Monday, November 26, 2012

Skype says scam calls on a steady decline

HTTP Strict Transport Security becomes Internet standard | Technology built into mannequins helping stores track customers

Network World Security

Forward this to a Friend >>>


Skype says scam calls on a steady decline
Skype has been battling wily adversaries who are abusing the Internet calling application to direct people to scam websites, but the Microsoft-owned service says the sham calls are decreasing. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

82% of data breaches can be identified prior to a compromise
Knowing that your next threat may already be hiding in your logs doesn't help without powerful log and event analysis to help you find them. Safeguard your network, systems, and security infrastructure against today's threats with a proactive defense strategy using SolarWinds LEM. *Source: Verizon Business, Data Breach Investigations Report. Cover Your IT Assets by Downloading a Free Trial of Solarwinds Log & Event Manger Today!

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

HTTP Strict Transport Security becomes Internet standard
A Web security policy mechanism that promises to make HTTPS-enabled websites more resilient to various types of attacks has been approved and released as an Internet standard -- but despite support from some high-profile websites, adoption elsewhere is still low. Read More

Technology built into mannequins helping stores track customers
Facebook and Google aren't the only companies with the ability to spy on you. Brick-and-mortar stores can too a thanks to some creepy technology. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Cybercriminals are increasingly abusing .eu domains in attacks
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. Read More

Experts question guilty verdict for AT&T 'hackers'
After verdict in iPad email address case, experts say Computer Fraud and Abuse Act of 1986 needs major update Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

Symantec spots odd malware designed to corrupt databases
Symantec had spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases. Read More

Senate bill to allow warrantless government access to your online services
In a dumbfounding display of politics at work, a U.S. Senate bill that, at one point, would have protected e-mail privacy has gone the opposite way, and would allow government surveillance of online services without a warrant if passed into law. Read More

South Carolina faults weak IRS standard in massive data breach
South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data. Read More

Linux users targeted by mystery drive-by rootkit
Security researchers have discovered what appears to be an experimental Linux rootkit designed to infect its highly select victims during a classic drive-by website attack. Read More



SLIDESHOWS

Be a hero for the holidays
Peruse through Network World's 2012 version of the cool yule tools.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 7 Android apps to help you survive Black Friday
  2. Fuzzy math: VMware cost calculator can show Microsoft is cheaper
  3. Cisco's wireless chief: Meraki simplifies customers' lives
  4. HP to 'seek redress' for alleged Autonomy accounting fraud
  5. OpenOffice dumped as Freiburg plots return to Microsoft
  6. 15 best iPad apps for newbies (2012)
  7. iPhone 5S and iPad 5 may be released in mid 2013 - report says
  8. 2013 IT salaries: 15 titles getting the biggest pay raises
  9. .xxx to launch porn search engine
  10. Apple teases its Black Friday event

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment