Search This Blog

Tuesday, November 05, 2013

CryptoLocker crooks charge 10 Bitcoins for second-chance decryption service

Security Manager's Journal: Found: 30 unmanaged servers that shouldn't be | Information Security versus "Shadow IT" (and mobility, cloud computing, BYOD, etc.)

Network World Security

Forward this to a Friend >>>


CryptoLocker crooks charge 10 Bitcoins for second-chance decryption service
If you don't win an online auction, sometimes you receive a "second chance offer" that costs whatever your highest bid was for an item. Read More


RESOURCE COMPLIMENTS OF: Canon

Canon is Advancing Cybersecurity on Multifunction Devices
A convergence of networking, document and data workflow, and mobile technologies, MFDs are critical to enterprise productivity. But with new workflows come new security challenges. Learn how the Canon imageRUNNER ADVANCE platform is making authentication and access, user auditing, and physical artifacts more secure and easier to manage than ever. Discover Simply Advanced Security from Canon

WHITE PAPER: F5 Networks

Achieving Brute Force DDoS Protection
Many security solutions tout the ability to withstand brute force layer 7 Dos attacks. However, most of today's DoS attacks overwhelm applications by sending more than one million request attempts per second. Learn more >> Read more>>

Security Manager's Journal: Found: 30 unmanaged servers that shouldn't be
We just found 30 servers that can't be accounted for. Thirty Internet-facing servers with no malware protection and patchy patch histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again. Read More

Information Security versus "Shadow IT" (and mobility, cloud computing, BYOD, etc.)
We've all read the marketing hype about "shadow IT" where business managers make their own IT decisions without the CIO's knowledge or approval. According to ESG research, this risk is actually overstated at most organizations but there is no denying that IT is getting harder to manage as a result of BYOD, cloud computing, IT consumerization, and mobility. As these trends perpetuate, CISOs... Read More

11 sure signs you've been hacked
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Habitable planets way more common than you think
The idea that many as 20% of the Sun-like stars in our solar system have Earth-sized planets that could host life seems astounding. Read More

Enterprise defenses lag despite rising cybersecurity awareness
Organizations are showing more interest in cybersecurity through executive involvement and higher spending. Nevertheless, the added attention is new and more resources need to be directed at defending against cyberattacks, a study shows. Read More

Biggest risks in IPv6 security today
Although IPv6 packets have started to flow, network engineers still tread lightly because of lingering security concerns. Here are the top six security risks in IPv6 network security today as voted by gogoNET members, a community of 95,000 network professionals. Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

10 companies making the Internet of Things a reality
The first ever Internet of Things World Forum was held in Barcelona over the last week of October. If there was any doubt, the Internet of Things (IoT) is a very real trend and it's just a matter of time before IoT has a significant impact on the way we live our lives. These were the top 10 companies on display at the World Forum, many of which are helping IoT move from vision to reality. Read More

Iris ID systems go mainstream
Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology. Read More

IDC tabs 'Specialized Threat Analysis and Protection' as new security segment
Products that can detect stealthy malware-based attacks aimed at cyber-espionage and data exfiltration should be considered a specialized area of the security market, according to research firm IDC, which has designated a new market category for them: "Specialized Threat Analysis and Protection." Read More


SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft to can Skype API, third-party products will not work

2. Arista fires broadside at Cisco/Insieme with new switches

3. Car crash prevention technologies face huge challenges

4. First look: Google's new Nexus 5

5. Eye-opening 'Morris worm' turns 25 tomorrow

6. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

7. CAPTCHA crushed, new era of threats emerge

8. Free cloud storage service MegaCloud goes dark

9. Fake social media ID duped security-aware IT guys

10. Gartner: Cloud-based security as a service set to take off


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: