Search This Blog

Thursday, May 16, 2013

Is Microsoft power-snooping on Skype conversations?

  DHS wants iOS or Windows-based biometric devices for rapid, remote identification of bad guys | Researchers uncover large cyberfraud operation targeting Australian bank customers
 
  Network World Security

Forward this to a Friend >>>


Is Microsoft power-snooping on Skype conversations?
First there were reports that made it sound as if a kindergartener could easily social engineer Skype Support to hijack accounts. Now, holy wowza, a German publisher is claiming that Microsoft is power-snooping on Skype conversations. Read More


WEBCAST: Cisco, Dell/Sonic Wall, HP, McAfee, Sophos, Stonesoft

How to stop the Bad Guy
Industry analyst Robin Layland, Mike Nielsen from Cisco and Darren Suprina of Stonesoft explore how Next Generation Firewalls can handle the new generation of advanced evasion techniques, hackers and threats. View Now

WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

DHS wants iOS or Windows-based biometric devices for rapid, remote identification of bad guys
The Department of Homeland Security recently put out a call to the wireless industry looking for information on the best biometric technology available for mobile devices that could help it quickly identify suspects in the field. The DHS said it is the devices need to be capable of obtaining biometric (fingerprints and facial recognition) and biographic information and communicating wirelessly through... Read More

Researchers uncover large cyberfraud operation targeting Australian bank customers
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Read More


WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

Mobile adware networks given 45 days to stop misbehaving by security firm
Misbehaving adware buried inside mobile apps has turned into such a problem that security vendor Lookout Mobile Security has published a deadline for networks to change their behaviour or face being blacklisted. Read More

FBI briefs US bank executives on wave of cyberattacks
The FBI has reportedly briefed US bank executives on a wave of cyberattacks that have lashed the industry since last summer as part of a new policy designed to foster co-operation between the state and private sectors. Read More


WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

State social media privacy laws a mixed bag for businesses
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses. Read More

Companies, government unprepared for new wave of cybersabotage
A new wave of cyberattacks reportedly aimed at industrial control systems comes at a time when private companies and government are still struggling to protect the nation's critical infrastructure, experts say. Read More

Feds' offensive fueling hacker underground, report says
The U.S. government is contributing to the Internet's underground economy by scooping up hacker tools to incorporate into offensive cyber weapons, a report from Reuters says. Read More

INSIDER
7 steps to securing Java
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, navigation systems, games and medical devices. Read More

 
 
 

SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 things BlackBerry Z10 does that iPhone can't

2. View from inside Verizon's security SWAT team

3. Nick Carr's 'IT doesn't matter' still matters

10. 7 steps to securing Java

8. Online gaming company recounts fighting for survival vs. DDoS attacks

9. iTunes: Still slowing down Windows PCs after all these years

6. Verizon Enterprise chief: We're headed for cloud computing's A-list

5. I ditched Windows 8 and went Ubuntu by mistake

4. Melinda Gates tells Duke grads: It's all about your real connections

7. iPhone 6 rumor rollup for the week ending May 3

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: