Search This Blog

Friday, March 02, 2012

How to catch an Internet cyber thief

Stolen NASA laptop held Space Station control algorithms | ATM PIN Numbers: Easier to Steal than You Think

Network World Security

Forward this to a Friend >>>


How to catch an Internet cyber thief
They're out there, says security researchers: the Chinese hackers attempting to break into U.S. enterprises, and jihadist terrorists that brazenly post videos of sniper killings, while stealing credit-cards to launder money for funding nefarious campaigns in Mideast or Caucasus hot spots. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
If you thought that public cloud providers protect your cloud servers from harmful intrusions and other security threats - think again. The burden of securing your cloud servers typically rests with you. Register today to secure 25 cloud servers for free with the award-winning CloudPassage Halo.

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Stolen NASA laptop held Space Station control algorithms
The lack of key IT security protection is hurting NASA. According to a report issued by NASA Inspector General Paul Martin, security problems have gotten so bad that the March 2011 theft of an unencrypted NASA notebook computer resulted in the loss of the algorithms used to command and control the International Space Station. Read More

ATM PIN Numbers: Easier to Steal than You Think
Researchers find that a smart bad guy has a one-in-10 chance of guessing the PIN that guards your bank account. Read More

Tablets With Serious Security for Business
These tablets have extra security features that will keep your work safe and your IT pros happy. Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

NASA squandering technology commercialization opportunities
The commercialization of all manner of space technologies has always been a forte of NASA, but the space agency faces a number of economic and internal challenges if that success is to continue. Read More

Security experts debate if markets or legal liability will ensure secure software
Consumer desire for unnecessary features has encouraged the development of insecure and unreliable software products, said Tenable Network Security CSO Marcus Ranum, during a debate on Wednesday about software liability at the RSA security conference in San Francisco. Read More

Facebook and Twitter criticised over iPad 3 scams
A security expert has criticised Facebook, Twitter and other social networks for letting scammers lure unsuspecting surfers by using the as-yet-unannounced iPad 3 as bait. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

Remote access tools a growing threat to smartphones
Malware tools that allow attackers to gain complete remote control of smartphones have become a serious threat to users around the world, researchers told an overflow RSA conference audience. Read More

12 seriously cool "toys" for big boys and girls
Big Boys Toys exhibition tempts your inner child Read More

Women Take Social Privacy More Seriously Than Men Do
Social media privacy awareness is increasing among Americans, according to a new study. However in the battle of the sexes, women trump men when it comes to locking down the privacy of profiles. Read More

BYOD: IT claims security fears but blocks Angry Birds instead
Zenprise survey of what policies businesses actually apply to smartphones and tablets yields surprising conclusions Read More

CSO's Ultimate Guide to Social Engineering
Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your online privacy
  2. Mozilla's 'modest proposal': Dump the smartphone OS
  3. Juniper targeting 7 key market segments
  4. iPad 3 concept video: How Apple could really blow us away
  5. Microsoft's Azure cloud suffers serious outage
  6. Microsoft unveils Windows 8 "Consumer Preview," downloads start
  7. NSA defines smartphone strategy: Think Android (maybe)
  8. Speedy 802.11ac Wi-Fi set for fast, wide rollout
  9. Alleged RSA crypto flaw hotly debated
  10. iPad 3 rumor rollup for the week ending Feb. 28

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: