Search This Blog

Thursday, July 24, 2014

Internet Explorer is the 'sweet spot' for attackers so far in 2014

Network World Security - Newsletter - networkworld.com
Arrests made after international cyber-ring targets StubHub | The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)

Network World Security

Forward this to a Friend >>>


Internet Explorer is the 'sweet spot' for attackers so far in 2014
After analyzing public vulnerabilities and exploit trends in the first half of 2014, Bromium Labs concluded that Internet Explorer is the “sweet spot for attackers.”“Internet Explorer was the most patched and also one of the most exploited products,” the report (pdf) states. Microsoft’s browser “set a record high for reported vulnerabilities in the first half of 2014” and also “leads in publicly reported exploits.”Adobe Flash player has been another prime target. “Flash exploits require DEP and ASLR bypass for successful execution.”To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: McAfee

The Only Next Gen Firewall to Stop AETs
The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization on multiple protocol layers. The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization

WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

Arrests made after international cyber-ring targets StubHub
StubHub accounts were compromised and used to buy tickets for popular events, which were then resold Read More

The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)
2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development Read More

Brandpost: 20 of the Most Painful Lessons IT Pros Had to Learn the Hard Way
Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Finding life in space by looking for extraterrestrial pollution
If what we know as advanced life exists anywhere other than Earth, then perhaps they are dirtying their atmosphere as much as we have and that we could use such pollution components to perhaps more easily spot such planets in the universe. That’s the basics of new research put for this week by researchers at the Harvard-Smithsonian Center for Astrophysics that stated if we could spot the fingerprints of certain pollutants under ideal conditions, it would offer a new approach in the search for extraterrestrial intelligence.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)+ The researchers pointed specifically to the future James Webb Space Telescope should be able to detect two kinds of chlorofluorocarbons (CFCs) -- ozone-destroying chemicals used in solvents and aerosols. They calculated that that the James Webb could tease out the signal of CFCs if atmospheric levels were 10 times those on Earth. A particularly advanced civilization might intentionally pollute the atmosphere to high levels and globally warm a planet that is otherwise too cold for life.To read this article in full or to leave a comment, please click here Read More

File-encrypting Android ransomware 'Simplocker' targets English-speaking users
The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said Read More

Friday is SysAdmin Appreciation Day: Here's one way to make sure you're appreciated
Friday is the 15th annual SysAdmin Appreciation Day. Pictured above is a related poster created by and featuring the IT department of the Launch Federal Credit Union, which serves Florida’s Cape Canaveral region.“We didn’t feel appreciated enough last year,” writes a Launch FCU sysadmin on a SpiceWorks message board, “so we sent this email to all employees and displayed 20 of these posters in visible places in every department.”In case you can’t make out all the words in the picture, the key sentence reads: “So appreciate an IT person today and we may allow you to use your computer tomorrow.”To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: e-SignLive

Security for E-Signatures and E-Transactions
To help identify the security requirements against which you should evaluate electronic signature solutions, this 5-page whitepaper answers questions like: How do I know who e-signed the document? Learn More

SQL injection flaw in Wall Street Journal database led to breach
The publisher said the intrusion did not affect customers' data Read More

10 Top Jobs by Salary for Social Media Pros
Read More

10 tools for more productive telecommuting
Keep in touch with co-workers, track your time, and block distractions with these apps and services. Read More


Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: