Search This Blog

Thursday, November 01, 2012

Researcher warns "zombie browsers" are skyrocketing

  Microsoft sponsors a hacking contest - the coding kind | Stolen cellphone databases switched on in US
 
  Network World Security

Forward this to a Friend >>>


Researcher warns "zombie browsers" are skyrocketing
Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's session, spy on webcams, upload and download files, and in the newer mobile-device area, hack into Google Android phones. Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

Microsoft sponsors a hacking contest - the coding kind
In a dimly lit function room on the Microsoft campus 40 teams of coders are spending the week writing modern applications that run on Windows 8 and Windows Phone 8 devices, all of them assured of winning a prize. Read More

Stolen cellphone databases switched on in US
U.S. cellphone carriers took a major step on Wednesday toward curbing the rising number of smartphone thefts with the introduction of databases that will block stolen phones from being used on domestic networks. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Tuesday, October 30th at 12:00pm ET Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

FBI cybersecurity shift draws skepticism from experts
The FBI has changed its cybersecurity strategy to place greater emphasis on identifying the criminals behind attacks, a shift that some experts say won't make a dent in hacking operations. Read More

Caveats for VPN users in public Wi-Fi hotspot networks
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas. Read More


WEBCAST: Dell SonicWall

Why First Generation Firewalls Aren't Making the Grade
In this exclusive webinar, learn from Dell-SonicWALL's Patrick Sweeney, how today's Next-Generation Firewalls allow businesses to scale their network security to meet the demands of emerging threats and new technology trends, while ensuring performance to meet key business objectives. Resister Now!

True Halloween IT Horror Stories
In celebration of Halloween I wanted to bring you some real life horror stories from the IT world. You can listen in below as Nimrod "Nimmy" Reichenberg, VP of marketing and business development at Algosec and Matthew Pascucci, a security researcher and writer share with us some of the more celebrated and interesting horror stories they have seen in IT recently. Read More

Bank phishing gang arrested after hotel swoop
UK police have arrested three men accused of being involved in large-scale Trojan phishing attacks against a range of banks. Read More

California issues notices to app developers for non-compliance with privacy law
Notices will be sent out to developers of up to 100 mobile apps that are not compliant with California privacy law, starting with those who have the most popular apps available on mobile platforms, the office of the state's attorney general Kamala D. Harris said Tuesday. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  2. First look: Google's Nexus 10 tablet
  3. Windows RT Surface tablet boasts excellent design, but it's still a tough sell
  4. EFF, 9 other groups, push Open Wireless Movement
  5. Microsoft greases the skids for Windows 8 developers
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Cisco network really was $100 million more
  8. .xxx to launch porn search engine
  9. 2012 tech industry graveyard
  10. Want a security pro? For starters, get politically incorrect and understand geek culture
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: