Search This Blog

Monday, February 10, 2014

Hackers try to hijack Facebook, other high profile domains through domain registrar

FBI: Stolen copper gang cuts its way to prison | Judging in the Olympics and IT Security: Subjective vs. Objective

Network World Security

Forward this to a Friend >>>


Hackers try to hijack Facebook, other high profile domains through domain registrar
The Syrian Electronic Army (SEA), a group of hackers who have made a habit of hijacking high-profile domain names, managed to change the domain registration information for Facebook.com, but failed to redirect the domain to a different server. Read More


WHITE PAPER: IBM

The Big Data Zoo—Taming the Beasts
According to Dr. Devlin's white paper "The Big Data Zoo—Taming the Beasts", data is still data, whether big or small. It needs to be managed effectively if organizations want to be gain value from it. Although big data may present special challenges for IT organizations, the principles of data management haven't changed. Learn More

WHITE PAPER: Mitel Networks

Cloud-based UC: A Foundation for Business Transformation
CIOs are turning to cloud-based UC to reduce IT costs and focus resources on projects that deliver the greatest strategic advantages. Read Now

FBI: Stolen copper gang cuts its way to prison
You don't hear about this often enough - the FBI today said the last in a group of seven men was sentenced to three years in prison for his role in a conspiracy to steal copper from two dozen First Energy Corp. and or Cleveland Public Power substations in Northeast Ohio. Read More

Judging in the Olympics and IT Security: Subjective vs. Objective
I was watching the opening night events of the Sochi Olympics last night while I was finalizing my presentation for RSA Conference this month in San Francisco. My presentation is on what are the right metrics to measure security and risk. At the same time I am watching figure skating and women mogul skiing. It struck me that in all of these things subjective judging of performance is just so imprecise.... Read More

Building control systems can be pathway to Target-like attack
Companies should review carefully the network access given to third-party engineers monitoring building control systems to avoid a Target-like attack, experts say. Read More


WHITE PAPER: HP and Intel®

Storage Insight: Debunk the Data Storage Myths
Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. This informative eBook is designed to provide the immediate insight you need to make the right decisions about some of the most important IT issues your enterprise will ever face. Read Now>>

7 clever mobile apps to conquer procrastination
Call it a disease, a bad habit, or a character flaw, but procrastination spares no one from its strangling grip. Just search "procrastination" in any mobile app store, and you'll be rewarded with a glut of solutions that promise to motivate, badger, cajole, prod, inspire or otherwise spur you into action. Before you kick another project down the road, check out these 7 apps and conquer your task-avoidance once and for all. Read More

California bill proposes mandatory kill-switch on phones and tablets
Politicians and law enforcement officials in California will introduce a bill on Friday that requires all smartphones and tablet PCs sold in the state be equipped with a digital "kill-switch" that would make the devices useless if stolen. Read More

Cybercriminals compromise home routers to attack online banking users
Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online banking sites. Read More


WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

The Skyfence security gateway monitors and protects cloud apps
As companies move more of their applications to the cloud, they need a new enforcement point to protect data. Skyfence Networks offers a security gateway that monitors user activity for all cloud applications and prevents unauthorized access by malicious insiders and criminals using stolen credentials. Read More

Target contractor says it was victim of cyberattack
A contractor for Target said Thursday it was also a victim of a cyberattack, supporting the retailer's claim that hackers gained entry to its network via a third party. Read More

Patch Tuesday: Windows 8, Exchange in danger
Microsoft is issuing critical patches for flaws found in Windows 7, 8 and RT desktops as well as for the spam and malware filter for Microsoft Exchange server. Read More


SLIDESHOWS

Best tools for keeping end users happy

ExtraHop wins Application Performance Monitoring (APM) shootout.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Target breach happened because of a basic network segmentation error

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. Secret Video and Audio Recordings a Legal Minefield for Employers

4. Patch Tuesday: Windows 8, Exchange in danger

5. Shark Tank's tech winners & rejects

6. So you think you know networking? Quiz II

7. Leaked features in Windows 8.1 Update 1

8. DARPA shows off clearinghouse site for open-source code and information

9. Iron Mountain fire in Buenos Aires kills 9, destroys corporate records

10. 11 Ways to Improve Your IT Team's Productivity


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: