Search This Blog

Friday, May 24, 2013

Researchers find more versions of digitally signed Mac OS X spyware

  IT security vendors seen as clueless on industrial control systems | SoftBank said to be in talks with US to allay national security fears
 
  Network World Security

Forward this to a Friend >>>


Researchers find more versions of digitally signed Mac OS X spyware
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. Read More


RESOURCE COMPLIMENTS OF: KnowBe4

How big is your 'phishing attack surface'?
Many email addresses of your organization are exposed, allowing cybercriminals to launch spear-phishing attacks. The bigger the attack footprint, the higher your risk. Fill out the form and we'll email you the list of exposed addresses. Sign up for your FREE EEC now

WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

IT security vendors seen as clueless on industrial control systems
Many IT security vendors have a minimal understanding of industrial control systems (ICS) and try to sell technology that could easily damage the devices found in plants running the nation's critical infrastructure, experts say. Read More

SoftBank said to be in talks with US to allay national security fears
The U.S. government is in negotiations with SoftBank for greater control over equipment purchases by Sprint Nextel and the selection of one of the Japanese company's nominee to the U.S. carrier's board, according to a news report. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

Top two-factor authentication tools
Smartphones replace hardware tokens in latest generation of two-factor authentication schemes Read More

Twitter aims to become safer with two-step sign-in
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. Read More


WHITE PAPER: HP

Information Security eGuide
In this eGuide, CIO along with sister publications Network World, InfoWorld and CSO, cover the pertinent information security topics of today. Read on to learn how to deal with threats, build effective security strategies and prepare for increased scrutiny. Learn more.

Twitter's 10 most antisocial celebrities
Followed by millions, they follow no one (or only one) in return Read More

Sun's stars: Where are they now?
Read More

The 20 best iPhone/iPad games of 2013 so far
Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games Read More

 
 
 

SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Study ranks US least riskiest place to open data center

2. Would you pay $30 for a waterproof Android smartphone?

3. Why Google taught developers how to hack Glass

10. CIOs need to rethink their roles, MIT symposium panelists say

8. Ethernet filters out porn, plus 9 other facts we learned from Bob Metcalfe

9. iPhone 6 rumor rollup for the week ending May 10

7. Dubai hotel gives guests 24-carat gold iPads

6. The 20 best iPhone/iPad games of 2013 so far

5. Nvidia, Citrix crank up virtual desktop delivery

4. Twitter's 10 most antisocial celebrities

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: