Friday, February 28, 2014

FTC: Identity theft is the plague of the country

Network World Security - Newsletter - networkworld.com
FBI expects to roll out malware-analysis system to help businesses identify attacks | Google Android chief Sundar Pichai says Android not designed to be safe

Network World Security

Forward this to a Friend >>>


FTC: Identity theft is the plague of the country
The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most. Read More


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who's often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

FBI expects to roll out malware-analysis system to help businesses identify attacks
The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them. Read More

Google Android chief Sundar Pichai says Android not designed to be safe
Earlier this week, Google Android chief Sundar Pichai spoke at the Mobile World Congress where he explained, rather bluntly, that Android is designed to be open more so than it's designed to be safe. He also added that if he were a hacker today, he too would focus most of his efforts on Android on account of its marketshare position. FrAndroid reports: Read More

CIA chief: Internet of Things, infrastructure attacks are big security headaches
CIA Director John Brennan told an audience that when he served at the White House, "I must admit that after a while, just hearing the word "cyber" was enough to make my head hurt." Read More


WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

Security firm discloses Apple iOS 'malicious profile' vulnerability impact on MDM
At the RSA Conference today, security start-up Skycure plans to disclose a vulnerability in Apple iOS devices that can impact mobile-device management (MDM) systems running on them. Read More

Security researchers urge tech companies to explain their cryptographic choices
Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance. Read More

Video tutorial: What is Conficker?
Today's advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques in recent years was Conficker. Conficker was an unusually successful piece of malware that first surfaced in November 2008. It exploited a vulnerability in Windows server operating systems and went on... Read More


WHITE PAPER: Citrix Systems

Why workloads define cloud strategies
Cloud computing changes how organizations think about their business and IT strategies. As organizations define their cloud strategies, it is imperative to think about the use cases and application workloads that will run in the cloud, as these will ultimately define your cloud architecture and which solutions to deploy. View now

Cloud security concerns are overblown, experts say
Security concerns should not deter enterprises from using public cloud technologies when it makes business sense. Read More

Boeing's new smartphone will self-destruct in 3…2…
Aerospace and defense company Boeing this week rolled out the Boeing Black – a heavily secured Android smartphone designed for use by the U.S. military and intelligence agencies, which – no kidding – will essentially self-destruct if tampered with. Read More

NSA's Alexander defends surveillance, but calls for better cybersecurity
U.S. National Security Agency director General Keith Alexander has called on Congress to pass new legislation focused on protecting the country's cyber assets while at the same time defending his agency's cybersurveillance programs. Read More


SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment