Connect with us

Tech

Nakivo expands Proxmox backup and DR capabilities in v11.1 | Computer Weekly

Published

on

Nakivo expands Proxmox backup and DR capabilities in v11.1 | Computer Weekly


Backup provider Nakivo has moved to version 11.1 of its Backup & Replication software. Key additions include expanded capabilities in the Proxmox virtualisation environment – an emerging VMware alternative – that include disaster recovery (DR) orchestration. It also adds a much simplified connection to the customer infrastructure for managed service providers (MSPs).

Nakivo also responded to questions about a security vulnerability discovered earlier this year by a third-party security company (see box below).

Nakivo offers backup for virtual machines (VMs) and physical machines, and can protect sources that range from datacentres to edge devices, as well as cloud files and applications. It offers replication and disaster recovery for some environments, with automated failover. All of this is admin-able from a single-pane-of-glass user interface.

According to vice-president for product management Sergei Serdyuk, Nakivo offers data protection at “roughly half the price of competitors” in the backup space.

The company claims 16,000 customers, which include Coca-Cola, Cisco, Siemens, Honda and Radisson, where they are deployed in at least some departments, if not the whole customer environment, according to Serdyuk.

Core among the additions in v11.1 is MSP Direct Connect, which allows service providers to connect to customer environments without the need for open ports and network configuration on the customer side. According to Nakivo, this will allow backup for VMware, Hyper-V, Proxmox VMs and physical machines, as well as working with Nakivo’s site recovery feature.

“Providers can install our solution at the customer site. It can connect to the solution installed at the MSP, and basically off they go. This is to simplify and speed up deployments for MSP customers,” said Serdyuk.

Meanwhile, the new version sees expanded Proxmox capabilities. These include the ability to create VM replicas, boot VMs from Nakivo backups, verify backup integrity and recovery readiness, and restore from tape.

“With the new version, we can create Proxmox VM replicas in the same or different locations,” said Serdyuk. “So, customers can, in case of a disaster, just switch to a replica VM instead of spending time on restore from backup.”

Additionally, Nakivo claims to be the only backup provider that offers disaster recovery for Proxmox environments.

According to Serdyuk, that translates to having in place a site-level workflow that is dependent on replication.

Further additions to the latest version of Nakivo include real-time replication for VMware, which was in beta but is now generally available.  

There is also the addition of granular physical backups for Windows and Linux physical machines. This allows for backup of specific files and folders without full backups, and storage of backups in any location, including as copies to comply with 3-2-1 backup plans.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

DHS Has Been Collecting US Citizens’ DNA for Years

Published

on

DHS Has Been Collecting US Citizens’ DNA for Years


The expansion has been driven by specific legal and bureaucratic levers. Foremost was an April 2020 Justice Department rule that revoked a long-standing waiver allowing DHS to skip DNA collection from immigration detainees, effectively green-lighting mass sampling. Later that summer, the FBI signed off on rules that let police booking stations run arrestee cheek swabs through Rapid DNA machines—automated devices that can spit out CODIS-ready profiles in under two hours.

The strain of the changes became apparent in subsequent years. Former FBI director Christopher Wray warned during Senate testimony in 2023 that the flood of DNA samples from DHS threatened to overwhelm the bureau’s systems. The 2020 rule change, he said, had pushed the FBI from a historic average of a few thousand monthly submissions to 92,000 per month—over 10 times its traditional intake. The surge, he cautioned, had created a backlog of roughly 650,000 unprocessed kits, raising the risk that people detained by DHS could be released before DNA checks produced investigative leads.

Under Trump’s renewed executive order on border enforcement, signed in January 2025, DHS agencies were instructed to deploy “any available technologies” to verify family ties and identity, a directive that explicitly covers genetic testing. This month, federal officials announced that it was soliciting new bids to install Rapid DNA at local booking facilities around the country, with combined awards of up to $3 million available.

“The Department of Homeland Security has been piloting a secret DNA collection program of American citizens since 2020. Now, the training wheels have come off,” said Anthony Enriquez, vice president of advocacy at Robert F. Kennedy Human Rights. “In 2025, Congress handed DHS a $178 billion check, making it the nation’s costliest law enforcement agency, even as the president gutted its civil rights watchdogs and the Supreme Court repeatedly signed off on unconstitutional tactics.”

Oversight bodies and lawmakers have raised alarms about the program. As early as 2021, the DHS Inspector General found the department lacked central oversight of DNA collection and that years of noncompliance that can undermine public safety—echoing an earlier rebuke from the Office of Special Counsel, which called CBP’s failures an “unacceptable dereliction.”

US senator Ron Wyden more recently pressed DHS and DOJ for explanations about why children’s DNA is being captured and whether CODIS has any mechanism to reject improperly obtained samples, saying the program was never intended to collect and permanently retain the DNA of all noncitizens, warning the children are likely to be “treated by law enforcement as suspects for every investigation of every future crime, indefinitely.”

Rights advocates allege that CBP’s DNA collection program has morphed into a sweeping genetic surveillance regime, with samples from migrants and even US citizens fed into criminal databases absent transparency, legal safeguards, or limits on retention. Georgetown’s privacy center points out that once DHS creates and uploads a CODIS profile, the government retains the physical DNA sample indefinitely, with no procedure to revisit or remove profiles when the legality of the detention is in doubt.

In parallel, Georgetown and allied groups have sued DHS over its refusal to fully release records about the program, highlighting how little the public knows about how DNA is being used, stored, or shared once it enters CODIS.

Taken together, these revelations may suggest a quiet repurposing of CODIS. A system long described as a forensic breakthrough is being remade into a surveillance archive—sweeping up immigrants, travelers, and US citizens alike, with few checks on the agents deciding whose DNA ends up in the federal government’s most intimate database.

“There’s much we still don’t know about DHS’s DNA collection activities,” Georgetown’s Glaberson says. “We’ve had to sue the agencies just to get them to do their statutory duty, and even then they’ve flouted court orders. The public has a right to know what its government is up to, and we’ll keep fighting to bring this program into the light.”



Source link

Continue Reading

Tech

The Best MagSafe Wallets to Keep Your Stuff Safely in One Place

Published

on

The Best MagSafe Wallets to Keep Your Stuff Safely in One Place


Other Good MagSafe Wallets

ESR Magnetic Wallet HaloLock With Find My

Courtesy of ESR

ESR Magnetic Wallet HaloLock With Find My for $40: Like Apple’s MagSafe wallet, this one has Find My support. You can use the flap on the back as a grip and fit two cards easily. It does require recharging with a proprietary cable, which is annoying, though it didn’t lose much battery life after six months. Too bad I’ve already lost the cable.

OtterBox Symmetry Series Cactus Leather MagSafe Wallet for $45: It’s nice and simple, thin, lightweight, has a strong hold on my phone case, and offers a dedicated fabric-covered slot at the bottom to push the cards out (I was able to fit three without much trouble). This OtterBox wallet is made from cactus-based leather, which feels nearly as luxurious as real leather. Just know that cactus leather isn’t as eco-friendly as it’s made out to be—these cases are still infused with layers of plastics.

Apple FineWoven MagSafe Case for $50: Any time the wallet is separated from your iPhone, you’ll get an alert and can track it in Apple’s Find My app. It has a single slot that can fit up to three cards, but to take the cards out, you have to remove it from your iPhone and push the cards up via the slot on the back. Unfortunately, Apple’s MagSafe wallets exclusively use the company’s proprietary FineWoven material (made of recycled materials). It’s a commendable effort to reduce reliance on leather production, but several WIRED reviewers have said the material doesn’t hold up all that well after some time.

Bluebonnet Minimalist Full-Grain Leather MagSafe Wallet Card Holder for $68: Bluebonnet’s wallet is thin, even with cards inside, and also comes with an elastic grip you can put your fingers through to hold the phone more securely. The magnets are stronger than those in other wallets I’ve tested, though the bottom moves a bit when using the grip. Bluebonnet claims it can fit up to three cards, but I’ve been able to fit only two (my license and debit card). It’s a struggle to insert or remove more than that.

Avoid This Wallet

Ohsnap! Snap Grip Wallet for $100: I had high hopes for this one, mainly because of its build quality. The wallet is aluminum, can hold up to eight cards (depending on whether they’re lettered or not), has MagSafe support, and comes with a grip that doubles as a kickstand. Unfortunately, the grip is made of plastic, and it broke after a short time (it won’t fold properly back into place). The magnetic hold isn’t as strong as other MagSafe wallets, even with a MagSafe-approved case on my phone. None of that is great, especially at this high price.

Benks 600D MagSafe Wallet with Stand for $33: The Benks 600D MagSafe wallet might be made with Kelvar, but it sure doesn’t feel like it. The inside shell of the wallet is made with plastic, and after just a day of use, I spotted a crack in that plastic right next to the hinge. Worse, I tried to apply a bit of pressure to see if the hinge would still hold up, which completely warped the MagSafe ring. Even without clear durability problems, this wallet wouldn’t make the top of the list. It’s reasonably priced at $30 and comes in a handful of attractive colors, but it’s limited to just three cards, and there’s no easy way to get them out.


Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.



Source link

Continue Reading

Tech

SolarWinds warns over dangerous RCE flaw | Computer Weekly

Published

on

SolarWinds warns over dangerous RCE flaw | Computer Weekly


SolarWinds is urging users of its Web Help Desk helpdesk ticketing and asset management software to ensure their instances are up-to-date after patching a newly-uncovered remote code execution (RCE) flaw.

Tracked as CVE-2025-26399, the bug bypasses a fix for a previous flaw, CVE-2024-28988, which was discovered and disclosed by Guy Lederfein of Trend Micro Security Research 12 months ago, in September 2024. However, in a twist reminiscent of the nursery rhyme about old ladies swallowing spiders to catch flies, CVE-2024-28988 itself bypassed a fix for a third issue, CVE-2024-28986.

Like the preceeding vulnerabilities, the latest issue once again takes the form of an unauthenticated AjaxProxy deserialisation RCE vulnerability that enables a threat actor to run commands on the host machine, should they succeed in exploiting it.

A warning from history

Computer Weekly understands that there is currently no evidence of any threat actors having exploited CVE-2025-26399 in the wild.

However, SolarWinds’ Web Help Desk tool is in extensive use at major enterprises and government and public sector bodies alike, and the earlier ‘versions’ of the new flaw were considered serious enough to be added to the Known Exploited Vulnerabilities catalogue run by the US’ Cybersecurity and Infrastructure Security Agency (CISA).

The addition of a bug to the KEV catalogue obliges all agencies of the federal civilian executive branch (FCEB) in the US to take action to address them in a specific timeframe, but the list also serves as a useful indicator of which flaws organisations should be prioritising to patch.

In light of this, it is highly-probable that CVE-2025-26399 will be targeted by threat actors in the very near future, if such activity has not already started.

Furthermore, the events of the 2020-2021 Solorigate/Sunburst incident impacting SolarWinds users also serves as a warning from history, according to Ryan Dewhurst, head of proactive threat intelligence at watchTowr, an exposure management specialist, who noted that SolarWinds is a name that “needs no introduction” in cyber security circles.

“The infamous supply chain attack… allowed months long access into multiple Western government agencies and left a lasting mark on the industry. Fast forward to 2024: an unauthenticated remote deserialisation vulnerability was patched… then patched again. And now, here we are with yet another addressing the very same flaw. Third time’s the charm?” said Dewhurst.

“The original bug was actively exploited in the wild, and while we’re not yet aware of active exploitation of this latest patch bypass, history suggests it’s only a matter of time.”

The Sunburst incident saw almost 20,000 SolarWinds customers download and install a malicious update to the firm’s Orion platform, with prominent victims including US government bodies such as the Department of Energy (DoE) and the National Nuclear Safety Administration (NNSA) that maintains America’s nuclear arsenal.

Earlier this year SolarWinds and the Securities and Exchange Commission (SEC) reached a settlement in principle resolving a case against the organisation and its security leadership over the circumstances that led to the compromise of Orion.



Source link

Continue Reading

Trending