Printer Friendly

News- Cisco scales data center fabrics more than 12,000 10GbE server ports.

As Internet traffic volumes increase at exponential rates (by 2013 it's predicted that there will be 56 exabytes (about 12.8 billion online movies) crossing the internet per month) the data centers that house and secure applications and data need to scale while remaining highly secure. Cisco[R] recently introduced additions to its data center networking portfolio that address these needs and deliver unmatched architectural flexibility and scale for physical, virtual or cloud computing environments. The new Cisco switching products augment the Cisco Unified Fabric portfolio, which consists of Nexus data center switches and MDS storage switches that connect servers, data storage, and corporate networks seamlessly within the data center and cloud. Cisco unveiled second generation capabilities for the Nexus 7000 family and Cisco FabricPath support for the Nexus 5500 switch; together they provide a new data center fabric scalability, supporting over 12,000 10GbE server ports: double the next-best offering on the market at less than half the cost. Cisco also added new switches with sub-microsecond latency to the Nexus 3000 ultra-low latency switching family, and introduced a virtualized version of its ASA security appliance to deliver consistent security for virtualized and cloud environments.

The announcements advance Cisco's fabric-based approach to delivering solutions to meet diverse data center requirements, from non-virtualized "bare metal" environments, to highly virtualized data centers, Cloud-based architectures, Web 2.0 and "Big Data" environments that manage huge data sets.

Symantec Intelligence Report

Symantec Corp recently announced the results of the October 201 I Symantec Intelligence Report. This month's analysis reveals that for the first time, spammers have established a genuine URL shortening service that is publically available and will generate real shortened links. These have so far only been found in spam emails. October Intelligence reports shows spammers using open source URL shortening scripts to operate malicious sites

During 2010, 92% of spam emails contained URLs and the use of shortened links makes it harder for traditional anti-spam countermeasures to block the messages based on fingerprinting the URL. Legitimate services are much quicker to respond to abuse, and spammers are preying on the knowledge that many people are familiar with shortened links through their use in social media, and have developed a false sense of security about them.

Symantec Intelligence reported earlier this year that spammers had set up their own URL shortening services to better conceal their spam sites and make them harder to block. This month's analysis indicates that a spam gang with at least 80 URL shortening sites have been operating, all using a similar naming pattern, and used top-level domain. However, unlike the URL shortening sites uncovered earlier this year, these sites are effectively public URL shortening sites. Anyone can create a shortened URL on these sites; the form to do so is also publically available.

"Spammers are using a free, open source URL shortening scripts to operate these sites. After creating many shortened URLs with their own service, the spammers then send spam including these URLs. These particular spammers use subjects designed to attract attention, like 'It's a long time since I saw you last!,' 'It's a good thing you came' and so on. This is a common social engineering tactic, and is designed to arouse curiosity, particularly if they have a false sense of security around the safety of shortened links," said Paul Wood, Senior Intelligence Analyst,

"It is possible that spammers are setting up their own URL shortening sites since legitimate URL shortening sites, which have long suffered with abuse, have slightly improved their detection of spam and other malicious URLs."
COPYRIGHT 2011 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Database and Network Journal
Date:Dec 1, 2011
Previous Article:2011 is proving that PCI DSS is working; however there are challenges to be overcome.
Next Article:Online social networks - launch pads for Malware.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters