Wednesday, July 03, 2013

California's first data-breach report finds 131 incidents hit 2.5 million citizens

  Malware steals Litecoins, Bitcoin's younger sibling | 10 funny videos about computer passwords
 
  Network World Security

Forward this to a Friend >>>


California's first data-breach report finds 131 incidents hit 2.5 million citizens
The state of California yesterday issued its first annual data-breach report saying for 2012 it recorded a total of 131 data breach incidents that put the personal data of more than 2.5 million Californians at risk. Read More


WHITE PAPER: F5 Networks

IT Consumerization - A Shift to App-centric Security
This paper examines how BYOD 2.0 builds on the BYOD 1.0 foundation but makes a substantial shift from a device-level focus to an application-level focus to reduce overhead and unburden IT by allowing them to concern themselves only with the enterprise data and applications they need to secure, manage, and control. Learn More

WHITE PAPER: Sophos, Inc.

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess
Get insight into two of the most commonly used and technically capable pieces of crimeware, the Blackhole exploit kit and the ZeroAccess rootkit. We explain why these kits are so useful to the bad guys and show you how you can stop these threats from infecting your network and your users. Learn more.

Malware steals Litecoins, Bitcoin's younger sibling
A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system. Read More


WHITE PAPER: Kaspersky

The CISO's Guide To Virtualization Security
This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively. Learn more.

10 funny videos about computer passwords
Remember the time you forgot your password? You can laugh about it now. Read More


WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

10 shocking ways the Feds are spying on you
Worried about NSA spying? That's the tip of a U.S. surveillance iceberg. Read More

Ubisoft warns of account database breach after website attack
Game maker Ubisoft said on Tuesday an account database was breached due to unauthorized access of one of its websites, revealing users' personal information. Read More

Researchers mimic board game to bolster computer security
By studying the memory game Concentration, they hope to lay the groundwork for highly accurate bot-detection programs Read More

 

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 biggest home networking mistakes (and how to fix them)

2. Microsoft shutters TechNet subscriptions

3. 10 things we love about Ubuntu 13, 5 things we hate

4. Meet the next open-source stars

5. The biggest security snafus of 2013 (so far)

6. Getting the most out of flash storage

7. The worst cloud outages of 2013 (so far)

8. VMware brain drain: Former sales chief moves on to Amazon's cloud biz

9. Stuart Biggs, the first Cisco CCIE, dies at age 53

10. A look at 22 Linux Foundation newbies

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment