putin’s propaganda machine is in full swing, spreading lies and false information to justify Russia’s illegal invasion,” NZ Foreign Minister Nanaia Mahuta said. “Today’s announcement reflects our complete rejection of Putin’s narrative and his attempts to mislead the international community.” For its part, Ukraine said Russia had been attacking its cyberspace for eight years. “Russia has launched at least several malware families upon Ukraine since the beginning of the year: WhisperGate/WhisperKill, CaddyWiper, Hermetic Wiper, Industroyer2, DoubleZero, etc,” it said. “Russia uses cyberattacks to create a humanitarian disaster in Ukraine, since hackers are trying to disrupt operation of the energy sector, emergency services, communications, logistics. “Russian hackers pose a threat not only to Ukraine, but to the whole world.” Related Coverage More

  • in

    Docker Desktop for Linux finally arrives

    Docker Desktop is an easy-to-use Docker container integrated development environment (IDE). It includes Docker Engine, Docker CLI client, Docker Compose, Docker Content Trust, Kubernetes, and Credential Helper. With it, you can easily build and share containerized applications and microservices. There’s only been one problem: It hasn’t been available for the Linux desktop.

    Read this

    What is Docker and why is it so darn popular?

    Docker is hotter than hot because it makes it possible to get far more apps running on the same old servers and it also makes it very easy to package and ship programs. Here’s what you need to know about it.

    This isn’t like a Windows game or Mac photo-editing program, where you can see why there isn’t a Linux version. Docker and containers live on Linux in production. But, at long last, and many Docker developers’ requests, Docker is delivering a Docker Desktop for the Linux desktop.Besides making it easier to build Docker containers, the Docker Desktop for Linux dashboard makes it easier for developers to manage containers, images, and volumes. It also provides: A unified Docker experience across all major operating systems.Seamless Kubernetes integration.The Docker Desktop UI provides insights into the Docker processes running locally on your machineIn addition, like the Docker Desktop for Mac and Windows, Docker Desktop for Linux includes Docker Extensions. These enable you to add complementary development tools. Docker has announced support from 14 launch partners. These include JFrog, Red Hat, Snyk, and VMware. Why? Docker CEO Scott Johnston explained, “The large, complex cloud-native tools landscape presents a challenge for developers, who need the right tool for the right job, right now.” Docker Extensions enables developers to quickly discover and start using the tools they need for their apps and not waste time searching, downloading, configuring, evaluating, and managing tools.”In particular, Docker Desktop Extension for JFrog Xray enables developers to automatically scan Docker Containers for vulnerabilities and violations early in the development process. In a statement, JFrog’s VP of Developer Relations, Stephen Chin, said, “We’re thrilled to extend our partnership and integrations with Docker to now include JFrog Xray for vulnerability scanning, forensics, and compliance capabilities. “When software supply chain attacks are on the rise, we’re glad we can empower developers to have greater insight into any exposures, early, so they can engage the necessary teams for timely response and remediation – saving downtime, and avoiding loss of trust from end customers.”The JFrog Docker Desktop Extension integration enables developers to:Monitor and audit the security of software encapsulated in Docker containersIdentify vulnerable artifacts inside Docker containers prior to deployment and once they are in productionConduct enhanced forensic investigations that provide a complete view of software security incidentsGet up and running quickly with an easy connection within the JFrog Platform to the Docker Desktop application.Docker claims that thanks to its increased investment in its product development tools, development teams release 13X more frequently, ramp productivity with new technologies in 65% less time, and compress the mean-time-to-remediation (MTTR) of security vulnerabilities by 62%. To get started with Desktop for Linux, visit the Docker docs to find the relevant instructions for your distro of choice. While Docker is providing Deb and RPM packages, it initially specifically supports Ubuntu, Debian, and Fedora. There’s also an experimental package for ArchLinux. There will soon be a 64-bit Raspberry Pi OS version.All-in-all, this makes Docker Desktop much more competitive with SUSE Rancher Desktop, May the best container IDE win!

    ZDNet Recommends

    The best Linux Foundation classes

    Want a good tech job? Then you need to know Linux and open-source software. One of the best ways to learn is via a Linux Foundation course. More