Search This Blog

Thursday, July 17, 2014

The Black Hat Quiz 2014

Network World Security - Newsletter - networkworld.com
  Microsoft researchers: Re-use the same password across sites likely to be hacked | There's almost a million fake apps targeting your phone

 
  Network World Security

Forward this to a Friend >>>


The Black Hat Quiz 2014
How well do you know the security conference's revelations about NSA, pwned cars, spying cell phones and more? Read More
 


RESOURCE COMPLIMENTS OF: Citrix Systems

Defend Web Properties from Threats with Citrix NetScaler
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler provides the visibility and control to manage, accelerate, and secure web properties, so you can deliver the service and security your users demand. To learn more, read the report: Defend Web Properties from Modern Threats with NetScaler.

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

Microsoft researchers: Re-use the same password across sites likely to be hacked
Microsoft Researchers Cormac Herley and Dinei Florencio, the same guys who previously wrote "Sex, Lies and Cybercrime Surveys" to explain why cybercrime loss estimates are a bunch of bunk, are not afraid of directly challenging "accepted wisdom and conventional advice." The duo was joined by Carleton University's Paul Van Oorschot to explore "how to manage a portfolio of passwords." Their advice may surprise you since they claim "Password re-use can be part of a coping strategy." Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts (pdf) will be presented at the 23rd USENIX Security Symposium in August.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Juniper Networks
 
Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

There's almost a million fake apps targeting your phone
Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.The company looked at the top 50 free apps in Google's Play Store and then searched Google's app store and others to see if fake versions existed. It found fake versions existed for 77 percent of the apps. The fake apps are often made to look like the real ones and have the same functions, but carry a dangerous extra payload."We've been tracking the activity of malicious or high-risk apps for nearly five years," said JD Sherry, vice president of technology and solutions at Trend Micro. "The potential for people to slip things past the gate and appear legitimate is much easier."To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Microsoft's future under Nadella less about Windows, more about mobile and cloud
The company is moving away from its past devotion to its OS Read More
 

 

INSIDER
Developing a smart approach to SMAC security
As businesses look to take advantage of SMAC (social, mobile, analytics, and cloud) platforms, they first need to consider the risks and security implications of the technologies involved Read More

 

SSL Blacklist project exposes certificates used by malware
Researchers launch effort to track SSL certificates used in botnet and malware operations Read More
 

 

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Ubuntu 14.04: Is Canonical taking on too much

2. Microsoft COO tells partners to get with the cloud program now

3. Say goodbye to desktop phones

4. Apple, IBM join to make iOS the default mobile platform

5. Windows Phone 8.1 and its first update could appear this week

6. U.S. malware share rising, Amazon service No.1 in hosting it

7. 10 disturbing attacks at Black Hat USA 2014

8. Microsoft may lay off over 6,000 employees

9. Russian hackers breach CNET, steal one million usernames, passwords and email addresses

10. Microsoft rumored to be buying security firm that publicized Active Directory exploit


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: