Search This Blog

Tuesday, August 26, 2014

Russia's bid to expose users highlights law enforcement's tricky relationship with Tor

  Feds closer to expanded search & seizure authority to remotely hack into PCs | Enterprise Security Professionals Speak Out on SDN Use Cases for Network Security

  Network World Security  

Russia's bid to expose users highlights law enforcement's tricky relationship with Tor
On Friday, Russia's Ministry of the Interior awarded a contract for $110,000 to an unnamed Russian contractor with top security clearance to uncloak Russian users of the surveillance-evading Tor browser. Despite that admittedly anemic effort and a more committed one from the NSA, Tor remains the best bet for remaining anonymous on the Internet. Read More


RESOURCE COMPLIMENTS OF: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...
Multiple vicious ransomware strains are now attacking your end-users. You cannot just rely on your filters - you also have to step your end-users through effective security awareness training. Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in some industries a ransomware attack is considered a data breach. Get a quote for your organization now and your users trained ASAP. Find out about KnowBe4's unique crypto-ransom guarantee. Find out how affordable this is for your organization. Click on the link and GET A QUOTE NOW:

WHITE PAPER: Dell Software
     
Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

Feds closer to expanded search & seizure authority to remotely hack into PCs
A committee of federal judges proposed new remote search and seizure rules that the Department of Justice has been seeking in order to expand the FBI's authority to remotely hack into PCs. The DoJ wants the warrants that allow such searches and seizures to apply across the U.S., not just in the jurisdictions in which they were issued. Read More

Enterprise Security Professionals Speak Out on SDN Use Cases for Network Security
A survey of enterprise security pros shows that more than a quarter want to use software defined networks to block malicious traffic and improve network security auditing and conflict resolution. Nearly that many want to use SDN to centralize network security service policy and configuration as well as automate network security remediation tasks, according to Enterprise Strategy Group. Read More


WHITE PAPER: Skyhigh Networks
     
Cloud Adoption & Risk Report Reveals Top 20 Cloud Services
Based on anonymized data from over 10 million users across over 200 companies, the Skyhigh Cloud Adoption and Risk Report has become the de-facto data source on cloud adoption and risk View Now>>

Attack targets firms from the automobile industry in Europe
Attackers are sending emails containing a new information-stealing Trojan program to customer service departments, Symantec researchers said.The attacks started in early August and primarily targeted rental, insurance, transport and secondary market businesses for commercial and agricultural vehicles. Read More

Is massive DNS hack responsible for Charter Internet outage?
Charter Communications has suffered major Internet outages across the U.S. Customers are reporting that changing the DNS IP addresses have restored service, fueling speculation that the company was a victim of a massive DNS hack. Read More


WEBCAST: Arcserve

Business-driven Data Protection
Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the Arcserve team will offer insights and solutions to make data protection a strategic component of your business. Learn more!

Is the open floor plan trend a data security headache?
Companies like Facebook and Google market their open-office floor plans to potential employees, touting that the design allows workers to work closely together and fosters a culture of collaboration. They also promote security issues like visual hacking, device and document threat, and loss of speech privacy. Read More

PlayStation network back online after DDoS attack
Sony's PlayStation and Entertainment networks are back online after they were forced offline by a distributed denial-of-service (DDoS) attack, the company says. "We have seen no evidence of any intrusion to the network and no evidence of any unauthorized access to users personal information," a spokesperson said, offering apologies for any inconvenience to customers. Read More

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Is massive DNS hack responsible for Charter Internet outage?

2. Is Wi-Fi killing us...slowly?

3. Internet of Overwhelming Things

4. Ten tech products that died on arrival

5. Why TCP/IP is on the way out

6. Hottest IT Certification

7. Apple iWatch release may be pushed back to 2015

8. The top 14 hidden features in Windows, iOS, and Android

9. Top 5 things to watch for at VMWorld 2014

10. Hacking traffic lights with a laptop is easy

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: