Search This Blog

Wednesday, July 09, 2014

Scammers want to wreck your business, vacation travel

  Microsoft debugs Explorer, Windows with Patch Tuesday updates | Vulnerability in AVG security toolbar puts IE users at risk

  Network World Security

Forward this to a Friend >>>


Scammers want to wreck your business, vacation travel
Yes I suppose it is what it is, but sadly you can't travel on business or vacation and let your electronic guard down.   The Federal Trade Commission recently published a few scams it was warning travelers to be on the lookout for including: The late night front desk call: You think you're getting a late-night call from the front desk telling you there's a problem with your credit card, and they need to verify the number, so you read it to them over the phone. But it's really a scammer on the line. If a hotel really had an issue with your card, they would ask you to come to the front desk. +More on Network World: FBI warns businesses "Man-in-the-E-Mail" scam escalating+To read this article in full or to leave a comment, please click here Read More



WHITE PAPER: Cobalt Data Centers

The Right Home for Your Systems and Data
Not all colocation providers offer the same value and functionality, and many come with inherent risks. When choosing a colocation provider, careful consideration is essential. Learn More

Microsoft debugs Explorer, Windows with Patch Tuesday updates
Another month of security updates from Microsoft means, once again, another round of fixes for the company's Internet Explorer (IE) Web browser, as well as a set of updates for the Windows operating system, for both the server and desktop editions.Overall, Microsoft has issued six bulletins in July's "Patch Tuesday" collection of software fixes. Microsoft issues these collections on the second Tuesday of each month, hence the name "Patch Tuesday."Two of the patches are marked as critical, meaning they address defects in Microsoft's software that could be readily exploited by malicious attackers to compromise systems. One of the critical bulletins is for IE, and the other one is for Windows.To read this article in full or to leave a comment, please click here Read More

Vulnerability in AVG security toolbar puts IE users at risk
Bad design decisions could have enabled malware infections, researchers from CERT/CC said Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Thieves steal 40,000 gadgets from Samsung factory in Brazil
A Samsung factory in Brazil was robbed of at least $6.3 million in hardware by a gang of about 20 armed people at around midnight on Monday, according to reports from local media. The Samsung facility is located in Campinas, a city of roughly 1 million people located about 60 miles northwest of São Paulo. Brazilian police told O Globo that the criminals stopped a van full of employees on the way to the facility, used their stolen ID badges to gain entry, and kept two of the victims as hostages. + ALSO ON NETWORK WORLD: Gartner scales back Windows forecast | Blue Shield discloses 18,000 doctors' Social Security numbers +To read this article in full or to leave a comment, please click here Read More

Chinese hackers switched targets to U.S. experts on Iraq
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on nearby Southeast Asia suddenly changed targets last month to focus on the Middle East -- Iraq, in particular -- security researchers said Monday.The group, called "Deep Panda," switched from exploiting one area of expertise to another because of the march of the Islamic State of Iraq and the Levant (ISIS) towards Baghdad, and the collapse of Iraq's security forces in the north and west of the country."The networks [of the think tanks] had been previously compromised, but Deep Panda pivoted to target systems and individuals with ties to the Middle East and Iraq," said Dmitri Alperovitch, co-founder and CTO of CrowdStrike, an Irvine, Calif. security company, of the overnight switch. The shift in Deep Panda's targeting happened on June 18, the day that ISIS began to attack the strategically important oil refinery at Baiji, 155 miles north of Baghdad.To read this article in full or to leave a comment, please click here Read More


WEBCAST: HP

Meg Whitman presents Unlocking IT with Big Data
Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More

Blue Shield discloses 18,000 doctors' Social Security numbers
A mistake left thousands of Social Security numbers in publicly available files Read More

Android bug lets apps make rogue phone calls
The flaw affects the majority of Android devices in use and could easily be exploited by malware to make premium-rate calls Read More

PF Chang's says breach was 'highly sophisticated criminal operation'
But the restaurant chain still hasn't said how many cards were affected or how the data was stolen Read More

 

SLIDESHOWS

Tech companies pick up tab for pricey CEO perks

CEO pay packages include perks such as access to the corporate jet, home security, and financial planning advice.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What planet does Larry Page live on?

2. Superclass: 14 of the world's best living programmers

3. Bloody June: What's behind last month's DDoS attacks?

4. Cisco's Latest CCNP Security Updates

5. 5 things you no longer need to do for mobile security

6. Open source tool could sniff out most heavily censored websites

7. Google's Larry Page talks of killing the 40-hour work week

8. Tech companies pick up tab for pricey CEO perks

9. Why Cisco, Intel, and Qualcomm are funding IoT

10. What to expect from 11ac's next big deal: multiuser MIMO


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: