Wednesday, January 16, 2013

Meet Red October, the latest cyber-spy malware for digital espionage

  Random security predictions for 2013 | 25 crazy and scary things the TSA has found on travelers
 
  Network World Security

Forward this to a Friend >>>


Meet Red October, the latest cyber-spy malware for digital espionage
In October 2012, Kaspersky Lab began looking into yet another digital espionage attack that has been ongoing since 2007. Yesterday the security firm said the "Red October" campaign targeted "diplomatic and governmental agencies of various countries across the world, in addition to research institutions, energy and nuclear groups, and trade and aerospace targets" for the last five years. However "Kaspersky... Read More


WHITE PAPER: MegaPath

Managing risk in the modern business world
The ways in which technology penetrates corporations today have significantly changed. No longer is the IT department in control; business units are spending more of their own budgets on technology than ever before Read Now

WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

Random security predictions for 2013
It's January 15 which means I probably should have posted a blog on my security predictions for 2013. Here is a somewhat random list of things I believe will happen this year: 1. Visible increase in hacktivism. Hacktivists have a lot to build upon in 2013 including the tragic death or Aaron Swartz, some notable 2012 successes by Anonymous (ex. OpVendetta), the trial of PFC Bradley Manning, etc.... Read More

25 crazy and scary things the TSA has found on travelers
From snakes, chain saws, stun guns, grenades and cannonballs, the Transportation Security Administration has not seen it all yet Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

RSA betting its future on big data
RSA, the security division of EMC, is looking to big data for the future of security, arguing that applying analytics to massive amounts of data related to users, their devices and network management will be increasingly important to detect fraud and cyberattacks. Read More

INSIDER
What to expect in the world of IT in 2013
The economic recovery is moving at an unsteady pace, but the emphasis on cost-cutting that dominated IT agendas in recent years is sharing the spotlight with a more interesting imperative: innovation. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Java security comes down to 'war of attrition'
Users and Oracle both need to do their part against a malware industrial complex that can quickly attack any security hole Read More

Dire warnings don't yield better critical infrastructure security
The warnings of possible catastrophic cyberattacks on critical infrastructure in the U.S. have been issued for more than a decade. They were frequent and insistent in 2012, from high-ranking government officials and others. Read More

Forrester survey tries to pinpoint hardest-working CISOs across the world
Do chief information security officers (CISOs) in North America work harder than their security counterparts in Europe? Read More

Unlucky Las Vegas man besieged by lost-phone seekers
Wayne Dobson has had all he can take of Sprint customers showing up at his Las Vegas home to demand that he hand over the cell phone of theirs that they are mistakenly certain Dobson possesses because a GPS-based tracking application has led them to his front door. Police corroborate Dobson's professions that he is no phone thief, in part because they, too, have mistakenly responded to the man's address.... Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Oracle releases emergency Java patch; experts warn flaws may take 2 years to fix
  2. 10 superb free tools for all of your basic business needs
  3. IT pros reveal the best career advice they ever received
  4. Circle your calendars: Geekiest celebration days of 2013
  5. HP appoints networking expert to lead cloud unit in exec shakeup
  6. VMware one-ups Microsoft with vSphere 5.1
  7. Chrome 24 vs. Firefox 18 - head to head
  8. iPhone 6 rumor rollup for week ending Jan. 11
  9. Microsoft to release emergency Internet Explorer patch on Monday
  10. How Apple sets its prices
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment