Search This Blog

Wednesday, August 06, 2014

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down

Lawsuit against NetSuite over 'manifestly unusable' software set to be dismissed | Leaked FinFisher spyware docs detail surveillance limitations, antivirus detection

Network World Security

Forward this to a Friend >>>


Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren’t necessarily safer.Blackhole so dominated the shadowy market for exploit kits, or bundles of code for taking advantage of known software vulnerabilities, that the number of URL requests associated with exploit kits fell by 87 percent in the first half, according to the Cisco 2014 Midyear Security Report. The report was released on Tuesday during the Black Hat security conference in Las Vegas.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Skyhigh Networks

Cloud Adoption & Risk Report Reveals Top 20 Cloud Services
Based on anonymized data from over 10 million users across over 200 companies, the Skyhigh Cloud Adoption and Risk Report has become the de-facto data source on cloud adoption and risk View Now>>

WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

Lawsuit against NetSuite over 'manifestly unusable' software set to be dismissed
It's far more preferable to avoid going to court altogether when you've got a problem with your vendor, one analyst says Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Leaked FinFisher spyware docs detail surveillance limitations, antivirus detection
Leaked documents detail Gamma International's FinFisher spyware surveillance limitations, antivirus detection, spying modules and price list Read More


WHITE PAPER: Computer Sciences Corporation (CSC)

An Evolution in Enterprise Cloud Security
Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform— but that doesn't automatically make it secure. Just because you adopted a cloud environment does not make you immune to targeted Cyber attacks. Learn more

Intelligence agency wants brain tools to tell: Who's the smartest of them all?
Reuters Can a tool or technology be applied to the brain and accurately predict out of a given group of people who will be the smartest?The research arm of the Office of the Director of National Intelligence, Intelligence Advanced Research Projects Activity (IARPA) is looking for exactly those kinds of tools.“IARPA is looking to get a handle on the state of the art in brain-based predictors of future cognitive performance. In particular, IARPA is interested in non-invasive analyses of brain structure and/or function that can be used to predict who will best learn complex skills and accomplish tasks within real-world environments, and with outcome measures, that are relevant to national security.To read this article in full or to leave a comment, please click here Read More

CryptoWall ransom attacks net huge haul of Bitcoins from victims
The criminal gang behind the CryptoWall extortion malware has recently raked in a haul of Bitcoins worth hundreds of thousands of dollars from its unknown victims, security firm PhishMe has revealed.The true scale of the gang's campaign will probably run to millions in ransoms, but the firm gained an eye-opening insight into its success after taking a look at just two of the Bitcoin wallets traced to the attacks.The first used by 'Leo1' contained 710 Bitcoins worth around $710,000 (£420,000 as of 19 July), while another traced to a phishing campaign detected by one of its customers had within it 38 Bitcoins, or $22,000 worth of takings.To read this article in full or to leave a comment, please click here Read More

F5 CEO sees opportunity in myriad challenges facing IT
F5 Networks CEO John McAdam says future of IT is complicated, confusing and riddled with security threats - and that's a good thing. Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. iPhone 6 rumor rollup for the week ending Aug. 1

2. 10 things you need to know about Microsoft's Surface Pro 3

3. Why TCP/IP is on the way out

4. Black Hat 2014: How to steal security codes from home alarm systems

5. PayPal's two-factor authentication is easily beaten, researcher says

6. 10 disturbing attacks at Black Hat USA 2014

7. 11 Big Data Certifications That Will Pay Off

8. Top 20 colleges for computer science majors, based on earning potential

9. The Linux desktop-a-week review: MATE

10. New products of the week 08.04.2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: