Search This Blog

Thursday, March 13, 2014

Sophisticated scam targeting Verizon Wireless customers

  Adobe patches a critical vulnerability in Shockwave Player | Security Skills Haves and Have Nots

 
  Network World Security

Forward this to a Friend >>>


Sophisticated scam targeting Verizon Wireless customers
  The Better Business Bureau recently warned of a scam targeting Verizon Wireless customers that tries to trick users into giving up personal information. Read More
 


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

WEBCAST: CDW

Next Generation SAM
Managing software assets and licenses is a time-consuming job that can drain IT resources. When this is not done properly, a company might spend more on licenses than needed and could put the company at risk, exposing it to fines and other penalties. View Now

Adobe patches a critical vulnerability in Shockwave Player
  Adobe Systems released a new security update for Shockwave Player in order to fix a critical vulnerability that could allow attackers to remotely take control of affected systems. Read More
 

Security Skills Haves and Have Nots
I've written a lot lately about the cybersecurity skills shortage. For example, 25% of organizations claim that they have a problematic shortage of IT security skills. On an industry basis, 36% of government agencies say they have a problematic shortage of IT security skills, followed by 29% of manufacturing companies, and 28% of financial services firms. Read More
 


WHITE PAPER: CDW

Securing BYOD
Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide. Read Now

How to Handle the IT Skills Shortage: Architect Your People
IT and technology are always going to be moving targets. The pace at which change takes place is furious compared to most industries. Technologies evolve and business objectives change. As a result, the skills required to get the job done must change, too. Finding perfect people who meet a laundry list of qualifications is a dubious task. Read More
 

Senator's claims of CIA violating computer fraud act shaky, legal expert says
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert. Read More
 


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

Tim Berners-Lee: we need a free Web, except when we don't
The founder of the modern Web, Tim Berners-Lee, argued for government oversight of the Web as well as digital-rights-management (DRM) in an "Ask Me Anything" session on Reddit Wednesday afternoon. Read More
 

Adobe patches two important vulnerabilities in Flash Player
Adobe released updates for Flash Player that fix two vulnerabilities that could allow attackers to bypass security controls in the software. Read More
 

 

SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Embarrassing stories shed light on U.S. officials' technological ignorance

2. Why IBM thinks Windows Phone is best for the enterprise

3. Computer science enrollments rocketed last year, up 22%

4. The fascinating 50

5. Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks

6. iPhone Air: Latest iPhone 6 concept video has fanboys fired up

7. Massive Bitcoin mining rig earns $8 million per month

8. Cisco shows Rob Ford no respect

9. March 2014 Patch Tuesday: Microsoft closes critical holes in IE, Windows

10. Cisco on mission to outfit all office rooms with video conferencing systems


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: