Search This Blog

Friday, December 09, 2011

By the numbers: How dangerous are Facebook, Twitter, and search engines (really)?

US charges Romanians in multimillion dollar point-of-sale hack scheme | Smartphone Theft Starts Early

Network World Security

Forward this to a Friend >>>


By the numbers: How dangerous are Facebook, Twitter, and search engines (really)?
In his presentation titled "The dark side: Measuring and analyzing malicious activity on Twitter and Facebook," Daniel Peck, research scientist with Barracuda Networks, delves into the details of how cybercriminals trap people on social networks. Peck's research also uncovered that user perceptions of social networking security contrasts drastically with actual membership rates, which you can read about in Facebook may be scary, but we love it anyway. Read More


WHITE PAPER: FireEye

5 Methods to Disrupt Next- Gen Threats
Relying on signatures and lists are ineffective when trying to combat advanced malware threats. Discover how to augment existing firewalls, IPS and Web gateways with technology that recognizes new attacks in real-time without requiring prior knowledge of vulnerability, exploit or variant and then prevents system compromise and data theft. Read now.

WHITE PAPER: FireEye

Attacks get through 95% of networks
Advanced Malware Exposed is a 20+ page ebook providing a broad overview on the major aspects of advanced malware, its underpinnings, its impact on modern business practices, and briefly suggests possible solutions. Read now!

US charges Romanians in multimillion dollar point-of-sale hack scheme
The US Department of Justice said four Romanian nationals have between indicted for allegedly operating a massive, multimillion dollar point-of-sale hacking scheme. According to the federal indictment, from approximately 2008 until May 2011, the four men conspired to remotely hack into more than 200 US-based merchants' point-of-sale or "checkout" computer systems in order to steal customers' credit,... Read More

Smartphone Theft Starts Early
Kids snatch a smartphone like veteran thieves, and they're only going to get better and more dangerous. Read More

Social networking, ignorance, and apathy
Social networking services really do a bad job with managing our privacy ... and the problem apparently is that we and they don't know and don't care to fix it Read More

25 top network and IT industry news stories of 2011
2011 will be remembered for Jobs' death, Cisco's refocusing, IPv6's coming out party and more Read More


WHITE PAPER: UPS

UPS Study: Asia High-Tech Supply Chains Prep For Change
Learn about the findings in "Change in the Chain," a 2011 study sponsored by UPS, exploring how high-tech supply chain professionals in the Asia-Pacific region are handling risk management, supply sourcing, sustainability, cost management and customer service in this evolving industry. Read Now

Can Russia save future NASA, European Space Agency Mars missions?
NASA and the European Space Agency (ESA) said they are looking at bringing on the Russian Federal Space Agency (Roscosmos) as a partner in the planned NASA-ESA Mars mission known as Exo Mars. Read More

Java apps have most flaws, Cobol apps the least, study finds
There is a lot of badly engineered software in the world that's creating a lot of risk to businesses and organizations, and accumulating so-called 'technical debt.' Read More

Feds launch cloud security standards program
Federal agencies will soon have a government-wide security standard for assessing, authorizing and monitoring cloud products and services. Read More

Picture this: Steve Jobs gets bronzed
Software maker has commissioned a life-size sculpture of Apple's Steve Jobs Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

CNET Accused of Wrapping Malware in Windows Installer for Nmap Security Tool
Some in the security community are currently ticked, at least disgusted, in regard to the pen-testing Network Mapping tool Nmap after Gordon Lyon, better known as Fyodor, announced on Seclists that C|Net Download.Com is now bundling Nmap with malware! Read More

IPS: Best of breed or integrated solution?
The age old question about whether to go with best-of-breed products or integrated solutions is particularly salient when it comes to intrusion-prevention systems. Security is an area where you need the best possible point product, the best of breed folks argue. But the evolved threats require a more holistic view that can only be achieved by taking more factors into account, the integrated solution suppliers counter. Who is right? You decide. Read More

Facebook Privacy Tip: How to Disable Sharing in Social Reader Apps
Some Facebook users are unintentionally broadcasting their reading habits to their network. Here's how to find out if you've added one of these social reading apps and how to adjust your privacy settings. Read More

Security roundup for week ending Dec. 2: Carrier IQ stink, SCADA troubles
If a cyberattack from a hostile foreign source ever hit a public electric or water utility, affecting its industrial control systems, causing America's critical infrastructures to fail, would we understand that had even happened? We have more doubts than ever, after every twist and turn in the saga that began with the Nov. 10 "Public Water District Cyber Intrusion" report from the Illinois Statewide Terrorism & Intelligence Center (STIC) that set off a media firestorm after the report was leaked to the media. Read More



SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. CNET accused of wrapping malware in Windows installer for Nmap security tool
  2. 10 most powerful cloud companies
  3. 25 top network and IT industry news stories of 2011
  4. Picture this: Steve Jobs gets bronzed
  5. What's really going on with Carrier IQ on your phone
  6. FAQ: CNET's "Trojan" installer
  7. IPS: Best of breed or integrated solution?
  8. New Cisco cloud computing framework pushes management, collaboration
  9. Cloud computing disrupts the vendor landscape
  10. Microsoft slates Windows 8 beta for late February 2012

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: