16.5 C
London
Friday, August 18, 2017
Home Tags Seagate

Tag: Seagate

Sputtered magnetic layer, lubricant, and new heads enable massive 200Gb/inch density.
That was one expensive email for the storage specialist Seagate will cough up $5.75m to settle a lawsuit brought after its bungling staff accidentally handed over employees' sensitive information to fraudsters.…
If we go back to 2009, the work to define NVM Express (NVMe) had just begun, and around that same time, Microsoft Azure made its first major purchase of Serial ATA (SATA) based solid-state drives (SSDs) to help accelerate its storage servers by offloading the storage commit log. Microsoft knew that non-volatile memory (e.g, NAND Flash) would become very important for cloud computing, although it was still very expensive and restricted to use in limited applications.
It was also clear to Microsoft that the SATA interface would be unsuitable to handle the performance of future high performance SSDs.In 2011, as NVM Express had just had its first revision published, a competing standards proposal came on the scene called SCSI Express.
SCSI Express was designed to use the traditional SCSI command set (including three decades of legacy infrastructure for hard drives) on top of the PCI Express interface. Looking at the technical merits, there was consensus in the Microsoft Windows and Azure teams that NVMe was the better interface definition for NAND Flash and to scale to future NVM technologies (e.g., 3D XPointtrade; Technology, MRAM, etc). Microsoft worried that competing standards would lead to many headaches in the market, and thus, Microsoft Azure decided at the time to support the NVMe standard and collaborate with other industry leaders promoting NVMe including Cisco, Dell, Intel, Micron, Microsemi, NetApp, Oracle, Samsung, Seagate, WD to avoid bifurcation of the market by investing in NVMe to ensure it met the needs of the Cloud.
In this article, we will describe the journey of the past five years, where today NVMe is the predominant SSD interface used by Microsoft Azure.To read this article in full or to leave a comment, please click here
After scoring a pricing deal, Backblaze now has a couple thousand enterprise spindles.
The Backup Plus Slim Portable Drive is the simple, one-click way to protect and share your entire digital life.

At 12.1 millimeters thin and a generous 2TB of storage, it’s ready to take with you and go. All your photos, movies, and videos can be backed up using the downloadable Seagate Dashboard software, including the ones you’ve shared on Facebook, Flickr, and YouTube. Run a one-click backup or schedule an automatic backup plan to protect your files on your Backup Plus Slim Portable Drive at your convenience. High-speed USB 3.0 and 2.0 connectivity offers plug-and-play functionality without the need of an external power supply. Compatible with both PC and Mac systems.

The drive averages 4 out of 5 stars from over 11,600 people on Amazon (read reviews).

The typical list price has been reduced 13% to just $69.99 for the 2TB model.
See it now on Amazon.To read this article in full or to leave a comment, please click here
Back up your files, precious photos and videos while connecting to and recharging any USB device, such as your tablet, smartphone or camera -- even if your system is off or in standby mode.

The Backup Plus Hub for Mac is fully compatible with Time M...
Total Worldwide Data Will Swell to 163ZB by 2025 - 10 Times the Amount Today; Majority Will Be Created and Managed by EnterprisesApril 4, 2017: In response to a new study forecasting a 10-fold rise in worldwide data by 2025, global data and storage lea...
The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives.

Available in stunning gold and platinum colors- style meets storage- and easily slips into your backpack along with your other essentials.

At 9.6mm thin, capacity is not sacrificed with 1TB and 2TB options-bring your most important files and head out the door.

Back up and manage your favorite files from your computer, tablet and mobile devices using the Seagate Dashboard. Run a one-click backup or schedule an automatic backup plan to help protect your files.

Convenient tools for local, mobile, cloud and social media backup at the ready. With high-speed USB 3.0 and 2.0 connectivity, you can depend on seamless plug-and-play functionality.

And the USB bus-power eliminates the need for an external power supply, letting you access your files while on the move.

The Lyve mobile and desktop app gives you the ability to access a single, consolidated and personalized photo and video library. When you purchase a Backup Plus Ultra Slim Portable Drive, you get 200GB of OneDrive cloud storage for 2 years (US$95 value).   The Backup Plus Portable Drive averages 4.5 out of 5 stars on Amazon (read reviews).
It's typical list price of $129.99 has been reduced 38% to $79.99 on Amazon.To read this article in full or to leave a comment, please click here
The Seagate expansion desktop drive provides extra storage for your ever-growing collection of files.
Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.
Setup is straightforward; simply plug in the included power supply and USB cable, and you are ready to go.
It is automatically recognized by the Windows operating system, so there is no software to install and nothing to configure.
Saving files is easy too-just drag-and-drop.

Take advantage of the fast data transfer speeds with the USB 3.0 interface by connecting to a SuperSpeed USB 3.0 port.  This drive receives 4.5 out of 5 stars on Amazon, where its typical list price of $70 has been reduced 21% to $55. See it now on Amazon.To read this article in full or to leave a comment, please click here
12TB and 14TB drives are also on the horizon.
Human nature means that education will only go so far.

Technology needs to take up the slack. In the past 12 months, millions of organizations, spanning all industries and sizes, became targets of cyberattacks.

According to a recent report, 400,000 phishing sites were detected per month in 2016, and the Anti-Phishing Working Group concluded that phishing attacks reached an "all-time high" in the second quarter. Not only are attacks proliferating, but the perpetrators have evolved into professional cybercriminals with plenty of time and resources.

For these reasons, it's unrealistic to entrust the workforce with the massive responsibility of stopping phishing. While this many sound ironic coming from someone involved in phishing mitigation, I recognize that phishing education has proved beneficial only to a certain extent.

The reality is that the imperfection of humans makes it all but impossible for us to teach everyone how to spot and avoid phishing — and if phishing efforts aren't detected and eliminated fast enough, someone eventually will click, and then it's game over. When it comes to employee expectations, the digital-native millennial generation, now the largest workforce demographic, is perhaps the most careless when it comes to cybersecurity, opting for expedience over security. Other workforce demographics, such as Generation X and baby boomers, are forced to learn new "detective" skills for identifying and reporting suspicious emails, despite being unfamiliar with technically advanced processes. Frankly, it's very hard to change behavior.
In fact, it's proven that users, regardless of training and awareness, will still click on phishing links or download attachments because of a variety of factors, including curiosity, greediness, distraction, well-crafted impersonations, and/or simply failing to learn from past mistakes.

For example: A culture of distraction: People are easily distracted by their daily tasks, especially under stressful environments, making them likely to click on a malicious link or download a suspicious file.

According to a study from Microsoft, people generally lose concentration after eight seconds, a shorter attention span than a goldfish. With an abundance of smart devices available, and an increasingly digital lifestyle, it's easy to see how so many stimuli could make it difficult to identify a suspicious email, particularly if the email intentionally includes multiple streams of media for the purpose of distracting the receiver. Spearphishing can be almost undetectable: Some attacks are just so good that it's impossible to spot them by the naked eye. What happened to Snapchat and the Clinton campaign are two examples of how sophisticated phishing attacks can trick employees through highly targeted campaigns that impersonate internal executives or well-recognized vendors.
Seagate also fell victim to a similar phishing scam, and its staff has since filed a lawsuit against the company after personal information was exposed. Phishing attacks have become so realistic that even the most cyber-aware recipient can be fooled into providing sensitive information.  Curiosity is king:  Sometimes, curiosity is stronger than the sense of security, especially when it comes to an employer's computer.

According to a recent study by FAU researchers in Germany, 56% of email recipients clicked on a link from an unknown sender despite knowing the risks. Why? Most reasoned that they were curious about the content of the photos or the identity of the sender.

According FAU, curiosity and interest are natural human traits and, with the right timing and context, people will click on a link despite their security awareness. Though employee training will always play a role in phishing mitigation, and it should, recent events prove it's not effective on its own. With increasingly clever and deceptive scams, matched with the massive amount of phishing emails sent daily, employees don't stand a chance in successfully defeating the phishing epidemic on their own. Instead, organizations should turn to next-generation technologies to fill the gap and empower employees. While some argue encryption, multifactor authentication, and database security can be effective in deterring phishers, they're outdated techniques with risks and shortcomings.

Today, forward-thinking organizations are implementing newer strategies to aid in phishing support such as sender reputation and email verification programs, including DomainKeys Identified Mail, Sender Policy Framework, and Domain Message Authentication & Reporting Conformance.

They're not perfect, however. they won't identify suspicious links and attachments or stop a determined attacker who buys a domain and installs Domain Name System records to tell servers which IP address each domain is associated with. In the future, the use of artificial intelligence and machine learning to identify phishing emails, learn from reported attacks, and create real-time signatures will help companies prepare for and prevent attacks that have been attempted around the world, without the need for human interaction.   Related Content: Eyal Benishti has spent more than a decade in the information security industry, with a focus on software R&D for startups and enterprises.

Before establishing IRONSCALES, he served as security researcher and malware analyst at Radware, where he filed two patents in the ...
View Full Bio More Insights
The new leak appears to disclose NSA tactics. Shadow Brokers, a secretive online group that in August published details of hacking tools allegedly belonging to the NSA, released new leaks this week that appear to expose more of the agency's cyber strategies, as well as those from multiple foreign countries. The leak discloses NSA-style code names, including "Jackladder" and "Dewdrop," the Associated Press reports.
It also appears to offer a list of servers compromised by the Equation Group, a separate hacking organization with ties to the NSA. In a post on Medium in broken English, Shadow Brokers referenced Equation Group twice and suggested that its motivation for exposing the server information was related to the US presidential election.

The post also demands a ransom payment, although it does not suggest a specific amount of money. Named after its penchant for encryption algorithms, the Equation Group has hacked targets in more than 30 countries—including Iran, Russia, Pakistan, Afghanistan, India, and China, according to security firm Kaspersky.
Its focus is on government, nuclear research, military, and nanotechnology organizations, as well as companies developing cryptographic technologies. The hackers' malware can reprogram hard drive firmware, and has been found on devices from Seagate, Western Digital, and Samsung.

The exploit, carried out via physical interceptions like infected USB drives and CD-ROMs, is undetectable and cannot be removed. It is unclear how Shadow Brokers wound up with data from Equation Group.

This week's leak also raises questions about possible ties to Harold Martin, the former NSA contractor who was arrested in August for allegedly stealing more than 50 terabytes of classified data.

Authorities are attempting to prove that the Equation Group got its information from Martin.