Tuesday, June 11, 2013

Oops. Microsoft takes down some researchers' servers along with Citadel botnet sites

  Why password-only authentication is passe | Debate rages over revelation of NSA spying secrets
 
  Network World Security

Forward this to a Friend >>>


Oops. Microsoft takes down some researchers' servers along with Citadel botnet sites
When Microsoft took down Citadel botnets last week it disrupted the thieves who use the malware for stealing online banking information, but it also caused collateral damage by knocking out sinkhole servers used by researchers to figure out how best to combat the criminals, a Swiss researcher says. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

INSIDER
Why password-only authentication is passe
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication. Read More


WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

Debate rages over revelation of NSA spying secrets
Debate continues to rage today over the bombshell revelations that the National Security Agency collects intelligence on individuals via telecommunications and social-networking sites. The uproar has the U.S. government and private companies admitting to some aspects of the surveillance, while vehemently denying others. A former CIA agent working for Booz Allen Hamilton has revealed himself as the leaker. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

How to opt out of PRISM, the NSA's spying program
Nine leading U.S. companies have been scrutinized since a Washington Post report published last week claimed they were collaborating with the NSA program called PRISM developed to provide the U.S. government access to their users' communications data at will. Read More

Top 12 Retailers for Security and Privacy Practices
The Online Trust Alliance (OTA) has conducted its annual Online Trust Honor Roll audit to recognize online companies whose efforts to enhance the security and privacy of user's data lead the industry. Here are 12 companies, presented in alphabetical order, the OTA says are the top of the heap. Read More

The most magnificent high-tech flying machines
From jets that can hit Mach 20 to green, fuel efficient airliners, high-tech aircraft development is all the rage Read More

 
 
 

SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Prism leaker steps forward cites 'massive surveillance machine'

7. Will iOS 7 finally make traditional PCs irrelevant?

2. 10 scary facts about Bitcoin

3. Cisco preparing to manufacture new CTR routers

4. Microsoft Patch Tuesday aims at widespread Internet Explorer vulnerabilities

8. Getting the most out of flash storage

5. Fave Raves: 25 IT pros name their favorite products

9. IT departments won't exist in five years

6. Is this what future data centers will look like?

10. Dropbox CEO Drew Houston's 2013 MIT commencement address transcript

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment