Search This Blog

Thursday, August 21, 2014

'Reveton' ransomware upgraded with powerful password stealer

Many Chrome browser extensions do sneaky things | Plug-and-play Android security layer outlined by NC State researchers

Network World Security

Forward this to a Friend >>>


'Reveton' ransomware upgraded with powerful password stealer
Avast thinks its controllers are trying to diversify after profits have fallen Read More


RESOURCE COMPLIMENTS OF: CSO Perspective

Defending Against the Pervasive Attacker: CSO Conference
Attend the Boston-area CSO Perspectives Conference on Tuesday, September 16 at the Sheraton Framingham Hotel. Learn about the latest strategies to defend against today's pervasive attacker, and find out what other organizations are doing to create successful and proactive defenses. Register now.

WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

Many Chrome browser extensions do sneaky things
A study of 48,000 Chrome extensions uncovers ad fraud, data theft and other misdeeds Read More

Plug-and-play Android security layer outlined by NC State researchers
A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible.The Android Security Modules framework, as outlined in a paper from researchers North Carolina State University and Germany’s TU Darmstadt, is a programmable interface for deploying security updates in the field, without the need for root access to the Android device.+ ALSO ON NETWORK WORLD: Munich reverses course, may ditch Linux for Microsoft | 5 Cool Security Breakthroughs at USENIX Security event +To read this article in full or to leave a comment, please click here Read More

US Navy goes all Iron Man for industrial duty
It may not be the job Tony Stark or his Iron Man suit had in mind, but its still pretty cool. The US Navy said it is buying two Lockheed Martin exoskeletons to test out for industrial work on ships. Lockheed says its FORTIS exoskeleton “transfers loads through the exoskeleton to the ground in standing or kneeling positions and allows operators to use heavy tools as if they were weightless. An advanced ergonomic design moves naturally with the body and adapts to different body types and heights. Using the [system], operators can effortlessly hold objects up to 36 pounds, increasing productivity by reducing muscle fatigue and avoiding muscle injury.”To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dell Software

Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

Moving toward smart and secure continuous software delivery
Experts contend continuous software integration and delivery practices can boost secure coding practices. Read More

Hacking traffic lights with a laptop is easy
You’ve seen traffic lights hacked in movies like Live Free or Die Hard or The Italian Job. If you are gamer, then you might have “hacked” traffic lights in the video game Watch Dogs to cause epic wrecks and allow you to escape the cops. But now security researchers have hacked traffic lights in real life and say it’s easy to do; a person only needs a laptop and wireless card operating on the same 5.8 gigahertz frequency as the wirelessly networked traffic lights, then he or she could access the entire unencrypted network. Watch Dogs Hacking traffic control systems was a topic presented at Def Con 22 by IOActive Lab’s Cesar Cerrudo. He said that after attending his talk, “Anyone will be able to hack these devices and mess with traffic control systems since there is no patch available.” He added, “I was able to access the sensor. I was able to see the configuration of them – if I wanted to I could have compromised them. I didn't do it.”To read this article in full or to leave a comment, please click here Read More

12 oddball odes to open-source
Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe Read More


: Aerohive

Navigating the New Wireless Landscape
Wireless LAN controllers are about to become obsolete—a fate sealed by the advent of 802.11ac. This KnowledgeVault is packed with informative short videos, webcasts and white papers that show how you can capitalize on this emerging trend. View Now>>

Five ways to keep your student's digital life safe
As students return to school, technology goes with them. That technology—and the data generated by it—is valuable not simply as a means for getting school work done, but also as entertainment for those brief hours between one assignment and the next. It’s for this reason that it pays to plan for disaster. With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne’er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.MORE ON NETWORK WORLD: Free security tools you should try Insure the gear Parents, if your student lives in school-affiliated housing, it’s possible that your homeowners insurance covers their stuff—but not without some cost to you. Should your child’s laptop or iPhone be stolen or swept away in a flood, a replacement won’t come free. Such policies generally have a deductible of several hundred dollars and the remaining compensation is often limited to around 10 percent of your total coverage. So, if you carry a policy that insures the contents of your home up to $150,000, the yearly limit on a kid’s gear is $15,000 when they live in student housing.To read this article in full or to leave a comment, please click here Read More

Start-up offers up endpoint detection and response for behavior-based malware
Start-up SentinelOne is offering security software for behavior-based malware detection intended to augment, not replace, the type of full anti-virus endpoint protection suites that typically also have signature-based defense, a firewall and other features. However, the Mountain View, Calif.-based start-up, which has research and development roots in Israel and has received $14.5 million in venture-capital funding, does harbor ambitions to break into the multi-billion dollar anti-virus market to compete with the kind of full-featured endpoint protection suites offered today by the major vendors such as Symantec and McAfee. + ALSO ON NETWORK WORLD Start-up fights attacks on SDN, virtual-machine networks +To read this article in full or to leave a comment, please click here Read More

About 4.5M face risk of ID theft after hack of hospital network
Community Health Systems says Chinese hackers accessed names, social security numbers and other data of people it treated or referred Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Munich reverses course, may ditch Linux for Microsoft

2. 5 cool new security research breakthroughs

3. Top 5 things to watch for at VMWorld 2014

4. The Samsung Z is dead: Is Tizen next?

5. 2014's Hottest IT Certification

6. New Microsoft same as the old Microsoft

7. The 5 most anticipated smartphone launches coming in September

8. Why TCP/IP is on the way out

9. Best and funniest Apple iWatch design concepts

10. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: