Tuesday, October 15, 2013

Worst data breaches of 2013 (part 3!)

Backdoor found in D-Link router firmware code | 8 most interesting tech gadgets of 2013

Network World Security

Forward this to a Friend >>>


Worst data breaches of 2013 (part 3!)
The Identity Theft Resource Center has recorded 450 data breaches so far this year, and here are the worst that became known between July and September Read More


WEBCAST: Viewfinity

Webcast: Windows Admin Privileges and Application Control
In this webcast Derek Melber, MVP, will explain how combining least privilege and application control can provide an optimal solution for securing endpoints. Date: Tuesday, November 12, 2013, 2:00 PM EST Register Now

WHITE PAPER: Kaspersky

IT Security - Fighting the Silent Threat
"IT Security - Fighting the Silent Threat" is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks. Learn More.

Backdoor found in D-Link router firmware code
A backdoor found in firmware used in several D-Link routers could allow an attacker to change a device's settings, a serious security problem that could be used for surveillance. Read More

8 most interesting tech gadgets of 2013
Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Brazil to fortify government email system following NSA snooping revelations
The Brazilian Federal Data Processing Service, known as Serpro, will build a secure email system for Brazil's federal government following media reports that foreign intelligence agencies intercepted electronic communications in the country. Read More

Robots with machine guns: U.S. Army sees latest gear
Commercial companies showed off their weaponized robots to U.S. Army officers at Fort Benning, Georgia, this week. Military leaders were looking to see what the technology is capable of and how it could be used on the battlefield. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Managed security service providers face $40M liability exposures
Managed security service providers get paid by enterprise customers to stop malware or other kinds of cyberattacks, but if they fail, they face what's often a multi-million-dollar liability. Read More

Wham bam thanks for giving up your Facebook and Google privacy, ma'am
Ensuring your privacy is expensive. Just ask Facebook founder Mark Zuckerberg who allegedly paid over $30 million to buy four homes next his own Palo Alto residence so he could ensure his privacy. Read More

A five-pillar survival guide for an insecure cyber world
Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which both values and risks increase daily. Read More

People flock to anonymizing services after NSA snooping reports
Companies offering anonymous Web browsing and communication services are seeing a huge increase in business since recent news leaks about the U.S. National Security Agency's mass data collection and surveillance activities. Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. In a room with no cell service, Verizon works on the future of mobile

2. Careers that are being automated into oblivion

3. Why I'm excited for Linux Mint 16, even though I don't like Mint

4. Gartner: The top 10 IT altering predictions for 2014

5. 10 ways IT pros can reduce stress at work

6. NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services

7. Your car is about to go open source

8. Three lessons from Netflix on how to live in the cloud

9. Shh ... Cisco's latest switch supports VMware NSX

10. Inside CIO paychecks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment