Tuesday, June 11, 2013

Gallery: Telltale signs of ATM skimming

  Organizations push for Congress to curtail NSA spying | Cities search for solution to phone-theft epidemic
 
  Network World After Dark

Forward this to a Friend >>>


Gallery: Telltale signs of ATM skimming
ATM skimming schemes involve installing fraudulent equipment that criminals use to steal credit and debit card numbers and PINs. Industry estimates calculate that ATM fraud costs banks and consumers billions of dollars annually. Here are a few things to look for the next time you need to hit the ATM. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Consolidate & Manage Alerts for FREE!
SolarWinds® Alert Central consolidates alerts from all your IT monitoring tools and ensures they get to the right person, on the right team, at the right time. And the best part – it's FREE! So stop managing your alerts manually. Get the free product today or learn more here >>

WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

Organizations push for Congress to curtail NSA spying
Privacy advocates are pushing the U.S. Congress to rein in the U.S. National Security Agency's efforts to collect massive amounts of data from U.S. residents, as alleged in recent news reports. Read More

Cities search for solution to phone-theft epidemic
Upgrade your firewalls, insist on 16-character passwords, and apply all your security patches the day they come out. None of that may matter: The sad reality is that the biggest computer crime your organization is likely to face is the physical theft of a mobile device, should one of your traveling sales staff find their car broken into and their laptop bag stolen or merely become the victim of a subway bump-and-grab. Read More

Network World First Look: Apple's iOS 7
Apple iOS software designed for improved usability Read More

Microsoft's BYOD game plan is surprisingly impartial
Microsoft has wrapped up its annual TechEd North America conference in New Orleans, which means those unfortunate enough to have gone should be finished wringing the sweat out of their clothes by now. Among the many developments at the show was Microsoft's clear support for the whole bring your own device (BYOD) trend. I'm actually surprised, because BYOD was born out of a rebellion against Microsoft... Read More

Cisco looks to standardize context-aware security
Cisco is looking to standardize a framework it developed for integrating disparate security products from multiple vendors. The framework is called the Platform Exchange Grid (pxGrid) and it allows third-party developers of security applications to develop capabilities for Cisco's Identity Services Engine (ISE). ISE is designed to provide policy-based, context-aware security for Cisco networks. Read... Read More

FAA wants all aircraft flying on unleaded fuel by 2018
The Federal Aviation Administration (FAA) this week put out a call to fuel producers to offer options that would safely let general aviation aircraft stop using leaded fuel by 2018. Read More

10 takeaways from Apple's WWDC
Apple held its much-anticipated annual World Wide Developers Conference keynote on Monday. Here are some of the highlights from the keynote that will matter most to Mac users. Read More

Apple posts print and video ad touting "Our Signature"
At the end of Apple's keynote yesterday, Tim Cook rolled out a new ad touting Apple's "signature" if you will. Video of the ad can be seen below. And a nice accompanying print ad. The ad reads: Read More

The new science of software testing
By Lorinda Brandon, Director of Strategy at Smartbear Software Read More

 
 
 

SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending June 7

7. The world is not flat: Apple unveils 'fresh, light' iOS 7

2. How to opt out of PRISM, the NSA's spying program

3. Gartner: 7 major trends forcing IT security pros to change

4. Kinder, gentler Torvalds: Don't make me curse at you again

8. Getting the most out of flash storage

5. Intel's new Haswell chips may be hot, but not in a good way

9. Cisco overtakes IBM as top cloud hardware provider, research firm says

6. Oops. Microsoft takes down some researchers' servers along with Citadel botnet sites

10. 10 scary facts about Bitcoin

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment