Cbce Reports Second Quarter 2014 Results – Yahoo Finance

in June, marking Astral Out-of-Home’s entry into Alberta and the national expansion of its focus on large-format digital advertising. On July 31 , Bell completed the sale of 3 TV services to DHX Media Ltd. for total proceeds of approximately $170 million . These asset divestitures were required by the Canadian Radio-television and Telecommunications Commission (CRTC) and the Competition Bureau as part of their approval of Bell’s acquisition of Astral. The sale of the remaining 2 Astral TV services to V Media Group is expected to be completed later this year, subject to closing conditions including approval by the CRTC and termination rights.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/cbce-reports-second-quarter-2014-100000101.html

Cisco patches traffic snooping flaw in operating systems used by its networking gear | PCWorld

This information includes the network placement and IP address of the targeted router, the LSA database sequence numbers and the router ID of the OSPF Designated Router (DR). The vulnerability affects networking devices running most versions of Cisco IOS, IOS-XE and NX-OS operating systems if they are configured for OSPF operations. It also affects the software running on the Cisco Adaptive Security Appliance (ASA), Cisco ASA Service Module (ASA-SM), Cisco Pix Firewall, Cisco Firewall Services Module (FWSM) and the Cisco ASR 5000 carrier class platform.
For the original version including any supplementary images or video, visit http://www.pcworld.com/article/2461060/cisco-patches-traffic-snooping-flaw-in-operating-systems-used-by-its-networking-gear.html

Cisco patches traffic snooping flaw in its networking gear | Security – InfoWorld

Exploiting the vulnerability doesn’t require authentication and can be achieved remotely by sending specifically crafted OSPF LSA type 1 packets via unicast or multicast to the vulnerable device. The packets could contain false routes that would then get propagated throughout the entire OSPF AS domain. However, the attacker does need to determine some information in advance in order to launch a successful attack, Cisco said. This information includes the network placement and IP address of the targeted router, the LSA database sequence numbers and the router ID of the OSPF Designated Router (DR).
For the original version including any supplementary images or video, visit http://www.infoworld.com/d/security/cisco-patches-traffic-snooping-flaw-in-its-networking-gear-247572

How often should you conduct penetration testing? | ZDNet

IT Security in the Snowden Era

Their devices send messages by scattering signals from other sourcesthey recycle existing radio waves instead of expending energy to generate their own. To send data to a smartphone, for example, one of the new prototypes switches its antenna back and forth between modes that absorb and reflect the signal from a nearby Wi-Fi router. Software installed on the phone allows it to read that signal by observing the changing strength of the signal it detects from that same router as the battery-free device soaks some of it up. The battery-free Wi-Fi devices cant harvest enough energy to receive and decode Wi-Fi signals in the conventional way. But they can detect the presence of the individual units, or packets, that make up a Wi-Fi transmission.
For the original version including any supplementary images or video, visit http://www.technologyreview.com/news/529576/mobile-gadgets-that-connect-to-wi-fi-without-a-battery/

Smart Homes Could Benefit from Internet Connected Sensors That Power Themselves from Wi-Fi, TV, and Cellular Signals | MIT Technology Review

They’re picking up the pieces, fending off a PR nightmare as well as a roasting by shareholders, and trying to figure out what happened. Former Black Hat General Manager Trey Ford tells us, “Regulations like PCI require a minimum of once a year, or after any major change this would apply to infrastructure or code.” “I think the first part of this discussion falls to what exactly is a penetration test?” Ford elaborated, “Depending on who you talk to, this may include web application security testing, network scanning and exploitation, social engineering and phishing, wireless testing and more.” Problem: Attacks evolve faster than requirements Just over five years ago, penetration testing — “pentesting” — was the subject of articles in IT security journalism posed as a debate whether or not a pentest was even worth doing. A lot has changed in a short amount of time. Pentesting has mutated rapidly to match a cyber black market packed with highly skilled criminals, government resources, and attack agility that can far outpace even the most moneyed, sophisticated enterprise defenses. More Hackonomics Hackonomics: The cost of getting caught Modern penetration testing is more than a scan, and definitely more than a tick-the-boxes compliance requirement.
For the original version including any supplementary images or video, visit http://www.zdnet.com/how-often-should-you-conduct-penetration-testing-7000032285/