Friday, November 30, 2012

IRS needs bigger weapons to fight exploding identity theft-related tax refund fraud schemes

  Cisco's internal security team fights to corral BYOD, malware and Wild West environment | Security Analytics Is In Fact A Big Data Problem
 
  Network World Security

Forward this to a Friend >>>


IRS needs bigger weapons to fight exploding identity theft-related tax refund fraud schemes
There is a battle going on between what seems to be an army of fraudsters bent on using stolen identities to steal tax refunds and the Internal Revenue Service which has weapons to fight the problems but is obviously overwhelmed. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WHITE PAPER: Condusiv Technologies (formerly Diskeeper Corporation)

What Really Happens to Your Deleted Files
You might be surprised! In this White Paper, many of the common and incorrect assumptions about file protection and recovery are detailed as well as a look Condusiv Technologies' Undelete 10, which fills many of the gaps left by other "recovery" methods. Read Now!

Cisco's internal security team fights to corral BYOD, malware and Wild West environment
Many organizations have a computer security incident response team (CSIRT) that swoops into action to battle malware outbreaks, other types of cyberattacks and possible insider threats, and at networking giant Cisco, that CSIRT team is made up of about 60 people trying to protect a business with about 75,000 employees. Read More

Security Analytics Is In Fact A Big Data Problem
At the 2012 RSA Security Conference, ESG participated on a panel of experts to discuss whether security analytics would soon be considered "big data." ESG and the other panelists agreed that this intersection was coming, we just weren't sure of the timing. Were we right? ESG recently completed research project to find out. As part of this effort, ESG surveyed 257 security professionals working... Read More


WEBCAST: Hortonworks

Apache Hadoop Just Got Simpler
Hortonworks recently unveiled the Hortonworks Data Platform (HDP), which is 100% open source data management software powered by Apache Hadoop. HDP makes Hadoop easier to install, integrate, manage and use for enterprises and solution providers. View Now

When password security questions aren't secure
When you select a password, you might choose to store it in a password manager, write it down, or commit it to memory (see "How to remember passwords" for some advice). Sometimes, however, things go wrong: You find yourself without access to your password manager, you lose the paper on which you recorded your passwords, or you forget a password you thought you memorized. Or maybe someone tries to break into one of your accounts, and after a few unsuccessful attempts at entering your password, the site locks out further access until you can confirm your identity. Read More

ATM fraudster faces jail after skimming 9,000 PINs
A Romanian man faces a jail sentence after being convicted of skimming 9,000 ATM PINs that could have allowed to him steal over APS3 million ($4.8 million) from British victims. Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

ICO fines company for sending 840,000 spam texts a day
The Information Commissioner's Office (ICO) has slapped a hefty APS440,000 fine on the owners of Tetrus Telecoms for harassing the public with hundreds and thousands of spam texts a day over the past three years. Read More

Internet Explorer 10's 'do not track' risks upsetting users, finds poll
Microsoft's decision to turn on Internet Explorer 10's 'do not track' setting by default could turn some consumers against the browser if it interferes with features such as password retention and autofill, a new survey has concluded. Read More

Damage from attack on power grid would surpass Sandy
The U.S. is in urgent need of a nationwide strategy to protect its highly vulnerable electric grid from succumbing to a cyberattack that could cause far more damage than Hurricane Sandy, a recent report said. Read More

PCI internal scan and risk management requirements met by iScan Online
Last June the PCI Council substantially upped the ante on merchants who use the Internet to store or transmit credit card data. Prior to June merchants who used the Internet (or a public network in the words of the Council), had to have a quarterly external ASV scan. For many smaller merchants this was no more than having an Approved Scanning Vendor (ASV) scan to the router or gateway quarterly.... Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. GOP Congressman's attempt to look cool on Reddit backfires
  2. 10 hard truths IT must learn to accept
  3. 14 of the most useful Linux websites
  4. Is Windows 8 really a sitting duck for malware?
  5. Latest Java zero-day exploit renews calls to disable it
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. Alcatel-Lucent to take on Cisco, VMware in crowding SDN field
  8. Android Jelly Bean resurrected my HP Touchpad
  9. Talking about Linux online: There are, in fact, stupid questions
  10. Mobile browser vulnerability lets hackers steal cloud computing time
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment