Search This Blog

Monday, July 21, 2014

Net neutrality a key battleground in growing fight over encryption, activists say

Network World Security - Newsletter - networkworld.com
  Cisco counterfeiter gets 37 months in prison, forfeits $700,000 | Dumping an open source Honeypot on Rachel: FTC reloads on liquidating robocallers

 
  Network World Security

Forward this to a Friend >>>


Net neutrality a key battleground in growing fight over encryption, activists say
Both carriers and government now have an interest in how users keep their online lives private Read More
 


WHITE PAPER: Netscout Systems Inc.

Real-Time Application-Centric Operations Visibility
This EMA whitepaper examines the move towards application/service performance visibility within IT operations, and in particular the network-based delivery of those applications and services and the role that network-based visibility can and should play. Learn More

WHITE PAPER: PrinterLogic
 
Printer Installer: Eliminating Print Servers
Printer Installer is an on-premise web application that enables you to centrally manage and deploy Windows shared or direct iP printers. Learn More

Cisco counterfeiter gets 37 months in prison, forfeits $700,000
ConnectZone.com and owner, Daniel Oberholtzer conspired with a Chinese company to produce counterfeit Cisco, US says Read More
 

Dumping an open source Honeypot on Rachel: FTC reloads on liquidating robocallers
FTC The Federal Trade Commission today announced the rules for its second robocall exterminating challenge, known this time as Zapping Rachel Robocall Contest. "Rachel From Cardholder Services," was a large robocall scam the agency took out in 2012. The Zapping Rachel contest will take place at DEF CON 22 in Las Vegas Aug. 7-10, and offers partakers $17,000 in cash prizes for developing open-source packages that could be used to build an advance robocall honeypot, circumvent or trick a honeypot, or analyze data from an existing honeypot, the FTC said.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Juniper Networks
 
Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

Home router security to be tested in upcoming hacking contest
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.The contest is called SOHOpelessly Broken—a nod to the small office/home office space targeted by the products—and follows a growing number of large scale attacks this year against routers and other home embedded systems.The competition is organized by security consultancy firm Independent Security Evaluators and advocacy group the Electronic Frontier Foundation (EFF), and will have two separate challenges.The first challenge, known as Track 0, will require researchers to demonstrate exploits for previously unknown, or zero-day, vulnerabilities in a number of popular off-the-shelf consumer wireless routers.To read this article in full or to leave a comment, please click here Read More
 

Big data security analytics 'plumbing'
  According to ESG research, 44% of enterprise organizations (i.e. those with more than 1,000 employees) consider their security data collection and analysis a "big data" application, while another 44% believe that their security data collection and analysis will become a "big data" application within the next 2 years (note: I am an ESG employee). Furthermore, 86% of enterprises collect "substantially more" or "somewhat more" security data than they did 2 years ago.The ongoing trend is pretty clear – large organizations are collecting, processing, and retaining more and more data for analysis using an assortment of tools and services from vendors like IBM, Lancope, LogRhythm, Raytheon, RSA Security, and Splunk to make the data "actionable" for risk management and incident prevention/detection/response.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Ayehu Extends IT Automation into Security Automation
Ayehu is pushing its customers into the realm of security automation through integration with security systems that generate alerts that can be automatically acted upon. This reduces time-to-mitigation for numerous types of events. Read More
 

Romanian gang used malware to defraud international money transfer firms
The cybercriminals targeted money transfer franchises in several European countries Read More
 

Systems engineer arrested in massive data leak in Japan
At least 7 million names were stolen from the database of education firm Benesse Read More
 

 

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: