Search This Blog

Monday, March 04, 2013

Hackers use corporate attacks as staging grounds for other cyber assaults

  Researchers warn of new Java exploit being used by attackers | MIT panel warns of challenges of hyper-networked world
 
  Network World Security

Forward this to a Friend >>>


Hackers use corporate attacks as staging grounds for other cyber assaults
Attackers have invaded corporate networks to steal sensitive data and use them as staging grounds to attack other corporate networks — and IT managers detecting these invaders may find yet another surprise: law enforcement lurking in their networks monitoring it all as part of a cyber-sting. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

Researchers warn of new Java exploit being used by attackers
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. Read More

MIT panel warns of challenges of hyper-networked world
A panel discussion held at MIT this week hailed major advances in networking technology, but warned that the challenges facing the world's information infrastructure are severe. Read More

Why mobile security is a systemic problem
There has been considerable hype around each mobile threat vector that has emerged in the last year, but what's often overlooked is how mobile security is currently approached. What's particularly troubling is how reactionary responses have been to these threats, whether it be from Android apps with major flaws in their SSL implementations or the recent airport VPN Trojan. Read More


WHITE PAPER: Dell SonicWall

The Threat Of Social Media
This eBook describes some of the social media dangers, provides tips for staying safe with social media and explains how Dell SonicWALL can help ensure your online safety. Must Read Now!

Are we now living in a post-crypto world?
It may be time to brace yourself for the post-crypto world, according to Adi Shamir, one of the founding fathers of public-key cryptology. Shamir's comments came at this week's RSA Security conference. Read More

Federal CIOs Still Say No to BYOD
Government IT leaders who oversee sensitive or classified information require firm device-management policies to address security concerns before they will even consider allowing workers' personal smartphones and tablets behind the firewall. Read More

Japanese agency warns of information-stealing Android porn app
A Japanese Internet security agency has issued a public warning about Android apps that offer free images of scantily clad models to trick users into giving up their personal details. Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

NASA's hot radiation mission
NASA is set to launch its Radiation Belt Storm Probes (RBSP) to explore the most intense areas of radiation around Earth - See more at: http://www.networkworld.com/slideshow/62234/nasas-hot-radiation-mission.html#sthash.tuKOEXxO.dpuf Read More

IT security managers too focused on compliance, experts say
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Read More

Islamic group promises to resume U.S. bank cyberattacks
An Islamic group that has claimed responsibility for several waves of attacks on major U.S. banks since last September has promised to resume its assault next week using a lot more firepower. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor round up for the week ending March 1

2. iPhone 6 concept designs keep popping up

3. Is Yahoo's telework ban shortsighted or savvy? Data says both

9. Cisco joins top 5 server vendors for the first time, IDC says

4. Google privacy chief blasts Microsoft's 'Scroogled' campaign at RSA Conference

5. iPad 5 rumor rollup for the period ending Feb. 27

6. The best BlackBerry 10 apps

7. Hottest products at Mobile World Congress 2013

8. Patent trolls may suffer a death blow, thanks to podcasters

10. MIT panel warns of challenges of hyper-networked world

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: