Search This Blog

Wednesday, January 02, 2013

Critical Infrastructure Malware Infections: From ICS-CERT report to SCADA Strangelove

  Growing confidence in cloud security | From Doomsday to James Bond to NASA's last mainframe: The year in hot Layer 8 blog posts
 
  Network World Security

Forward this to a Friend >>>


Critical Infrastructure Malware Infections: From ICS-CERT report to SCADA Strangelove
The Department of Homeland Security's Cyber Emergency Response Team for Industrial Control Systems (ICS-CERT) reported that during the fiscal year 2012, it "responded to 198 cyber incidents." 41% of the attacks were against the energy sector followed by 15% of incidents targeting the water sector. This does not include the Springfield Illinois water utility that was reportedly hacked via an IP located... Read More


WHITE PAPER: Trend Micro

Solution Path: Threats and Vulnerabilities
This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Read Now

WHITE PAPER: Trend Micro

Solution Path: Threats and Vulnerabilities
This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Read Now

Growing confidence in cloud security
Cloud computing is blowing into 2013 on the winds of confidence, with IT professionals increasingly convinced that the security controls are adequate, but still very, very leery. Read More

From Doomsday to James Bond to NASA's last mainframe: The year in hot Layer 8 blog posts
As we wind down another year we give thanks, mostly, that we are still here to enjoy a look back at what were the hottest posts in this space for 2012. Read More

Microsoft confirms zero-day bug in IE6, IE7 and IE8
Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain an unpatched bug -- or "zero-day" vulnerability -- that is being used by attackers to hijack victims' Windows computers. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Researchers find malware targeting Java HTTP servers
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems. Read More

China tightens grip on Internet use with identity requirement
China's government will require Internet users to identify themselves to service providers when they sign up for Internet access, according to the official Xinhua news agency. Read More

Drones, phones and other 2012 privacy threats
Verizon's attempt -- unsuccessful so far -- to secure a patent for a so-called 'snooping technology,' which in this case would let television advertisers target individual viewers based on what they're doing or saying in front of their sets, capped another challenging year for privacy advocates. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Security in 2013: The rise of mobile malware and fall of hacktivism
It's always fun this time of year to look back on the year we're about to leave behind, and to make some predictions about what we might expect the year ahead to look like. We already have a comprehensive look back at the biggest security stories of 2012, and now here's a look at some trends to watch for 2013. Read More

Chrome 25 will disable 'silently installed' extensions
Starting with version 25 of Google Chrome, browser extensions installed offline by other applications will not be enabled until users give their permission through a dialog box in the browser interface. Read More

The 4 leading causes of data security breakdowns
A string of high-profile data breaches in 2012, from LinkedIn to Global Payments, have kept enterprise data security in the limelight. But most organizations still tend to be reactive and focus on firefighting when it comes to data security, rather than implementing a more effective long-term strategy. Let's examine the four most common pitfalls of this short-sighted approach. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. VMware, the bell tools for thee, and Microsoft is ringing it
  2. Amazon EBS failure brings down Reddit, Imgur, others
  3. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  4. How to solve Windows system crashes in minutes
  5. Earliest known photos of an Apple iPad prototype
  6. Super Bowl super bust: U.S. seizes 307 websites
  7. Microsoft code contains the phrase 'big boobs'
  8. How to hack your own Wi-Fi network
  9. Want a job? Get a computer science degree
  10. No, Wikipedia has not forgiven GoDaddy for backing SOPA
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: