Search This Blog

Monday, April 22, 2013

An inside look at the fraud blight

  Browsers pose the greatest threat to enterprise, Microsoft reports | New version of Gozi financial malware bundles MBR rootkit
 
  Network World Security

Forward this to a Friend >>>


An inside look at the fraud blight
While the Internet opens up a world of e-commerce it continues to be a playground for delinquents to commit fraud - which is just part of an almost unbelievable trend that found 25.6 million adults - 10.8% of the adult population - hit by the crime in 2011. [RELATED: FTC: Identity theft retains its throne as No.1 worst scourge in Top 10 consumer complaint list] Read More


WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

Browsers pose the greatest threat to enterprise, Microsoft reports
Microsoft's latest security report has found that Web-based attacks pose the greatest threat to companies, giving credence to efforts to develop browser alternatives to accessing the Internet. Read More

New version of Gozi financial malware bundles MBR rootkit
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Former LulzSec member gets prison sentence for Sony Pictures hack
Cody Andrew Kretsinger, a 25-year-old man from Decatur, Illinois, was sentenced Thursday to one year in federal prison for his role in a May 2011 breach of a Sony Pictures website and database. Read More

How to track a lost computer with Find My Mac
If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen. Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Ahead of their time: 9 technologies that came too soon
Sometimes you build it, and they end up not coming. Read More

10 nifty Windows 8 apps -- all free
Need help negotiating the corporate landscape? Want to track your network usage? Just looking for a fun little time-waster? These free apps for Windows 8 can help. Read More

OpenStack's hottest products right now
As the OpenStack Summit is underway in Portland, Ore., this week, a variety of companies are making product and services news at the show Read More

 
 
 

SLIDESHOWS

How to solve Windows 8 crashes

Like any computer operating system, Windows 8 can fall over. Luckily, there is an easy way to diagnose the cause of most crashes.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. House approves CISPA over privacy objections

2. Popular home routers contain critical security vulnerabilities

3. Reddit reports it is under 'malicious DDoS attack'

10. User picks: 7 hot iPad apps for business

9. Google cloud open for business -- includes $400 cover charge

6. Reddit co-founder calls out Google, Twitter, Facebook over CISPA

5. How to solve Windows 8 crashes

4. Samsung fights dirty with misleading claims against HTC

7. iPad 5 rumor rollup for the week ending April 17

8. iPad saves a man's face, takes a foul ball for the team

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: