Thursday, August 09, 2012

Apple stops password resets after iCloud hack

  Federal watchdog calls on FCC to reassess mobile phone radiation issues | Why would tech support call you? Don't fall for phishing
 
  Network World Security

Forward this to a Friend >>>


Apple stops password resets after iCloud hack
Apple has told its support staff not to process password change requests that come in via the phones. An Apple customer service representative said that Apple was halting all AppleID password resets by phone. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

WHITE PAPER: Teradata

Experts Share the Five Pieces of Private Cloud Success
Private clouds are emerging as a way for enterprises to take advantage of many of the benefits of the cloud model, but with less risk. This eBook discusses why private cloud models are the best choice for many organizations today. Learn more.

Federal watchdog calls on FCC to reassess mobile phone radiation issues
Noting that the Federal Communications Commission's Radio Frequency exposure limits may not reflect the latest research, and testing requirements may not identify maximum exposure in all possible usage conditions, the Government Accountability Office today said the agency should reassess and possibly change its regulations regarding mobile phone radiation. Read More

Why would tech support call you? Don't fall for phishing
Well, most of the time, we would not call you. But even though support teams rarely make calls to customers, there has been a rise in a social engineering attack where someone impersonating support staff calls and informs the IT department that there is a bug in such-and-such a system. Even though customers know they don't normally receive calls from support, they are willing to provide impersonators... Read More

Shylock malware injects rogue phone numbers in online banking websites
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

No bomb powerful enough to destroy an on-rushing asteroid, sorry Bruce Willis
Maybe it's the doom predictions some folks are fearing about the end of the Mayan calendar this year or maybe these guys are obsessed with old Bruce Willis movies. Either way a class of physics students from the University of Leicester decided to evaluate whether or not the premise of Willis' 1998 "Armageddon" movie -- where a group of oil drillers is sent by NASA to detonate nucle Read More

The Honan Hack Is The Alamo For Two Factor Authentication
By now I hope you have read about the devastating hack of Wired writer Mat Honan. It serves as a chilling example of how much of our lives are in the digital sphere today and what can happen if they keys to that sphere fall into the wrong hands. Reading Honan's story I was of course empathizing with him because of my own nightmare with passwords being hacked. Read More

How to Send Sensitive Information Via Email
Suppose corporate needs your bank's routing and account numbers to get you set up for direct deposits. Or the IT department needs your password to upgrade or modify your account. Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

Leak Police have gone crazy: Danger Room under fire for leaking imaginary weapon
Washington has its panties in a serious twist about U.S. national security leaks, so much so that the New York Times said "Washington is currently going a little nuts on the subject of leaks." In June, the feds began investigating who leaked classified Stuxnet cyberattack details to the NYT. Read More

Have a bright idea? You could get $25,000 from Lockheed-Martin
Contests and challenges are all the rage and wanting to jump on that intellectual capital bandwagon, Lockheed Martin today announced the "Innovate the Future" contest that could net one person $25,000 for a really cool idea t Read More

Prototype system goes after DNS-based botnets
Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. Read More

 
 
 

SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Largest IT employment gains in four years reported
  2. My Twitter account was hacked! It can happen to you too
  3. Guilty as charged! A10 Networks feels the patent blues
  4. The day VMware ate Cisco part 2: A deep dive with Nicira co-founder
  5. XBMC now working with Android gaming sensation Ouya
  6. The iPhone patent Steve Jobs particularly cared about -- inertial scrolling
  7. 6 hottest IT certifications
  8. Have a bright idea? You could get $25,000 from Lockheed-Martin
  9. 7 reasons Google's Nexus 7 beats the iPad
  10. Prototype system goes after DNS-based botnets
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment