Search This Blog

Thursday, December 20, 2012

World of botnet cybercrime paying pretty well these days

  Linux servers targeted by new drive-by iFrame attack | End of an era: Kodak sells patent portfolio for $525 million
 
  Network World Security

Forward this to a Friend >>>


World of botnet cybercrime paying pretty well these days
The world of cybercrime is getting more specialized as an eco-sphere of helpers in running botnet operations has developed, according to one security researcher who spent over a year monitoring online forums and communities. Read More


WEBCAST: Hortonworks

Apache Hadoop Just Got Simpler
Hortonworks recently unveiled the Hortonworks Data Platform (HDP), which is 100% open source data management software powered by Apache Hadoop. HDP makes Hadoop easier to install, integrate, manage and use for enterprises and solution providers. View Now

WEBCAST: Meru Networks

Impact of 802.11ac on WLAN
In this webinar, industry expert Craig Mathias and Robert Crisp from Meru Networks will discuss the impact 802.11ac will have on enterprise WLAN networks and how to best prepare for it. Learn more.

Linux servers targeted by new drive-by iFrame attack
A new Linux iFrame attack has been spotted, this time one attempting to infect its victims with the Zeus/Zbot bank login stealer, security firm ESET has reported. Read More

End of an era: Kodak sells patent portfolio for $525 million
With an eye toward emerging from bankruptcy in 2013 Kodak today said it sold its formidable patent portfolio for $525 million to a consortium that will ultimately license pieces of the collection to other companies such as Apple, Google and Facebook. Read More

Oracle's Java security update lacking, experts say
Oracle's latest update of the Java Development Kit fails to go far enough in fixing the security-troubled platform, bringing only marginal improvements instead, experts say. Read More


WHITE PAPER: Trend Micro

Solution Path: Threats and Vulnerabilities
This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Read Now

Dexter malware's source still unknown, connection to Zeus disputed
The Dexter malware is not a serial killer, like in the Showtime drama of the same name, but it amounts to a serial cyber Grinch, stealing Christmas from possibly tens of thousands of people through making it possible for criminals to clone their credit cards. Read More

The 2012 tech news quiz
From the Facebook IPO to McAfee on the run to the much needed iPad Mini, 2012 has been a busy and wild year in technology Read More

Boeing uses 20,000 lbs. of potatoes to check aircraft wireless network signals
Boeing calls it Project SPUDS or rather Synthetic Personnel Using Dielectric Substitution - that is, using sacks of potatoes perched on aircraft seats to test the effectiveness of wireless signal in an airliner cabin. Boeing said it was researching an advanced way to test wireless signals in airplane and needed a way to effectively simulate say 200-300 people sitting in seats throughout the aircraft.... Read More


WHITE PAPER: Ipswitch, Inc

Are Employees Putting Your Company's Data at Risk?
This research report exposes critical risks most organizations face related to how employees transfer files to/from other employees, partners and customers. You will learn the challenges most organizations face today and tips about how to best ensure security of confidential data and information. Learn More.

Man who hacked celebrity email accounts sentenced to prison
Christopher Chaney, a Florida man who admitted to illegally accessing email accounts belonging to more than four dozen celebrities, was sentenced to 10 years in federal prison on Monday. Read More

US FTC strengthens online children's privacy rules
Websites, mobile apps and online advertising networks targeting children will be required to follow new privacy regulations, including getting a parent's permission before collecting geolocation information and photographs from kids, under new rules announced Wednesday by the U.S. Federal Trade Commission. Read More

Trend Micro updates security app to detect Samsung attacks
Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory. Read More

7 Technologies Poised for Failure in 2013
Which technologies and products will be put out to pasture in 2013? Some are no-brainers, some others might say are poised for a comeback and a couple might surprise you. Read More

Amid uproar, Instagram says it will not sell users' photos
Instagram vowed on Tuesday to revise new proposed terms of service following a strong backlash from users worried that it would use their photos in advertisements without their permission. Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 15 free security tools you should try
  2. 10 technologies that disappointed in 2012
  3. Cisco makes fourth acquisition in a month
  4. 10 of the most useful cloud databases
  5. 7 technologies poised for failure in 2013
  6. Juniper CEO Johnson talks software, the company's recent challenges and key future directions
  7. 10 most successful open source projects of 2012
  8. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  9. How removing 386 support in Linux will destroy the world
  10. 16 of the most useful cloud management tools
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: