Search This Blog

Monday, July 01, 2013

The nastiest cyber security stink-bombs of 2013 (so far)

  FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say | Nintendo warns against super Pokemon creator app
 
  Network World Security

Forward this to a Friend >>>


The nastiest cyber security stink-bombs of 2013 (so far)
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say
Voluntary program welcomed, but advocates would like to see the agency do more with the authority it has to guard consumer privacy online Read More

Nintendo warns against super Pokemon creator app
Nintendo warned Friday against the use of a smartphone app that can be used to create custom, all-powerful Pokemon characters for use in its handheld games. Read More


WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

More than 50% of consumers say they've been victimized by bad apps
Two-factor authentication could bolster security, but many don't know what it is or resist using it Read More

Encryption practices vary widely in the cloud, survey finds
A survey by Ponemon Institute of 4,205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the cloud, while taking various approaches to encrypting that data. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Report: US general under investigation for Stuxnet leak
A former high-ranking U.S. military official is reportedly under investigation for leaking classified information related to the use of malicious software to disrupt Iran's uranium refinement program. Read More

With Carberp source code's release, security pros expect the worst
Leak of the once-pricey Trojan's code more dangerous than 2011 Zeus release because Carberp includes a bootkit component, experts note Read More

FTC wins monster $7.5 million penalty against "Do Not Call" list violator
The Federal Trade Commission today said it has won a $7.5 million civil penalty – the largest ever -- against Mortgage Investors Corporation, one of the nation's biggest refinancers of veterans' home loans for allegedly violating "Do Not Call" requirements. Read More

 

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. FTC wins monster $7.5 million penalty against 'Do Not Call' list violator

2. 8 Skype interview no-nos

3. Stuart Biggs, the first Cisco CCIE, dies at age 53

4. How will cloud, virtualization and SDN complicate future firewall security?

5. 8 hot mobile startups to watch

6. Scientist out to break Amdahl's law

7. Chambers: Cisco waited too long to address SDNs

8. Cisco fixes serious vulnerabilities in email, Web and content security appliances

9. Cisco, Insieme tout 'penalty-free' fabric architecture

10. Breaking down Cisco's new data center strategy

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: