Search This Blog

Wednesday, October 24, 2012

Baddest Botnets of 2012

  Gartner: Top 10 strategic technology trends for 2013 | Cybercriminals sell access to compromised corporate systems
 
  Network World Security

Forward this to a Friend >>>


Baddest Botnets of 2012
According to security firm Kindsight, these are the Top Ten Worst Botnets this year. Read More


RESOURCE COMPLIMENTS OF: LexisNexis

Fraud is changing. Are you keeping up?
As fraud tactics evolve, so should your security processes and solutions. Stay up to date on the latest in identity management, authentication and fraud, plus the integrated technologies that help you better protect your customers and infrastructure, with the LexisNexis® Identity Management eNewsletter. Put more I.D. in IT, starting today. Get the eNewsletter Now >>

WHITE PAPER: McAfee

Blueprint to Secure Cloud-Based Communications
Secure cloud-based communications with a risk-based approach that helps businesses to safely use web and email channels, protect against data leakage and intellectual property loss, and reduce support and audit costs. Download the technology blueprint now. Learn more.

Gartner: Top 10 strategic technology trends for 2013
If some of the top 10 strategic technology trends going into 2013 look familiar it's because quite a few -- like cloud computing and mobile trends -- have been around for awhile but are now either morphing or changing in ways that will continue to impact IT in the next year. Read More

Cybercriminals sell access to compromised corporate systems
A service discovered in the criminal underground is renting access to thousands of corporate servers that have been hacked through Windows software that lets people control computers remotely over the Internet. Read More


WHITE PAPER: Riverbed

How to Improve Data Center Security while Reducing Sprawl
Download this useful case study to learn how organization's like yours have benefitted from improved data security and performance through snapshotting, encryption, and removal of storage media from remote offices. Learn more.

Web still king, but email stages scam comeback
Trust, but verify. That was the motto of President Ronald Reagan. It also ought to be the motto of everyone who uses email. Read More

Mobile devices still poorly secured, survey finds - nobody shocked
Anyone with doubts about BYOD look away now. A new survey has found that almost half of mobile users still employ no security despite the fact that many devices are used to access and store corporate email. Read More


WHITE PAPER: Websense, Inc.

Websense Threat Report 2012
ocial networking continues to dominate communications as mobility and cloud computing extend security perimeters into devices, networks, and apps that we no longer control. What is left in our control is our data, and the shift to risk management and defenses to protect confidential data is urgent and imperative. Read Now!

Presidential debate disappointing from cybersecurity perspective?
In the third and final presidential debate, from Lynn University in Boca Raton, Florida, the focus was supposed to be on foreign policy. When talking national security, about the military and foreign policy, it seemed like a great time to bring up cyberspace as the fifth domain for cyber-warfare and actual cyberwar, cybersecurity and cyber-weapons. Read More

Amazon outage started small, snowballed into 12-hour event
Amazon Web Services has almost fully recovered from a more than 12-hour event that appears to have started by only impacting a small number of customers but quickly snowballed into a larger issue that took down major sites including Reddit, Imgur and others yesterday. Read More

FTC sets facial recognition software best practices
If facial recognition software is a big part of your company's security system you might want to take a look at a new report from the Federal Trade Commission which outlines personal privacy protection company's that use the technology should employ. The FTC report recommends for example: Read More

Big Brother comes to BitTorrent
Lots of people download movies and TV episodes off the various BitTorrent networks. That's always been asking for trouble, but it's about to become a lot more dangerous. Read More

 
 
 

SLIDESHOWS

Top 10 tech gadgets of 2012
Here are 10 that made a significant impact in the industry this year.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Amazon EBS failure brings down Reddit, Imgur, others
  2. Country's largest 4-year university expels Cisco, saves $100 million
  3. Gartner: 10 critical IT trends for the next five years
  4. U.S. government agency drops BlackBerry in favor of iPhone
  5. Top 10 tech gadgets of 2012
  6. 10 things you can get from Windows 8 that Windows 7 just doesn't have
  7. Ubuntu 12.10 review: Quantal Quetzal is quite adequate
  8. .xxx to launch porn search engine
  9. '80 Mbytes of storage for under $12K!' and other IT ad favorites through the years
  10. Motorola HC1: Google Goggles for the enterprise
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: