Monday, January 24, 2011

Cisco report notes new cybercrime targets

Google fires back about search engine spam | Hacktivism a security worry for businesses in 2011

Network World Security

Forward this to a Friend >>>


Cisco report notes new cybercrime targets
Mobile platforms passing Windows PCs as scamming interfaceCybercriminals are shifting their focus to smartphones and tablets, and away from Windows-based PCs, as targets for their scams, according to a new security report from Cisco released this week. Scammers are finding it harder to infiltrate Windows-based PCs, which they have targeted for the past decade, because vendors have bolstered security on those platforms and been more aggressive in general in... Read More


WHITE PAPER: Phone Factor

5 Critical Considerations Before Renewing Security Tokens
When it comes to IT security, it's easy to simply stick with what you know. However, the threat landscape and the needs of your users are rapidly changing, and technology must evolve even more quickly to stay ahead of them. Don't make a vital mistake by overpaying for outdated authentication technology. Learn More

WHITE PAPER: PacketMotion

Frost & Sullivan Internal Segmentation
Internal Segmentation has been a growing trend over the last ten years. These solutions control data within the corporate network and actively enforce data access policies for internal staff and systems. This white paper outlines Internal Segmentation, and the benefits of using PacketSentry for Virtual Segmentation. Read now!

Google fires back about search engine spam
Google says it is taking action to weed out spamThe Google folks are taking issue over spam and the quality of Google searches which some have claimed has gone down in recent months.  Read More

Hacktivism a security worry for businesses in 2011
Security expert warns WikiLeaks-like attacks could proliferateIt's cute when social media is used to create a flash mob where hundreds of people, in one instance, gathered in New York City dressed as elves in 2009. It's potentially menacing, though, when the same organizing principle of social media is used to bring down Web sites. IT security expert Hugh Thompson says enterprises need to protect themselves from what is now called "hacktivism" because... Read More


WHITE PAPER: Qualys Inc.

The Top 10 Reports for Managing Vulnerabilities
This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure. Read now!

FBI warns of Trojan-tainted resumes, other phishing scams
New phishing scams have become so alarming, they've sparked warnings from government agencies including the FBI and Department of Defense. The scams involve claims of Patriot Act violations, WikiLeaks threats, and faked resumes.Although many people can recognize a phishing scam, countless more will fall for one. Three new ones have become so alarming, they've sparked warnings from various government agencies including the FBI and Department of Defense. The scams involve claims of Patriot Act violations, WikiLeaks threats, and faked resumes. Read More

Twitter targeted with fake antivirus software scam
Twitter has been resetting passwords for accounts that started distributing links promoting fake antivirus software in an attack that used Google's Web address shortening service to conceal the links' destination. Read More


DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Sign up for your free trial today! Learn more!

Is retaliation the answer to cyber attacks?
Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? Read More

Get more out of encryption than compliance with a mandate
Many organizations are implementing data encryption today because they have to, not because they want to. Compliance with legislative and industry mandates is forcing the issue. Unfortunately, these organizations may not be reaping the full benefit of encryption if they aren't taking a strategic approach. The Vormetric Data Security solution offers a more intelligent approach to encryption that goes beyond simply encrypting a disk. Read More

Mastering computers easier than riding a bike for kids, survey finds
Children five years old and younger are acquiring at least some computer skills at rates higher than they pick up more traditional childhood activities like swimming and bike riding, a survey says. Read More

US Supreme Court says NASA background security checks do not go too far
Background security checks are reasonable and long-standing in public and private service, Supreme Court rulesIn a long-running dispute about privacy and security, the US Supreme Court today sided with NASA saying its background checks were not invasive and that the information required for not only NASA but most government positions was a reasonable security precaution and that sufficient  privacy safeguards existed to prevent any improper disclosures. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. The case of Apple's mystery screw
  2. Is Apple expanding use of tamper-resistant screw for iPhone?
  3. Gartner slams Cisco's single-vendor network vision
  4. 12 geekiest snow and ice sculptures
  5. Yahoo IPv6 upgrade could shut out 1 million Internet users
  6. Fake GSM base station trick targets iPhones
  7. Google's management shakeup: The day after
  8. Gamers hijacked your server? Might be an inside job
  9. Cause of Windows Phone 7 data spikes found
  10. Is retaliation the answer to cyber attacks?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment