Search This Blog

Wednesday, July 17, 2013

New digitally signed Mac malware confuses users with right-to-left file name tricks

  Can your IP address give away your identity to hackers, stalkers and cybercrooks? | 3D modeling software helps design one-of-a-kind guitars
 
  Network World Security

Forward this to a Friend >>>


New digitally signed Mac malware confuses users with right-to-left file name tricks
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it. Read More


WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

Can your IP address give away your identity to hackers, stalkers and cybercrooks?
In today's world of hackers, stalkers and cybercriminals, not to mention government spy programs and commercial sites that collect information about you for advertising purposes, is there a way to surf the Web and keep your privacy intact? Or does that mere fact that you have an IP address mean that your identity is out there for the taking? Read More

3D modeling software helps design one-of-a-kind guitars
The design team at Redpoint Studios uses Autodesk's Fusion 360 to design custom wood guitars. Follow reporter Nick Barber on Twitter @nickjb Read More

What IT recruiters know about you -- whether you're looking or not
What recruiters know about you is about to get a whole lot deeper than what you put on your resume. An emerging class of search engines is taking a big data approach to recruiting by crawling the Web for every bit of data about you, assembling it into a master profile, rating your knowledge, skill levels and interests, and serving it up to recruiters who can filter it by location, skill, the school you attended and a range of other criteria. Read More


WHITE PAPER: Dell Inc.

Current Cloud Adoption Trends
No longer limited to early adopters in small organizations, cloud computing has become pervasive in midsize and large organizations. The survey results in this report highlight how strategic-minded IT decision makers in North America are overcoming security concerns and adopting private, public and hybrid clouds. Learn More

How to Keep Terrorists, Hackers and Other Bad Guys From Stealing Your Data
Public cloud providers offer inexpensive application hosting and data storage services. However, relying on a service provider to secure your data is risky business, so you need to take your own precautions. Here's what it takes to ensure security without breaking the bank. Read More

Start-up morphs open-source security system for research networks into commercial platform
A start-up named Broala has been formed to expand the open-source intrusion detection system known simply as Bro that has been used in high-speed research networks for about two decades. Read More

Small, electric-powered nano-lasers may help keep Moore's Law valid
Read More


WHITE PAPER: EMC Corporation & WWT

Kicking Off the Data Center Cloud Transformation with VSPEX
In this Solution Guide, World Wide Technology (WWT) reveals its data center cloud model in-depth and presents solutions around cloud computing with a standardized product set and advancing to an integration stage Read Now

Open-source tool to ease security researchers' quest for secrecy
To be presented and released at Black Hat, CrowdStrike's Tortilla delivers to researchers much-needed anonymity on Windows machines Read More

INSIDER
5 security best practices for SMBs
If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably aren't able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. Read More

Petition calls for an end to passwords
Passwords are a thing of the past -- and they need to go, according to a group of Silicon Valley-based tech companies who are part of a public advocacy campaign called Petition Against Passwords. Read More

 

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. AT&T offers phones on monthly installments, with annual upgrades

2. The data center fabric checklist you should know

3. Microsoft Surface RT price slashed $150

4. Bill Gates vows the return of Microsoft Bob

5. Start-ups lean hard on CPU-based security technology to protect virtual environments

6. 10 tech blockbusters (just waiting to be made)

7. Encryption no protection from government surveillance

8. SDN, NFV creeping into provider networks

9. A vendor-independent comparison of NoSQL databases

10. iPad 5 rumor rollup for the week ending July 11

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: