Thursday, February 20, 2014

Zeus malware-botnet variant spotted 'crawling' Salesforce.com

Time to drop unnecessary admin privileges | Healthcare dominates US data breach incidents, latest figures show

Network World Security

Forward this to a Friend >>>


Zeus malware-botnet variant spotted 'crawling' Salesforce.com
The Zeus Trojan, malware long known to steal banking credentials to siphon off victims' funds, has been spotted being put to yet another devious use: swiping business data from Salesforce.com. Read More


WHITE PAPER: Dell Software

Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference – CSO40 Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/

Time to drop unnecessary admin privileges
A new study shows that CSOs could dramatically lower the risk of malware infection by becoming a lot stingier with the number of company employees given administrator accounts on computers. Read More

Healthcare dominates US data breach incidents, latest figures show
The healthcare sector accounted for more than four out of ten US customer data breaches recorded by the non-profit Identity Theft Resource Center (ITRC) in 2013, the organisation's latest figures show. Read More


WHITE PAPER: Dell Software

A New Set Of Network Security Challenges
IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read!

Belkin fixes WeMo security holes, update firmware and app
If you've made the decision to try home automation and WeMo, then you might have noticed that Belkin WeMo is like a potato chip; you can't have just one. If you try it and like it, then the next thing you know, you have all sorts of WeMo devices. If that describes you, then you were probably a pretty unhappy camper after being told that Belkin chose not to respond about the security holes and therefore... Read More

Fresh batch of security start-ups aim to safeguard mobile devices, SaaS apps
Security start-ups continue to blast out of stealth mode, and among the ones seen this week, the focus is on mobile security as well as cloud-based monitoring and threat detection of software-as-a-service applications such as Salesforce and Box. Read More


WHITE PAPER: Dell Software

What to Look for When Evaluating Next-Generation Firewalls
These liabilities create security vulnerabilities and force enterprises into expensive workarounds like deploying separate gateway antivirus products and intrusion prevention systems (IPS).Next-Generation Firewalls remedy these problems. Learn More

Researcher claims two hacker gangs exploiting unpatched IE bug
Two different hacker groups are exploiting the same still-unpatched vulnerability in Internet Explorer (IE) with almost-identical attack code, a security researcher said Tuesday. Read More

How to rethink security for the new world of IT
Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently Read More


SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. The 12 most powerful security companies

3. The erosion of IT's middle class

4. Microsoft Lync to play nice with Cisco, Android

5. 16 weirdest places you'll find Linux

6. Gigabit Internet Service Providers Challenge Traditional ISPs

7. 15 Non-Certified IT Skills Growing in Demand

8. Leaked release dates shed light on Microsoft's Windows 9 plans

9. Apple shop maxes out Airport access points, upgrades to 802.11ac

10. Zeus malware-botnet variant spotted 'crawling' Salesforce.com


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment