Search This Blog

Friday, February 20, 2015

CMU Computer Science School's epic admissions blunder

Your IT security infrastructure, rebooted for 2015 | Most memorable SNL tech skits & bits

Network World Compliance

CMU Computer Science School's epic admissions blunder
A timeline/roundup of Carnegie Mellon University Computer Science School mistakenly accepting 800 applicants to its grad program, only to send out rejection notices hours later Read More


WHITE PAPER: Nasuni

Shadow IT in the Enterprise
This report reveals insights from more than 1,000 corporate IT users about their usage of Dropbox and personal mobile devices for work. Read this paper to gain an understanding for where consumer solutions are being used and if IT policies are effective in addressing the challenges associated with Shadow IT. Learn More.

In this Issue


WHITE PAPER: Nasuni

Bulk Data Migration in the Cloud
In tests of cloud-to-cloud transfers, Nasuni compared the top three CSPs from its most recent State of Cloud Storage report – Amazon S3, Microsoft Windows Azure and Rackspace – and compared transfer rates among them. Learn More

INSIDER
Your IT security infrastructure, rebooted for 2015
Consider the IT trends of recent years: the emergence of cloud computing and the "as-a-service" model, the growth of social media as a corporate marketing and collaboration tool, and the increase in the use of mobile technology — all of which have helped give rise to an increasingly distributed workforce.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Most memorable SNL tech skits & bits
In the wake of SNL celebrating its 40th anniversary this past weekend (complete with a free SNL 40 iOS app), we take a trip back through some of Saturday Night Live's most memorable techie skits and bits. Feel free to hit me up if there are good ones I missed (I purposely left out a few NSFW ones).With smartphones, computers and the Internet going mainstream in recent years, tech has become a much more prevalent subject on the late night show.Google Glass Tech's diversity problemTo read this article in full or to leave a comment, please click here Read More

INSIDER
5 tricks to improve poor TCP performance
Transmission Control Protocol carries the vast majority of the data transmitted across both the public Internet and private intranets. Web sessions using HTTP, file transfers, file sharing and system backups typically use TCP. Windows desktop configurations loaded at start-up are TCP based.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Tens of thousands of home routers at risk with duplicate SSH keys
The setup mistake could put the routers at risk of being compromised Read More

Long-awaited Blackphone tablet may emerge at MWC
The secure device maker is also holding a press conference at the show where the tablet could be announced Read More


WHITE PAPER: VMTurbo, Inc.

Cloud: Delivering Performance in Shared Environments
This whitepaper explores how service providers use VMTurbo to provide consistent performance across all workloads, as well as the three roles a responsible managed service provider (MSP) takes in order to accomplish that directive. Learn More

Personal weather stations can expose your Wi-Fi network
Netatmo weather stations upload Wi-Fi passwords and SSIDs to the company's servers over insecure connections Read More

Lenovo PCs ship with adware that puts computers at risk
Superfish software installed on Lenovo computers uses a self-generated root certificate to intercept HTTPS communications Read More

INSIDER
Beware of hot foreign spies who want to steal your data
“We’re probably looking at a 300-percent increase in cases involving hot foreign spies, sex, and dating in the last year over the previous year,” says T. Casey Fleming, CEO, BLACKOPS Partners Corporation, a management consulting company on security to the Fortune 500.Mitigating foreign spiesTo read this article in full or to leave a comment, please click here(Insider Story) Read More

What's in a typo? More evidence tying North Korea to the Sony hack
A security firm says code used against Sony has similarities to other malware linked to North Korea Read More

Fanny superworm likely the precursor to Stuxnet
The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet Read More


WHITE PAPER: Nasuni

Nasuni in Architecture and Construction Environments
Firms in the architecture, engineering and construction (AEC) verticals face a unique challenge – enabling collaboration amongst projects and teams dispersed across the globe. Adding to the complexity of the situation are the large files created due to programs such as AutoCAD, Revit, and Bentley MicroStation. Learn More

Cybercriminal gang plunders up to $1 billion from banks over two years
Once inside a bank's network, the gang studied how it performed wire transfers in order to better mask fraud Read More

How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
Lenovo’s been caught going a bit too far in its quest for bloatware money, and the results have put its users at risk. The company has been preloading Superfish, a "visual search" tool that includes adware that fakes the encryption certificates for every HTTPS-protected site you visit, on its PCs since at least the middle of 2014. Essentially, the software conducts a man-in-the-middle attack to fill the websites you visit with ads, and leaves you vulnerable to hackers in its wake.MORE ON NETWORK WORLD: Free security tools you should try You can read all the sordid details here. This article is dedicated to helping you discover whether your Lenovo PC is infected with Superfish, and how to eradicate it if you are.To read this article in full or to leave a comment, please click here Read More

Federal Cybersecurity Duplicity
As part of a whistle-stop tour of Northern California, President Obama held a White House Summit on Cybersecurity and Consumer Protection at Stanford University last Friday.  Much to the delight of the Silicon Valley crowd, the President signed an executive order (right there on stage at Stanford) to promote data sharing about digital threats.  The summit also highlighted industry leaders like Apple CEO Tim Cook, and large critical infrastructure organizations like Bank of America and Pacific Gas & Electric Co.The President picked the right location for his cybersecurity bully pulpit.  The Peninsula is a nexus of technology optimism, constantly focused on the new new thing.  The event also attracted the Sand Hill Road crowd, eager to capitalize on national cybersecurity gaga. To read this article in full or to leave a comment, please click here Read More

Commercial spyware invades enterprises
Two out of every 1,000 employee smartphones in the U.S., on average, are infected with commercial "child-monitoring" spyware, according to a study by security firms Lacoon Mobile Security and Check Point.For larger organizations, the infection rates are even higher, according to Michael Shaulov, CEO of Lacoon.The study started with 900,000 smartphones connected to corporate Wi-Fi networks around the world, looking for any of the 18 most common commercially-available mobile surveillance kits.On average, 0.12 percent of all devices worldwide were infected, with Austria in the lead at 0.36 percent, followed by the U.S. at 0.21 percent.To read this article in full or to leave a comment, please click here Read More

INSIDER
IT careers: How to switch industries and survive
After David Berry had spent a quarter of a century specializing in consumer products, he'd had enough. He'd worked for Pepsi, Dannon, Haagen-Dazs, Burger King and others, holding down various IT positions and eventually making it to CIO. It was time to switch to a new industry -- but were other industries interested in him?To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Best open source monitoring tools

We found all four products to be capable network monitoring tools that performed well in our basic tasks.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Torvalds: 'People who start writing kernel code get hired really quickly"

2. Tens of thousands of home routers at risk with duplicate SSH keys

3. 7 social engineering scams and how to avoid them

4. Microsoft targets June for Windows 10 completion

5. Apple Watch launch projected to be 7 times more successful than Android Wear

6. 5 tricks to improve poor TCP performance

7. How long will it take for Internet of Things Hello Barbie to be hacked?

8. HP latest to unbundle switch hardware, software

9. President Obama's cybersecurity executive order fiasco

10. Top password managers compared


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: