Friday, March 29, 2013

How the world's largest cyberattack slows down your Internet use

  10 Geeky and Foolish Ways to Celebrate April Fools' Day | Evernote account used to deliver instructions to malware
 
  Network World Compliance

Forward this to a Friend >>>


How the world's largest cyberattack slows down your Internet use
Websites take longer to load. Netflix cuts out. Normally you can blame those annoyances on a slow Internet connection speed, but this week, it's the result of the largest global cyberattack in history. Read More


WHITE PAPER: HP & Intel®

Accelerate Performance with High Performance Computing
In this eGuide, articles from Computerworld and InfoWorld offer case studies, examples and opinions of how HPC can be applied to real-world problems today, and what the future of the technology is likely to hold. Read Now!

WEBCAST: IBM

The Power of Predictive Analytics and Optimization
See how predictive analytics and optimization can enable automated decision-making to better cope with new business conditions, improve the quality and effectiveness of decisions, and learn what works best to continuously improve over time. Learn More

10 Geeky and Foolish Ways to Celebrate April Fools' Day
The Web is the epicenter of foolishness these days, but there are also ways to celebrate April 1 offline Read More

Evernote account used to deliver instructions to malware
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. Read More

Dirty smartphones: Devices keep traces of files sent to the cloud
When smartphone users upload files to cloud-based services, remnants of those files often remain on their handheld device, even if the data is meant to be stored only in the cloud, researchers have found. Read More

6 IT Security Innovations to Keep You Ahead of Attackers
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead. Read More


WHITE PAPER: Phoenix NAP

Eliminate Virtualization Management Challenges
A hosted private cloud can offer many advantages for organizations looking to benefit from a secure cloud model. This white paper details how the hosted private cloud can address security and compliance concerns, deliver scale-up and scale-down capabilities, reduce costs and improve IT utilization all while minimizing loss of control by IT. Learn more.

Geekiest/Techiest Easter Eggs
Decorate your Easter basket with these geek-licious designs Read More

Who has responsibility for cloud security? A Network World roundtable
As more organizations leverage the cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts. Highly regulated business and government organizations in particular must maintain comprehensive security and compliance postures across these hybrid systems. Network World explores the issue in-depth with: Read More

Entrust puts down stake in the future of mobile security and digital certificates
Entrust, whose focus is identity-based security based on digital certificates, has come up with new ways its technology can play a role in mobile devices. According to Entrust CEO Bill Conner, the latest thing is putting a digital certificate in an Apple iPhone so it can be used to wirelessly sign in to a PC or Macintosh. Read More

Wisconsin man charged with participating in Anonymous DDoS
A man in Wisconsin has been charged with participation in a distributed denial-of-service attack in February, 2011 against Koch Industries by hacker group Anonymous . Read More


WHITE PAPER: Moovweb

Why Responsive Design Isn't Good Enough… And How to Fix It
This white paper digs into the responsive web design hype, discusses the pros and cons of this technique and proposes a next generation approach that doesn't force you to compromise. Read Now!

New malware shows Android has target on its back
Recently discovered Android malware used in targeted attacks against Tibetan and Uyghur activists in Europe is a warning to U.S. companies that mobile devices will likely be the mark in future cyberespionage attacks, experts say. Read More

IRS uncorks Dirty Dozen Tax Scams for 2013
The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money. Read More

Pirated software a shortcut to malware and worse, says IDC report
Consumers and businesses that choose to use pirated software are running an extremely high risk of malware infection while searching for and downloading it, a new IDC report on behalf of Microsoft has claimed. Read More

Wells Fargo warns of ongoing DDOS attacks
Wells Fargo warned on Tuesday that its website is being targeted again by a distributed denial-of-service (DDOS) attack. Read More

INSIDER
How to blunt spear phishing attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. Read More

 
 
 

SLIDESHOWS

Best tools for social media analytics

How to tell if your Facebook, Twitter and LinkedIn efforts are paying off.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. YouTube change more unpopular than Congress?

2. Dirty smartphones: Devices keep traces of files sent to the cloud

3. IRS uncorks Dirty Dozen Tax Scams for 2013

9. Microsoft's relationship with Samsung gets ugly

5. Juniper losing its enterprise mojo

6. iPhone 6 rumor rollup for the week ending March 22

7. Yahoo buys teen's startup for $30M, hires him .. and what?

8. Deep inside Windows Blue: 10 coolest features in Microsoft's leaked OS

10. 10 real-world big data deployments that will change our lives

4. Geekiest/techiest Easter eggs

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment