Search This Blog

Friday, January 11, 2013

Best practices to mitigate DDoS attacks

  Ransom, implant attack highlight need for healthcare security | Better business-government teamwork needed to categorically fight cyberthreats
 
  Network World Security

Forward this to a Friend >>>


Best practices to mitigate DDoS attacks
The hactivist group Izz ad-Din al-Qassam Cyber Fighters is several weeks into Operation Ababil 2, and, as promised, is once again directing distributed denial-of-service (DDoS) attacks at U.S. banks. The group has vowed to continue disrupting online and mobile banking sites until all instances of the movie "Innocence of Muslims" are removed from YouTube. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

WEBCAST: Navisite

Desktops as a Service: Sorting Fact From Fiction
This webcast looks at the realities of taking desktops to the cloud in a reliable, manageable way. It explores the role of virtualization and hosted services while examining the intricacies of Microsoft licensing. It's a must-see event for anyone looking to leverage the realities of DaaS. View now.

Ransom, implant attack highlight need for healthcare security
Healthcare data breaches are all bad, and reaching epidemic levels. But the raw statistics are only a piece of the story. Read More

Better business-government teamwork needed to categorically fight cyberthreats
The Business Roundtable, the association of 210 chief executive officers whose companies account for more than $7.3 trillion in annual revenues and 16 million employees, today said that cyberthreats to their businesses have become so severe, a new way of sharing real time security information needs to be set up among companies and with the U.S. government. Read More


WEBCAST: Meru Networks

Impact of 802.11ac on WLAN
In this webinar, industry expert Craig Mathias and Robert Crisp from Meru Networks will discuss the impact 802.11ac will have on enterprise WLAN networks and how to best prepare for it. Learn more.

Voice 'fingerprints' may plug call-center security leaks
You've heard such stories. Mat Honan, a reporter for Wired magazine had almost his entire digital life erased when a fraudster used social media account information to trick Apple and Google into allowing him access to Honan's account information. Read More

Botnets for hire likely used in attacks against US banks, security firm says
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions -- thought by some to be the work of Iran -- are using botnets for hire. Read More


WHITE PAPER: HP

Building modern, virtualization-optimized data centers
HP offers a flexible, virtualization-optimized data center network architecture that requires far fewer devices, interconnections, layers, and discrete appliances. HP Networking solutions streamline network operations and accelerate application and service delivery; reduce space, power, cooling, and capital requirements. View Now

IBM cements 20 years of patent dominance
IBM earned 6,478 utility patents last year, topping the list of patent winners for the 20th year in a row, according to data from IFI CLAIMS Patent Services. With its record haul, Big Blue bested its 2011 patent tally by 5%. Read More

U.S. bank cyberattacks reflect 'frightening' new era
Cyberattacks on U.S. banks over the last several months reflect a frightening new era in cyberwarfare that corporations are unprepared to battle because of a shortage of experts skilled in building effective defenses, one security expert says. Read More

 
 
 

SLIDESHOWS

Best of CES 2013: In pictures
Here's what's grabbing our attention right now at the sprawling CES 2013 gadget show in Las Vegas.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Worst CEO' list calls out Zynga's Pincus, Zuckerberg's 'hoodie mentality'
  2. Cool iOS accessories for iPhone and iPad unveiled at CES 2013
  3. Amazon's cloud hiccups, again
  4. Extreme Networks cutting 13% of workforce
  5. Five smartphone trends from Las Vegas
  6. Best of CES 2013: in pictures
  7. 12 must-watch security startups for 2013
  8. 10 wireless charging technologies on display at CES 2013
  9. Voice 'fingerprints' may plug call-center security leaks
  10. 8 classic IT hiring mistakes and how to avoid them
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: