Search This Blog

Friday, January 17, 2014

Cisco: Thousands of web hosting centers now launchpads for attacks

Security nightmare worsens for Windows XP's end of days | NSA hacking tools will find their way to criminals eventually

Network World Security

Forward this to a Friend >>>


Cisco: Thousands of web hosting centers now launchpads for attacks
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says. Read More


WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

WHITE PAPER: Limelight Networks

Pitfalls To Avoid In Combining Acceleration Technologies
This May 2013 Forrester Research, Inc. report looks at the impact of website performance on customer satisfaction and revenue, and why meeting high expectations is more complex than ever. Learn More

Security nightmare worsens for Windows XP's end of days
You all know (or better know) by now that Microsoft will end all support for Windows XP on April 8. Now the company is doubling down, saying it will end support for the XP version of Microsoft Security Essentials, the company's free security and antivirus application. That means no more updates, no more additions to the antivirus signatures, nothing. If a virus appears on April 9, you better have someone... Read More

NSA hacking tools will find their way to criminals eventually
The U.S. National Security Agency has reportedly developed technology to commandeer computers even when they are off the Internet, and security experts warn it's only a matter of time before similar tools become part of cybercriminals' toolbox. Read More

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization. Read More


WHITE PAPER: 8x8, Inc

When Disaster Strikes, Can the Cloud Save Your Business?
Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place." Learn more >>

Security startup Impermium joining Google
Security company Impermium has joined Google to help boost the Internet giant's already considerable expertise in countering spam and abuse. Read More

Feds issue Top 10 most wanted transportation safety advances
Travel, be it by car, airplane or rail has a certain component of danger to it, that's just the behavior of the humans who operate that equipment, the equipment itself and in many cases, Mother Nature. Read More

How to Bring Shadow IT Under Control
Most business units these days are leveraging cloud services, and a majority of them are bypassing IT to do it, according to a new study. While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first. Read More


WHITE PAPER: 8x8, Inc

Gartner's Unified Communications as a Service Report
See what Gartner Inc., the world's leading information technology research and advisory firm, has to say about choosing the right Unified Communications solution for your business. Gartner's Magic Quadrant compares 16 of the leading UCaaS providers and names 8x8 a leader based on completeness of vision and ability to execute. Learn more >>

Snapchat, Bitly and Kik Messenger targeted by spammers
You have to give spammers credit for effort: Symantec found a spam campaign that manages to abuse three Web services at the same time. Read More

Starbucks vows to beef up security on its iPhone app
Starbucks today promised to update its iOS app to calm a storm of interest in a report this week that claimed criminals could easily nab the app's credentials from a stolen iPhone. Read More

Security firm IDs malware used in Target attack
A security company that worked with the U.S. Secret Service to investigate the data breach at Target identified the malware used in the attack as a sophisticated derivative of a previously known Trojan. Read More

Juniper announces Firefly Suite for virtual-machine security
Juniper today announced its Firefly Suite for virtual-machine security, a set of software-based products for VMware and KVM that contain the security and switching capabilities found in Juniper's SRX Series Services Gateway, as well as Junos Space Virtual Director. Read More

Hackathon geared toward the 'liberation' of data from public PDF documents
Massive amounts of unstructured data are held in the form of PDF documents, but extracting key figures and words out of PDFs in a programmatic manner can be difficult and costly. This poses a challenge to public-interest groups, journalists and others who are interested in running large-scale analyses on PDF documents in order to uncover valuable insights. Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to make 96,000 pounds of WWII machinery into high-tech research platform

2. Microsoft Hyper-V bangs away at VMware's popularity

3. Cisco offers advice on Target breach

4. Relive the 1990s with these ancient, still-functioning websites

5. The mixed fate of Sun tech under Oracle

6. SDN will never happen, says VMware exec

7. Juniper should reevaluate switching, security products investor says

8. 18 great uses for an old Android device

9. Chrome 32: First look

10. Massive denial-of-service attacks pick up steam, new nefarious techniques


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: