Search This Blog

Friday, May 31, 2013

Phishing gang jailed for plundering woman's $1.6 million life savings

  Products of the week 5.27.13 | Liberty Reserve bust hits cybercriminals where it hurts
 
  Network World Compliance

Forward this to a Friend >>>


Phishing gang jailed for plundering woman's $1.6 million life savings
A heartless phishing gang that stole and frittered a British woman's entire $1.6 million life savings on items including "gold and cheeseburgers" have been handed heavy sentences by a judge at London's Southwark Crown Court. Read More


WHITE PAPER: RSA, The Security Division of EMC

Authentication and Identity Management
Analyst firm, CEB TowerGroup, recently conducted an independent analysis of the leading authentication solutions providers to help decision makers identify key components of a technology investment decision and effectively compare vendor technology products. Download their latest report to learn more. Learn more.

WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Products of the week 5.27.13
Our roundup of intriguing new products from companies such as F5 Networks and Dell Read More

Liberty Reserve bust hits cybercriminals where it hurts
Shutting down what is believed to be the biggest online money laundering organization will make it a lot harder for cybercriminals to operate Read More

Gartner security report: McAfee up, Trend Micro down
A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6% of the $19.1 billion market. Read More


WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary
Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

University fined $400,000 after disabled firewall put medical records at risk
A medical facility run by Idaho State University (ISU) has been fined $400,000 (APS266,000) after thousands of patient records were left in an unprotected state when firewall monitoring was disabled. Read More

Timely malware: How spammers turn a profit from our misfortune
AVG research reveals hackers becoming increasingly sophisticated at capitalising on tragedies to lure in victims Read More

10 BYOD Worker Types
The BYOD (bring your own device) movement affects everyone at a company, from CEO on down to the hourly worker. Here are 10 of the most common worker types taking shape in the new BYOD workplace. Read More


WHITE PAPER: F5 Networks

Stop Frequent DDoS Attacks Before the Damage Is Done
This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while securely delivering applications and protecting the network, the session, and the user. Read Now.

Microsoft plugs security systems into its worldwide cloud
In a move designed to starve botnets where they live, Microsoft launched a program on Tuesday to plug its security intelligence systems into its global cloud, Azure. Read More

When malware strikes: How to clean an infected PC
You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questionable Web sites. You don't open suspicious email attachments. You keep Java, Flash, and Adobe Reader up-to-date--or better yet, you learn to live without them. Read More

Signature-Based Endpoint Security on Its Way Out
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs. Read More

FAQ on global supply-chain security standard to prevent IT tampering, counterfeiting
Whether you're buying or selling hardware and software, or acting as systems integrator, the new supply-chain security standard put forward by the Open Group in April could end up having a huge impact on you. Here are a few frequently asked questions that explain why. Read More

The 20 best iPhone/iPad games of 2013 so far
Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games Read More

 
 
 

SLIDESHOWS

The 20 best iPhone/iPad games of 2013 so far

Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Look out, Google Fiber -- scientists build 400G connection

2. Microsoft's opening act since Windows 95: Weezer

3. Why teenage girl's smartphone battery breakthrough may never see daylight

10. First look: Gmail's latest redesign

8. The cloud goes global

9. 12 must-play Android games

7. How to integrate Skype with Microsoft Lync

4. Microsoft wheels out 256GB Surface Pro tablet -- in Japan

6. 10 tech patents that should have been rejected

5. Rude and overworked? Blame tech

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: