Are you at #NRF14 this week? Join us in Booth 1954 and learn about our solutions to integrate next-gen technology into retail.
Superheroes and their super strengths have long captured our imaginations. Today, such daydreams – and abilities are getting just a bit closer to reality.
When your smartphone meets the Internet of Everything (IoE), it will make some common activities, such as shopping, a bit more super. Mobility has already assumed a central role in the retail experience, but how are increased contextual capabilities emerging across the entire customer journey?
This blog discusses how some retailers are connecting people to people and people to things, while tapping superpower abilities and making their brands and product experiences distinct.
With the superpowers of smartphones and IoE, retailers can insert themselves into crucial conversations with the customer by offering price matching, access to expanded inventories, suggestions, and shopping lists. All of these combine to keep shoppers engaged and moving along the journey – and beyond.
Read the full article: With IoE and a Smartphone, You Can Shop Like a Superhero
Tags: Cisco, CiscoMobility, connected mobile experiences, connected retail, future of mobility, Internet of Everything, IoE, mobility, network, retail, security, wi-fi, wifi, wireless
This week CES was once again held in Las Vegas with in excess of 100,000 people in attendance.
Cisco demonstrated a number of CMX and IoT related things this week.
Firstly “The Internet of Everything: On The Go”
In the Cisco booth some future thinking was applied with a concept that imagines the shopping experience with a simulated retail environment: “BigBox.” While shopping at BigBox, visitors can walk through a combination of experiences involving location-based data, video, predictive analytics, security cameras, and sensors – designed to help retailers enrich the shopping trip for their customers, and more efficiently manage their stores.
Somewhat scary for some and exciting for others, while all the time enabling retailer increase their bottom line and deliver improved and personalized shopping experience to the consumers.
The next demo “Starlight Resort” was a combination of CMX, and Small Cell capabilities in the hotel resort environment. Read More »
Tags: advertising, analytics, business, CEO, CES, CMO, cmx, connected mobile experiences, customer service, Executives, internet, IoT, lbs, location, location based services, location-based, mobile, operations, planning, retail, security, shopping, technology, thought leader, venue, wifi, wireless
In October 2013, Cisco TRAC discussed Network Time Protocol (NTP) as a possible vector for amplified distributed denial of service (DDoS) attacks. Litnet CERT has since revealed that their NTP servers were used in a denial of service (DoS) attack. Symantec also published information regarding an NTP amplification-based DDoS attack that occurred in December 2013. On December 7, 2013, a hackforums.net user posted an NTP amplification DDoS script to Pastebin. The NTP DDoS script is heavily obfuscated Perl, though the plain text at the top credits the “leaking” of the script to an individual who goes by the handle Starfall. Brian Krebs also mentioned someone going by the name Starfall as a paying user of booter.tw. They may be the same person.
Decoding the obfuscated Perl yields some interesting insights. For example, this code near the top of the script has nothing to do with the NTP DDoS functionality:
The code above downloads a program called spoof.pl from IP 184.108.40.206, then runs and erases that program while writing the text “j00 g0t 0wn3d s0n” into a hidden file. Unfortunately, we were unable to obtain a copy of the spoof.pl script, but the ominous “j00 g0t 0wn3d s0n” text indicates the purpose of the program was likely to compromise the machine of anyone who was running the obfuscated NTP DDoS script. Is there no honor among hackers?
Read More »
Tags: DDoS, distributed denial of service, dos, NTP, security
Are you back from holiday break all refreshed and ready to embrace 2014 with confidence?
Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year because kids want electronics. A recent survey indicated that 88% of kids ages 12 to 17 said that they most wanted a gadget as a holiday gift, with the majority (69%) requesting some kind of Apple device.
Students are returning to school with their shiny new electronic mobile devices and no hesitation to access the resources at school. Educational institutions continue to strive to enable users, while minimizing potential risk, and security continues to be the top concern.
Secure Mobility in Higher Education
Secure Mobility in K-12 Education
The challenge of secure mobility will persist as the device storm continues. 2014 opens with the Consumer Electronics Show in Las Vegas, January 7-10. The last couple years the show highlighted latest smart phones and tablets. It seems this year a heavy focus on the Internet of Things—with sensor-based devices that feed information to a computer over the Internet, further emphasizing the Any to Any problem, which changes the security paradigm. Any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious intruders who may steal sensitive data or disrupt business. Let’s start to think and be prepared for what organizations may see coming on their networks and what the security implications may be for next year.
Tags: byod, ISE, mobility, secure access, security
Update 2014-01-10: This malicious campaign has expanded to include emails that masquerade as bills from NTTCable and from VolksbankU
Update 2014-01-21: We’ve updated the chart to include the Vodafon emails and latest URL activity
English language has emerged as the language of choice for international commerce. Since people throughout the world are used to receiving English language emails, spammers have
also adopted the English language as the means of getting their message to large numbers of international recipients. However, spam messages that are written in a local language and that reference local companies can be particularly enticing for recipients to open because they do not expect malicious messages to be written in anything other than English. Cisco has observed and blocked a large number of malicious spam messages written in German language masquerading as phone billing statements. Initially the spam run masqueraded as Telekom Deutschland, with subsequent messages masquerading as messages from NTTCable and Volksbank.
Cisco TRAC was able to locate what appears to be a single attack attempt, likely a test run, on 2013-12-16 however the majority of the attack started on 2014-01-05 and is ongoing. The malware is currently targeting users as depicted in the heap map below. The vast majority of attacks are occurring in Germany. It is reported that the end goal of this malware is to harvest credentials.
This heat-map represents the malicious URL activity we have detected and blocked:
Read More »
Tags: banking malware, malware, security, TRAC