Search This Blog

Monday, December 03, 2012

New extortion scheme using Citadel malware invokes Internet Crime Complaint Center

  DARPA program aims to find, shut backdoor, malware holes in commercial IT devices | Hacktivism gets attention, but not much long-term change
 
  Network World Security

Forward this to a Friend >>>


New extortion scheme using Citadel malware invokes Internet Crime Complaint Center
The Internet Crime Complaint Center, a partnership with the FBI, today issued a warning about an uptick in a new version of Citadel malware that uses the IC3's good name to try and extort money from victims. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

DARPA program aims to find, shut backdoor, malware holes in commercial IT devices
It is likely every security IT person's nightmare: the new mobile phone, network router or computer they just tied into the network actually has a secret backdoor that lets the malicious users or governments have unfettered access to the company's assets. Read More

Hacktivism gets attention, but not much long-term change
Latest break-in at International Atomic Energy Agency highlights that the public still doesn't buy criminal acts in support of 'good causes' Read More

VA still lags on encryption
Six years after major data breach, a report finds the agency has only 16 percent of its computers running encryption software Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

The Top 10 Priorities for CIOs in 2013
As we head into the new year, IDG Enterprise CEO Michael Friedenberg pairs his list of favorite quotes with questions to spark your thinking Read More

Large IT departments lose cloud control
Large IT departments are losing control of cloud strategies as cloud services become more mature in the market, according to research from Capgemini. Read More

Want to develop cybersecurity skills? Try SANS Institute's NetWars
If you think you might like to add some new skills to your resume, put cybersecurity on the list. SANS Institute has an intense, hands-on training program that develops your skills while allowing you to compete against others to test your mettle. Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Disturbing lack of disturbing tech vendor tchotchkes in 2012!
As the year winds down, it strikes me that 2012 has been the weakest year in memory for weird tech vendor tchotchkes. Take your NASDAQ numbers this and VC spending that, but tchotchke distribution and holiday party extravagance are really the main industry indictors worth watching. Read More

'Spear phishing' the main email attachment threat
Some 91 percent of cyber attacks begin with a "spear phishing" email, according to research from security software firm Trend Micro. Read More

Mobile browser vulnerability lets hackers steal cloud computing time
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of Oregon. Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Chinese media attack Cisco
  2. Consumer Reports names AT&T worst mobile service provider
  3. Cisco's internal security team fights to corral BYOD, malware and Wild West environment
  4. Microsoft tweaks, then silences IE haters
  5. Microsoft Surface RT or Surface Pro?
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. 14 of the most useful Linux websites
  8. New Linux smartphone OS 'Sailfish' passes the test
  9. 10 hard truths IT must learn to accept
  10. Android Jelly Bean resurrected my HP Touchpad
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: