Search This Blog

Friday, July 24, 2015

SLAPPED! The Year in Tech Industry Fines

Hacker: 'Hundreds of thousands' of vehicles are at risk of attack | US court says 'pocket-dialed' calls are not private

Network World Compliance

SLAPPED! The Year in Tech Industry Fines
It’s not like most of the big carriers and tech companies can’t afford a fine or two from the FCC, Justice Department or Federal Trade Commission here and there, but it’s still not the best publicity. Here’s a rundown of the year in tech industry fines to date: Read More


WHITE PAPER: Cisco Systems

Cisco ASA with FirePOWER Services
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More

WHITE PAPER: Entrust, Inc.

5 Ways Mobile will Transform Enterprise Authentication
Mobile devices are secure — in fact, more secure than PCs. And their transportability makes them more convenient too. By leveraging mobile devices in your enterprise authentication, you can take significant strides toward both bolstering efficiency and strengthening security. Learn More

Hacker: 'Hundreds of thousands' of vehicles are at risk of attack
A security expert who recently demonstrated he could hack into a Jeep and control its most vital functions said the same could be done with hundreds of thousands of other vehicles on the road today. Security experts Charlie Miller and Chris Valasek collaborated with Wired magazine to demonstrate how they could remotely hack into and control the entertainment system as well as more vital functions of a 2015 Jeep Cherokee. Both hackers are experienced IT security researchers. Miller is a former NAS hacker and security researcher for Twitter and Valasek is the director of security research at IOActive, a consultancy.To read this article in full or to leave a comment, please click here Read More

US court says 'pocket-dialed' calls are not private
People who don't take basic steps against pocket dialing haven't shown they have an expectation of privacy Read More

Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
Researchers show they can recover sensitive cookies from RC4-encrypted TLS connections in 75 hours Read More

Microsoft follows Google to crack down on revenge porn
A special Web form will allow revenge porn victims to report content they want removed from Bing, OneDrive or Xbox Live Read More


WHITE PAPER: IBM

3 Guiding Principles to Improve Data Security and Compliance
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Learn More

How to check if you've been attacked by Hacking Team intrusion malware
Hacking Team malware has been attacking computers and smartphones --- and you may be infected without knowing it. Here's how to find out if you're infected. Read More

Microsoft will remove reported revenge porn links from Bing, OneDrive and Xbox Live
Microsoft set up a page for victims to report revenge porn so links can be removed from Bing, OneDrive and Xbox Live. Read More

Belgian government phishing test goes off-track
A drill caused confusion when a regional government impersonated a rail company without informing it Read More

EFF: Modify DMCA to protect independent research into car hacking
The Electronic Frontier Foundation is renewing its efforts to remove one obstacle to independent safety research involving automobiles: the Digital Millennium Copyright Act. Read More


WHITE PAPER: IBM

Delivering a Smarter Shopping Experience with Analytics
Predictive Analytics Market Basket Analysis can provide the highly targeted shopping experience that helps increase the size of the shopping basket and retail sales. Learn More

Five arrested in JPMorgan hacking case
Bloomberg sources claim a recent set of arrests are related to the 2014 JPMorgan computer compromise affecting 83 million people Read More

Biggest tech industry layoffs of 2015, so far
While the United States unemployment rate has hit a post-recession low, the network and computing industry has not been without significant layoffs so far in 2015.Some companies’ workforce reductions are tricky to calculate, as layoff plans announced by the likes of HP in recent years have been spread across multiple years. But here’s a rundown of this year's big layoffs either formally announced or widely reported on.MORE: Bloodiest Tech Industry Layoffs of 2014 To read this article in full or to leave a comment, please click here Read More

Grooveshark music service co-founder Josh Greenberg dies at 28
LinkedIn Josh Greenberg The tech startup world has been shaken today by news that 28-year-old Josh Greenberg, co-founder of recently defunct music sharing service Grooveshark, was found dead on Sunday in the Florida apartment he shared with his girlfriend. No foul play is suspected, but the local medical examiner is conducting an autopsy, according to the Gainesville Sun, which originally reported on Greenberg's passing. To read this article in full or to leave a comment, please click here Read More

ALMOST off the grid at Yellowstone, Glacier national parks
Bob Brown/NetworkWorld I’d heard that I might be cut off from cellphone service when visiting Yellowstone National Park and Glacier National Park for the first time earlier this month, but didn’t quite believe it until I got there. Sure enough, my Verizon-powered iPhone showed No Service most of the time I was there, pretty much to my relief. Yes, there was "VERY LIMITED" Wi-Fi in the lodges, but even there it was pretty tough to squeeze onto the shared network. And the lodge operators did their best to block out non-guests from interloping on their "sattelite [sic]" network.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Best handheld Wi-Fi test tools

Here, we review four hardware-based products that you can throw in a laptop bag and carry around with you.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2015

1. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. Thieves using a $17 power amplifier to break into cars with remote keyless systems

4. 9 Common Spanning Tree Mistakes

5. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

6. 20 cool things you can do with a Raspberry Pi

7. How to solve Windows 7 crashes in minutes

8. 6 free network vulnerability scanners

9. How to solve Windows 8 crashes in less than a minute

10. 9 Linux distros to watch in 2015


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: