Search This Blog

Tuesday, November 12, 2013

IE zero-day attack delivers malware into memory then poofs on reboot

Porn-surfing corporate bosses infect networks, then keep data breaches a secret | Georgia Tech warns of emerging threats in cloud, mobile

Network World Security

Forward this to a Friend >>>


IE zero-day attack delivers malware into memory then poofs on reboot
On Friday, security researchers at FireEye identified a new IE zero-day exploit hosted on a hacked U.S. website that is being used for targeted drive-by download attacks. The malware exploiting IE is injected directly into PC memory instead of being written to disk. Read More


WHITE PAPER: Riverbed Technology

End-to-End Service Management for Unified Communications
As part of Riverbed Performance Management solutions, Riverbed OPNET Unified Communications Xpert allows continuous monitoring of voice and video quality so you can catch and fix problems before they become an issue. View More

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Porn-surfing corporate bosses infect networks, then keep data breaches a secret
The boss may know better -- the dreaded do as I say, not as I do -- but 40% of malware infections on corporate senior executives' PCs came from visiting infected porn sites. According to a blind survey of 200 security professionals, more than half, or 57%, have investigated data breaches that were kept a secret from customers, partners or stakeholders. Read More

Georgia Tech warns of emerging threats in cloud, mobile
Companies will face next year emerging threats in cloud data storage that will demand security measures that go far beyond what is offered by service providers, a university report says. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

INSIDER
10 encryption tips for the enterprise
Whether you're protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees accidentally leaving their laptops in a taxi, encryption is today's hot go-to tool. Read More

12 Recent Tech Trends That Have Yet to Live Up to Their Hype
How many times has 'the next big thing' in technology turned out to be the next big fail, either because tech companies couldn't explain the product or service or the marketing was premature? Here's a look at today's most overhyped technologies? Read More


WHITE PAPER: Stratacache

Accelerating In-Store Mobile Apps at Retail
In this whitepaper, we examine how on-premise caching technology can take the guesswork out of mobile retailing with staggering results. Learn More.

British spies reportedly spoofed LinkedIn, Slashdot to target network engineers
British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the computers of network engineers working for global roaming exchange providers based in Europe. Read More

Best practices for safely moving data in and out of the cloud
As everyone knows, cloud provider Nirvanix recently fell apart, declaring bankruptcy and leaving its customers in the lurch. Nirvanix gave enterprises less than a month to move their data to a new home. To avoid the fate of those customers, follow these best practices for safely moving data in and out of the cloud. Read More

How security is using IAM to manage BYOD
What do smartphones and corporate credit cards have in common? Very soon, both will be monitored by employers in an effort to detect abnormal or otherwise suspicious patterns of activity. In the age of bring-your-own-device (BYOD) policies, companies are turning to techniques like these to manage access from smartphones and tablets to their internal systems and to confirm the identities of the people using them. Read More


SLIDESHOWS

Recent iOS app updates people hate

We looked at the top 100 iPhone and iPad apps in the Business category, free or paid, that were last updated in September or October 2013 to find the ones users HATE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Riverbed wins 7-vendor WAN optimization test

2. Cisco competitors say Nexus 9000 brings closed hardware to open software game

3. Why IBM will win the war with Amazon Web Services

4. Alcatel-Lucent enterprise on the block again?

5. Cisco takes fight to SDNs with bold Insieme launch

6. Porn-surfing corporate bosses infect networks, then keep data breaches a secret

7. 11 sure signs you've been hacked

8. Researchers dare AI experts to crack new GOTCHA password scheme

9. Lonely week for the Cisco Catalyst 6500

10. Stealthy startup at root of Riverbed brain drain


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: