Search This Blog

Monday, May 20, 2013

Researchers uncover new global cyberespionage operation dubbed SafeNet

In a sea of malware, viruses make a small comeback | The devious art of cell tower camouflage

Network World Security

Forward this to a Friend >>>


Researchers uncover new global cyberespionage operation dubbed SafeNet
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries. Read More


WHITE PAPER: F5 Networks

The New Application Delivery Firewall Paradigm
Learn how you can effectively combat these modern attacks with a new firewall paradigm that protects the datacenters and ensures reliability. Learn More!

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

In a sea of malware, viruses make a small comeback
The computer virus seems to be making a subtle comeback. Read More

The devious art of cell tower camouflage
Disguising cellphone towers in the U.S. and other locations around the world has become sort of an art form. The unsightly towers have been hidden in church steeples, flagpoles, silos and other large edifices. Here, Reuters recently took a look at the use of different types of trees used to hide the masts. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

Google, NASA step into quantum computing
Google, NASA and Universities Space Research Association this week invested roughly $15 million in a 512-qubit quantum computer their researchers will use to develop myriad applications from machine learning, web search and speech recognition to searching for exoplanets. The machine known as D-Wave Two and built by D-Wave Systems will be installed at the new Quantum Artificial Intelligence Lab, a collaboration... Read More

Experts ding DHS vulnerability sharing plan as too limited
The Department of Homeland Security's plan to selectively share information on zero-day vulnerabilities is too restrictive and should be opened up to more companies, experts say. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

What Can Be Done About the Cybersecurity Skills Shortage?
I've written countless times about the cybersecurity skills shortage but here's a quick summary of a few ESG research data points that illustrate the scope of this problem: 1. 25% of mid-market (i.e. 100 to 999 employees) and enterprise (i.e. more than 1,000 employees) report a "problematic shortage" of IT security skills. 2. 36% of organizations increasing IT headcount this year plan to... Read More

Police arrest Anonymous suspects in Italy
Italian police arrested four suspected hackers Friday, accusing them of having taken control of the Italian branch of the Anonymous network. Read More



SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Swedish data center saves $1 million a year using seawater for cooling

2. NOVA to examine technology's role in capturing Boston bombers

3. iPad 5 rumor rollup for the week ending May 16

10. Sun's stars: Where are they now?

8. Cisco to SDN: Bring it on

9. 10 amazing Linux desktop environments you've probably never seen

7. 7 steps to securing Java

6. 10 more of the world's coolest data centers

5. iPhone 6 rumor rollup for the week ending May 3

4. Could this be the business world's answer to Google Glass?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: