Wednesday, December 30, 2015

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

But looking beyond the garden-variety attacks and vulnerabilities lends great insight into the future of malicious activity and how to defend against it. And 2015 had its share of intriguing invasions, each of which highlighted the modified techniques that lead to new forms of breaches or pinpoint areas in need of new defenses. The past year saw cyber criminals adopting innovative approaches and state-sponsored actors becoming bolder. Motivations shifted, with financial gain no longer the sole reason for launching an attack. Inflicting physical damage, stealing trade secrets, hacking as a form of protest -- 2015 was a year in which malicious activity served many ends.

The increasingly interconnected world means bad guys can cause a lot of damage; more important, many malicious actors now have the skills and means to carry out chilling attacks. Below is a roundup of some of the most significant incidents of the past year, each of which pushes the overall security conversation further, showing new paths and needs for defense. Which ones did we miss?

Bitcoin under barrage

Bitcoin -- and the idea of crypto currency in general -- captured mainstream attention this year, in part because of nefarious actors who used the platform as cover for payment. Ransomware gangs have demanded payment in bitcoins before unlocking victims’ files and folders, and blackmailers have demanded bitcoins in exchange for not launching DDoS attacks against websites. But bitcoin made security headlines several times in 2015 for a different reason: Thieves kept stealing bitcoins ... lots of them.

European exchange Bitstamp suspended trading after discovering one of its operational bitcoin storage wallets was compromised in early January. The exchange is believed to be the world’s third busiest and handles approximately 6 percent of all bitcoin transactions. About 19,000 bitcoins, or roughly $5 million, were stolen at the time. That wasn’t the only bitcoin attack, as China-based exchange BTER reported in February that 7,170 bitcoins, or roughly $1.75 million, were stolen from its cold wallet system. Thieves stole 10.235 BTC, or roughly $2,500, from bitcoin startup Purse in October.

Consider it a twist on the traditional bank heist: Instead of looting bank accounts, exchanges are raided. In addition to showing there is real financial value associated with the virtual currency, the thefts highlighted the need “for an internationally recognized security standard” for bitcoin, said Florindo Gallicchio, director of information security in the Optiv Office of the CISO. In February, the Cryptocurrency Certification Consortium (C4) proposed 10 standardized rules for the creation, storage, audit, and use of bitcoins, as part of the Cryptocurrency Security Standard (CCSS).

While the amounts stolen aren’t insignificant, they pale in comparison to the 850,000 bitcoins, worth close to $450 million, that disappeared from Japanese-based exchange Mt. Gox in 2014. The exchange, believed to have handled 70 percent of all bitcoins, has since closed and entered bankruptcy. Japanese police believe the theft was an inside job.

As is often the case with technology, the exchanges have thus far focused on functionality and usability, with security an afterthought, said Steve Donald, CTO of Hexis Cyber Solutions. Many of the attacks relied on social engineering to gain a foothold on to the exchange’s network. Exchanges need to adopt secure code development practices, as well as dynamic and static code analysis to protect their applications. “Bitcoin exchanges should be highly incented to improve security as this will be a requirement before this new type of currency will achieve wide scale usage,” Donald said.

Cyber goes real-world

Cyber attacks that result in damage in the physical world happen far more often on TV shows than they do off-screen. It was scary when the Shamoon malware attack partially wiped or totally destroyed hard drives of 35,000 computers at Saudi oil company Aramco back in 2012. We saw the blurring between cyber and physical again -- to be fair, the attack actually happened in 2014 and the report providing the details were released shortly before the end of the year -- at an unnamed German steel mill when attackers manipulated and disrupted control systems. The blast furnace could not be properly shut down, resulting in “massive” damages, according to reports.

There is a tendency to think cyber attacks are about stealing data or knocking systems offline. There can be real-world damage, too. An attacker can potentially compromise a pharmaceutical company’s production process or quality control systems and modify the recipe for a particular drug. Hospital systems are also vulnerable to attack, especially since many legacy systems still in use cannot be secured. As much as 20 percent of hospitals are vulnerable to attacks that can disable critical care systems, Gallicchio said.

“People can be physically hurt from a cyber attack,” Gallicchio said.
Industrial control system security comes up a lot in conversation, but the incident at the German steel mill highlights the fact that the threat is no longer theoretical. One of the challenges facing industrial control system security, especially in manufacturing, is the simple fact that the systems are typically controlled and administered by operations and engineering departments, not IT. The operations and engineering teams are focused on reliability and make decisions at the expense of security in order to maintain uptime.

Improving defenses requires “a mix of basics and more contemporary defenses,” such as ensuring proper segmentation and access controls between different networks, Donald said.
Financial crime goes big

There were a number of attacks against financial institutions in 2015, but none was more audacious than the Carbanak crime ring, which targeted more than 100 banks and other financial institutions in 30 nations. Kaspersky Lab estimated the gang had stolen as much as $1 billion since late 2013 and had managed to stay under the radar for two years because it kept each transaction between $2.5 million and $10 million.

The scale of attacks against financial institutions indicate criminals are moving away from low-value consumer-related attacks such as identity and credit card theft in favor of high-value attacks. “The old ‘smash and grab’ jobs are becoming carefully orchestrated and executed jobs,” said Mike Davis, CTO of CounterTack.

The FBI also warned of an increase in social engineering campaigns where an attacker sends an email purporting to be from the CEO or another senior executive to the CFO or another executive authorizing a wire transfer. If the recipient is tricked and doesn’t validate the email’s authenticity before the transfer, that money is gone, usually for good.

While external attackers still pose the biggest threat to financial organizations, 2015 showed insiders can cause damage as well. Earlier this year, a former employee of Morgan Stanley pleaded guilty to stealing confidential data from more than 700,000 customer accounts while he was interviewing for a new job with two competitors. And external attackers target insiders who already have access to sensitive data. Encryption, dynamic security policies that travel with data, and robust multifactor authentication controls are some of the defenses financial institutions should consider to ensure that unauthorized individuals can’t read anything they shouldn’t be allowed to see, said Ron Arden, vice-president of Fasoo.
Health care on the breach radar

Some of the biggest breaches in 2015 involved health care organizations, including Anthem, Excellus BlueCross BlueShield, Premera Blue Cross, and CareFirst, to name a few. Eight of the 10 largest health care breaches happened in 2015, according to the U.S. Department of Health and Human Services.

It’s no surprise the attackers went after health care, since the companies tend to have valuable data, including names, addresses, Social Security numbers, medical records, and financial information. The data is difficult to change, meaning it has a longer shelf life and can be used in a variety of follow-up attacks. Attackers accessed more than 100 million health care records in 2015.

While some of the breaches may have been part of identity theft and other cyber crime activities, security experts believe Anthem was the work of Chinese state-actors. The attackers may have been after data on specific individuals for intelligence purposes, or they may have wanted intellectual property relating to how medical coverage and insurer databases are set up. The Chinese government has denied any involvement in the attacks, and Chinese authorities recently arrested individuals they claim had targeted Anthem for cyber crime purposes.

“Just like how the financial verticals evolved to the next-generation bank heists, we will soon see attackers use health care information records to support more sophisticated business models,” said Itzik Kotler, co-founder and CTO at SafeBreach.

These attacks were successful in large part because health care companies have not traditionally invested as much on security initiatives as financial institutions have. The Anthem breach, in particular, showed how far some health care companies lag on basic security best practices. As Target shook the retail sector out of its complacency in 2014, Anthem made the health care industry sit up and notice the very real dangers it faces.

Worse, encryption practices around sensitive data had no effect. In many health care breaches, users were socially engineered out of their credentials, letting attackers easily bypass encryption controls. It doesn’t take a lot, either. Attackers stole 80 million personal records from a large health care insurance company by compromising only five user accounts, Eric Tilenius, CEO of BlueTalon, said. “Every company should ask, ‘How much data would be exposed if a user account gets compromised?’ and then work to limit that exposure,” he said.

“It doesn’t matter how strong your security platform is, if employees aren’t properly trained in best security practices, it all can go out the window,” said Garry McCracken, vice president of technology at WinMagic.

Attacks as part of a long game

Perhaps the most intriguing, significant, and shocking security incident of 2015 was the attack against the U.S. Office of Personnel Management. The personal data of millions of government employees, U.S. military personnel, and government contractors who had received background checks and security clearances were stolen. In a typical data breach, the attackers target the organization because they want the information it has. In the case of OPM, the attackers didn’t want the records simply for the sake of having them, but to obtain background information on targeted individuals.

“[The OPM breach] represents human targeting at its finest, understanding that people are our biggest security risk … our weakest link in the chain,” said Renee Bradshaw, manager of solutions strategy at NetIQ, the security portfolio of Micro Focus.

The method of attack followed a formula: Target a subcontractor in a social engineering attack and steal credentials to gain access to the network. Plant malware on a system and create a backdoor. Exfiltrate data for months, undetected. The level of poor security practices at OPM “was astounding,” including lack of consistent vulnerability scanning and two-factor authentication, as well as untimely patch management, said Bradshaw.

The OPM breach also emphasized organizations' vulnerability to social engineering. Government employees and contractors are now subject to security awareness training programs to learn about the dangers of spear phishing and other social media threats.

Vulnerabilities out of control

The attack against Hacking Team over the summer was an eye-opener. The Milan-based company developed and sold surveillance software to government agencies around the world. The company relied on zero-day vulnerabilities to develop software that was difficult to detect and could intercept communications. When an unknown individual released more than 400GB of data stolen from Hacking Team, including email communications, business documents, and source code, security researchers uncovered proofs-of-concept for three different zero-day vulnerabilities in Adobe Flash Player. While Adobe scrambled to fix the flaws as quickly as possible, cyber criminals were able to create exploits and use them in large-scale attacks.

“Hoarding zero-day exploits at both the national and private level is dangerous for everyone. We can’t expect to come out on top if we are sitting on these types of vulnerabilities,” said Tom Gorup, security operations leader at security consulting firm Rook Security.

Not reporting the vulnerabilities to the vendor for fixes means someone else can come along and find the same bug. If it was found in the first place, it stands to reason someone else will eventually find it, too. As Hacking Team learned the hard way, anyone can be breached. And once the vulnerabilities are public, everyone is at risk. Zero-day exploits are not like physical weapons in that the original owner has control over how and when it is used. The weapon can be used right back, with devastating consequences.

toc year in review 2015
“We need to refocus our cyber efforts to a defensive posture and let our infantry and airmen handle the offensive efforts,” Gorup said.
Government services leak too much info

As attacks against government agencies go, the IRS Transcript Service breach was small beans. Only 100,000 people had their information exposed through this breach, which is significantly less than the 21.5 million affected by the OPM breach. The attackers plugged in the victim’s name, address, and Social Security number into the IRS Get Transcript service to obtain detailed information such as income, employer name, and dependents.

More uniquely, attackers used legitimate services to convert basic personally identifiable information to determine detailed data that could be used to falsify tax returns and other forms of financial fraud. The same method can conceivably be used with the Department of Motor Vehicles' online renewal process or with a property appraisal site maintained by the county. With the information obtained through these services, identity theft becomes easier. It was especially effective, as attackers enjoyed a 50 percent success rate using the stolen data, noted Morey Haber, vice president of technology at BeyondTrust.

“Many sites like the Get IRS Transcript website exist all over the Internet for state, local, and federal governments. The IRS was an easy target, but so are the others,” Haber said.
Forget cars, what’s happening with airplanes?

Vehicular hacking burst on to the scene in 2015 and grabbed a lot of security headlines, but we should be worried about all the things we don’t know regarding attacks on airplanes. About the time researchers Charlie Miller and Chris Valasek were exploiting a Chrysler’s UConnect infotainment system to remotely control a 2014 Chrysler Jeep Cherokee, there were reports the group behind the OPM breach had successfully obtained records of origins and destinations of United Airlines passengers, as well as passenger manifests. Another group of attackers also disrupted the IT systems for LOT Polish Airways, which resulted in the airline canceling 20 flights and grounding 1,400 passengers.

Then of course there’s the FBI’s claim that security researcher Chris Roberts caused a plane’s engine to climb when he was poking around aircraft systems while on a United Airlines flight. The jury’s out on whether Roberts actually managed to take over the jet.

Should these attacks concern us? Are airplanes at risk? Both United and LOT have refused to provide any information on the issues.

“The scary answer here is that we don’t know, and that’s both surprising and unsurprising at the same time,” said Johnathan Kuskos, manager of the threat research center at WhiteHat Security.

There are two different types of attacks to worry about. One targets IT systems, such as the airline website and check-in kiosks at the airport. The other targets onboard systems that actually power and control the aircraft. The onboard systems tend to be heavily sandboxed and are locked down. IT systems are more at risk. And according to WhiteHat’s vulnerability statistics report, every online application has at least one serious vulnerability.

“It’s hard to imagine that a professional criminal syndicate or state-sponsored hackers haven’t targeted these major airlines yet,” Kuskos said.
Getting around Apple’s walled garden

Palo Alto Networks this year uncovered XcodeGhost, a malware attack that infected iOS applications and existed in the App Store for months before being detected. The attack relied on iOS developers downloading a compromised version of Xcode, the iOS dev kit. Compromising a toolchain is not a new attack method, and XcodeGhost was extremely successful at infecting developers on a wide scale. The real danger lies in what lessons the XcodeGhost team learned from its success and how it will try again.

The way the malware infected iOS apps before they were distributed into the App Store was completely new, said Ryan Olson, intelligence director at Palo Alto Networks. Developers are vulnerable and attackers can piggy-back on their apps into the App Store, past Apple’s vaunted security measures.

“While the XcodeGhost malware was not particularly dangerous, it was groundbreaking in the way it gained access to millions of devices,” Olson said.

XcodeGhost showed people that Apple’s walled garden can be breached and at a wide scale. It forced app developers to clean up their systems, re-issue their applications, and be better about where they get their developer tools. In order to defend against similar attacks, iOS developers need to understand their dev systems and apps are valuable to attackers looking for ways to target iOS users.

“XcodeGhost was the first truly widespread malware that impacted non-jailbroken phones, it was a massive eye-opener for iOS users who had previously thought they were invulnerable to attack,” Olson said.

Juniper’s unauthorized backdoor scandal
Juniper Networks recently uncovered unauthorized code in its Juniper NetScreen firewalls that could allow attackers to decrypt VPN traffic. The issue arose from the fact that Juniper used Dual_EC_DRBG, a known flawed random-number generator, as the foundation for cryptographic operations in NetScreen's ScreenOS. Juniper claimed it used additional precautions to secure the random number generator. It turned out the safeguards were ineffective.

The backdoor in Dual EC can be viewed as two parts, where one adds a second keyhole that overrides the normal lock on a door, and the other is a specific lock cylinder that fits that keyhole, Matthew Green, a cryptographer and assistant professor at Johns Hopkins University, wrote on Twitter. The attackers replaced the NSA-approved lock cylinder with their own lock cylinder. They wouldn’t have been able to replace the cylinder if the door hadn’t been modified with the keyhole in the first place.

In the end, someone somewhere was able to decrypt Juniper traffic in the United States and around the world. The matter is currently under investigation by the FBI.

“NSA built in a powerful eavesdropping backdoor. The attackers simply repurposed it by changing a few bytes of code,” Green said. “I’ll be honest, while I’ve been worrying about something like this for a long time. Seeing it actually happen is staggering.”

In light of the mounting pressure from government officials on the tech industry over encryption backdoors, what happened to Juniper is a clear example of how backdoors can be abused. 2016 will tell whether law enforcement and government will learn the lesson and back off on those demands.

Understanding 2015

It’s clear from looking at the attacks and breaches this year that the IT security industry is not well-positioned to defend itself. Knowing is half the battle, but there’s a long road ahead for organizations that don’t follow the basics of security best practices. “Security isn’t cheap, and when you’ve historically underinvested in security, what it takes to catch up in both technology investment and human capital is expensive,” said James Carder, CISO at LogRhythm and vice president of LogRhythm Labs.
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

Wednesday, December 23, 2015

Network World’s 20 Best Products of 2015

Tough to choose
With so many great products on the market, it’s hard to pick the best ones. So we asked our experts, Network World’s independent product reviewers and bloggers to list their favorite products of 2015. What we got back was a list that covers the full spectrum of the networking world, with a little entertainment and gaming thrown in.

White-box switch
As major players in white-box networking, Accton and Cumulus Linux pose an existential threat to incumbent vendors of data center network hardware. The appeal is simple: Run open-source code on commodity hardware, and manage everything as you already do with your servers. It’s the same formula that defeated proprietary server vendors years ago, and there are reasons to believe that, at least in the data center, white-box will again triumph, this time over proprietary networking vendors. See David’s video review here.

Epson Workforce Pro EcoTank printer
It’s been a long time since I got excited about a printer, but I love the new Epson WorkForce Pro WF-R4640 EcoTank printer. Technically it’s an ink jet printer, but one that conquers most if not all of the disadvantages of that format. Unlike the tiny cartridges that most inkjets use, the EcoTank is loaded with what look like silver hospital IV bags. Once in place, they can print for over 20,000 brilliantly colored pages before needing replacement, and the ink is engineered to sit in the bags for at least three years. It’s also fast, printing 30 graphical pages in two minutes and 29 seconds. YouTube video of my speed test.

iPhone 6s
Like clockwork, Apple in 2015 managed to release yet another new iPhone jam-packed with new features. In addition to the usual smattering of spec enhancements, the iPhone 6s introduced us to 3D Touch, a new method of user interaction based on the amount of pressure applied to the touchscreen. The potential ramifications for 3D Touch are immense. Combined with faster Wi-Fi, a better camera, and enhanced Siri functionality, there’s no question that the iPhone 6s is not only one of the top products of 2015, but one of the most exciting iPhone releases in years.

Ironkey Workspace
The Ironkey Workspace W700 looks like a normal 64G key drive, but is actually an entire portable computer that exists completely on the stick. All it needs is any USB port on almost any device and a display to allow users to tap into its Windows 10 operating system. Once you have booted to the on-board OS, you can work just like normal on your chosen desktop with your installed programs. And the W700 is designed so that no trace of its presence is left behind on whatever system is being used as its temporary host. Finally, data at rest on the W700 is protected by XTS-AES 256-bit hardware encryption.

Steam In-Home Game Streaming
As a gamer, I spend a lot of time using the Steam Online Service where PC gamers can purchase, download and play the latest games on demand. The addition of the Steam In-Home Streaming service this year really blew me away. When you play a game using In-Home Streaming, video and audio are sent through your home network from your high-end gaming PC to another device. You can even play games that normally would not work on, say, an older laptop, because the main computer handles the load. Windows games even work with Mac OS X and Linux devices now too, so almost anything can become a supplemental gaming device.

Windows 10
Yes, the latest Windows has gotten a lot of dings over user privacy concerns, many of which are legitimate, but we still have to say that the OS deserves to be regarded as one of the best new tech products of the year. Microsoft gets kudos for listening to the public who signed up to test and give feedback on preview builds of Windows 10, which helped shape and refine the OS’s development. Thus, when the final version was released on July 31, most of what had gone wrong with Windows 8 was rectified: Microsoft ripped out the reviled Start Screen, restored and updated the classic Start Menu UI, and added two major features: The personal digital assistant Cortana, and a better web browser, Edge, to replace Internet Explorer. To top off all this good stuff, Microsoft gave away Windows 10 as a free, downloadable upgrade to any computer running a legit copy of Windows 8 or Windows 7.

Apple TV
With the fourth-gen Apple TV, Apple has finally released a set-top box that’s worth getting excited about. Sporting a number of compelling features, including Universal Search, a dedicated App Store, and a brilliantly intuitive Siri-enabled remote, the Apple TV may soon be the only device required for users to satiate their entertainment needs. It will only get better once developers start releasing more high-quality apps, and if Apple’s TV subscription rolls out in early 2016, as rumors have hinted. With cable costs now exorbitantly high, the value proposition provided by the Apple TV is now more attractive than ever before.

Sandisk USB flash drive
Released this summer, this flash drive is great if you use one of those lightweight, Windows notebooks that have an SSD, but which are only 64GB or 32GB. Just plug the SanDisk Ultra Fit into an available USB port on said notebook to gain additional storage for your large-sized personal documents and media files, and you can just leave this flash drive there. Because of its stubby-short form factor, the Ultra Fit sticks out just a little from the edge of your notebook, so it probably won’t break off or otherwise become unattached when you stow away your notebook into a backpack, bookbag, purse, or carry-on. When it was first released, the 128GB version retailed for $120, but now you can buy it for less than $30. The Ultra Fit also comes in 64G, 32G and 16GB sizes. It supports USB 3.0 and transfers data at a rate of 130MBps.

Cloudready
Have an old desktop or notebook sitting around that you’re not using? You can (possibly) turn it into an ersatz Chromebook or Chromebox by installing CloudReady. (“Possibly” because CloudReady may not work on computers with technical components that are older than 8 years.) CloudReady is built from Chromium OS, the open-source code release of Chrome OS. Developed by Neverware, it was released in February. CloudReady can be run directly from a USB flash drive, but it’s recommended that you install it onto the computer’s hard drive for better performance. There are some limitations; it doesn’t support audio in MP3 format, or video encoded in H.264 or MP4. Still, CloudReady made its mark in 2015 as an intriguing way to turn an old computer into an Internet-connected client. You can use it for free as an individual; businesses and schools are asked to pay. Neverware intends to make their money by selling enterprise and education licenses, and providing technical support.
hMailServer
See larger image
hMailServer

HMailServer is an open source mail server for Windows. Unlike overly complex commercial products, hMailServer occupies a small footprint, and works reliably from the moment it’s fired up until you stop it or the hardware fails. Did I mention it’s open source software and therefore, free? I use hMailServer in production at our data center, and after a lot of initial configuration to get spam checking going, and other important rules established, it has been running flawlessly for four years and counting. I needed some custom rules and these were simple to write in VBScript, which hMailServer supports. Plus the documentation and forum support are great.

IPCop
I’ve grown attached to IPCop, an open source Linux-based stateful firewall that’s been around since 2004. Even though we’re a Windows shop, there aren’t many good, inexpensive, non-OEM gateway products for Windows. But lacking a Windows-based version of IPCop isn’t an issue, since we use it as a dedicated gateway between our home office and the Internet. Configuration takes a bit of work, but once configured, this product is a workhorse that never quits. We bounce the server every once in a while to clear buffers and just because it’s a good practice, but it’s easy to forget to do this because it works so flawlessly. I love the easy web GUI (only available on the internal subnet of course).

MacBook
In a year when Apple, Microsoft, and others highlighted new tablets that double as laptop replacements, Apple introduced an unapologetically pure laptop with a real keyboard and an innovative “force-touch” trackpad instead of a touchscreen. The MacBook’s retina screen is smaller than an iPad Pro’s, and it runs Mac OS X, not a mobile or hybrid OS. Plenty of people still need a real laptop to do real work, and the new MacBook puts to shame the MacBook Air—and will likely soon become ubiquitous in cafes and coffeehouses everywhere.

AWS Snowball
As the cloud becomes more and more mainstream, companies increasingly want to do more than run new jobs in the cloud – they want to migrate existing workloads and databases into the cloud. But that can take days or weeks and cost a lot of money. That’s why Amazon threw in Snowball, a 47-pound ruggedized storage appliance designed to take care of the entire process in one fell swoop. Each Snowball holds up 50 TB of data and includes automatic encryption, and you can rent one for as little as $200 per job. Plus, it looks totally awesome.

Facebook M
Facebook M, the company’s new virtual assistant for its Facebook Messenger system, is a lot more than a challenge to Apple’s Siri, Google Now, and Microsoft’s Cortana. This bold hybrid of human and artificial intelligence is designed to do just about everything for users, including many of the things software alone still struggles to accomplish. Just as important, the service—now in private beta for a few thousand lucky Bay Area users—is intended to serve as a training ground to help software learn to solve those issues on its own without human help.

Google OnHub router
Before the Google OnHub, wireless home routers were frustrating during setup and even more maddening when they broke. With more and more home devices connecting to the Internet, the router is increasingly important. Designed with 12 dual-band antennas, plus one to manage traffic, Google’s OnHub router reliably delivers fast and long-range connectivity even in radio signal-congested urban environments. An Android or iOS app simplifies setup, approaching an almost plug-and-play experience. The device also houses radios for Bluetooth, Smart Ready, 802.15.4, and Weave, which Google can make use of with over-the-air updates.

Docker
Enterprises facing digital disruption are fighting back with Docker, an open standard implementation of Linux containers. It bundles an application with all of its code libraries and executable files, isolating it from the OS and other applications. It removes the friction between development, test, and deployment. Before releasing version 1.0, it recorded the strongest buying intention score in the last six years, according to a survey (PDF) of 685 CIOs by ETR. Docker lets enterprises run private and public clouds like platform companies Google, Salesforce, and Airbnb do.

360 Total Security Essentials
Free antivirus programs often require users to create a membership, or bombard them with pop-up windows pestering them to upgrade to the paid version. Often, the free price tag simply isn't worth the headache. 360 Total Security Essentials doesn't require you to log in to an account. No popups nagging you to upgrade. It's small and unobtrusive and doesn't slow your system at all. In tests, it found Trojans hiding on multiple systems. And it updates regularly and doesn't hit you with false positives.

Wise Care 365
There are lots of system maintenance utilities, but I've found Wise Care 365 to be the more effective and most comprehensive. It combines a bunch of individual utilities from WiseCleaner into one product. It does a great job of keeping your system clean, running daily checks for junk files, cleaning the browser cache, optimizing boot speed, and fixing the Registry. But Wise provides a ton of extra utilities as well, including a very good memory optimizer (often freeing up to 1GB of memory), has secure delete, a program uninstaller, secure erase, file search and hiding folders and more. For $29.95, this is a steal.

Western Digital 6TB My Cloud
This one’s a little dangerous. It’s a 6TB external drive appliance that’s USB3 connectable to your personal desktop or notebook—or even server-- if you must, but why not use its Gigabit Ethernet jack? It warns you that its “embedded” certificate is bad. Why do you care? Because you can hit this drive across an ocean at whatever link speed you can muster. It swallows files without complaint and it’s been seen in refurbished editions for well under $200. It’s every Data Loss Prevention Specialist’s rogue nightmare. I love it. Sitting in a Wi-Fi Hotspot in Istanbul, I could take my photos and send them to the lab in Indiana in about three clicks and a drop. Yes, it’s your own personal gargantuan disk resource, and you can access it via your smartphone. It’s a share on your NetBIOS network, too. It has horrific user security, in my opinion, but it’s become a huge storage pit of photos, old ISO images, and more. I’m not quite embarrassed that I own it.

VMware Fusion 8 For Mac
We reviewed this Type 2 Hypervisor for Mac and really liked it. It does some fairly unique tricks, and you get still more if you’re heavily invested in the VMware ecosystem. If you use VMware’s vCenter, Fusion for Mac 8 becomes an alternative to a browser remote control launch (VMRC) of VMs located within a VMware ESXi infrastructure. It’s a DevOps and infrastructure engineer’s delight. Click on a VMRC link within VMware vCenter and suddenly, Fusion is doing the VDI/remote control for the VM hosted in our data center. Have a bunch of VMs? Open them up and tab among them to watch interactions. No fussy multiple browser windows, just Fusion managing things in the place of VMware’s usual browser window madness. There is a limit to the number of VMs you can open up this way. If you’re a VMware geek, infrastructure construction artist, coder/developer/QA person, it’s a startlingly handy hypervisor.