Search This Blog

Friday, August 09, 2013

Black Hat shows its quirky side

Smartphones could evolve into password killers | Start-up Defense.Net debuts with anti-DDoS service

Network World Compliance

Forward this to a Friend >>>


Black Hat shows its quirky side
From an Edward Snowden cutout to panties with a message the premier security conference has it all Read More


WHITE PAPER: CDW

Secured Transactions: PCI Compliance
Compliance is no simple task. It requires several steps across many systems with different guidelines for different organizations. Plus, it's a continual task. But compliance is mandatory. And you must overcome these challenges to avoid penalties. Read Now

In this Issue


WHITE PAPER: IBM

Powerful Application Solutions for CRM & ERP
This white paper examines how you can get the most from CRM and ERP, find the best system for your business and how IBM can help. Learn More.

Smartphones could evolve into password killers
But much depends on the development of highly reliable biometric technology Read More

Start-up Defense.Net debuts with anti-DDoS service
Start-up Defense.net makes its debut today with the aim of stopping distributed denial-of-service (DDoS) attacks aimed by attackers against both enterprises and cloud service networks. Read More

Twitter's latest login security feature may be too complex for most users
Like Google and Facebook, Twitter is experimenting with multi-factor authentication Read More

Malware-as-a-service blossoms in Russia, vendor research finds
An investigation by mobile security vendor Lookout warns that malware is being transformed into a large-scale, sophisticated software business, complete with customer support. The main target: fraudulent SMS charges costing endusers and operators millions each year. Read More

Blogs, other content management sites targeted by password thieves
Brute force attacks aimed at snaring login credentials are on the upswing Read More


WHITE PAPER: ExtraHop Networks

Poster: Rx for Healthcare IT Operations
ExtraHop enables healthcare IT organizations to harness the massive amounts of wire data flowing through their environments. See how ExtraHop can help to manage departmental and legacy applications while also supporting new initiatives such as meaningful use, compliance, VDI, EHR/EMR, and mobile applications. Learn More>>

Trend Micro: Hacker threats to water supplies are real
A decoy water control system disguised as belonging to a U.S. municipality, caught the attention of a hacking group tied to the Chinese military Read More

If governments ban China-based Lenovo, should companies?
U.S., several other countries have banned computers from Lenovo after finding backdoors in hardware in firmware, report says Read More

Hands-on: Android device manager confirms that, yes, Google really is watching
Google's Android Device Manager, a web service designed to help track lost or stolen phones and tablets, began rolling out Wednesday, using your Google account to keep an eye on you. Read More

New security scheme whacks text spammers in hours
A new way to track the source of spam text messages can detect culprits within two hours, helping reduce the illicit traffic that can clog cell towers and disconnect legitimate calls, researchers say. Read More

12 BYOD Disaster Scenarios
Everyone seems to be jumping on the Bring Your Own Device bandwagon, but it's a bumpy ride. There are many ways to fall off and get a bloody nose (or worse). As the BYOD reality catches up to the hype, here are 12 very real disaster scenarios. Read More


WEBCAST: IBM

Content Analytics Explained
Content Analytics Explained - Listen to Bob Foyle, Sr. Product Manager, IBM talk about Content Analytics and the Analytics Imperative. Learn More.

Held for ransom! What to do if ransomware takes over a PC
What would you do if a U.S. Federal government agency locked your PC until you paid a fine? While the PC may be locked and seemingly unusable, it's not the Department of Justice or FBI that has done this to you. Quite the contrary, the lock was placed by malware distributed by a cyber criminal that the FBI would like to catch. In effect, your PC has been hijacked and held for ransom. Read More

Decision to buy cyber insurance usually leaves CIO, CISO out of the loop: survey
A Ponemon survey out today shows about a third of business and public-sector organizations buy cyber insurance to help protect them financially against data breaches and other security exploits. But the survey of 638 U.S. organizations shows there's still a lot of skepticism about whether such insurance is worth the cost. Read More

6 Ways Employees Are Putting Your Company's Data at Risk
IT walks a fine line between balancing security issues and giving people the tools they need to get the job done. Every day companies move sensitive data around and IT is in charge of securing that data, but what about the little things that tend to fall through the cracks? Read More

Microsoft warns of Wi-Fi-related flaw that can expose Windows Phone credentials
Microsoft warns of Wi-Fi vulnerability that can expose Windows Phone security credentials. Read More

Black Hat: Elliptic curve cryptography coming as smarter algorithms threaten RSA
Within five years the math for cracking encryption algorithms could become so efficient that it may render today's commonly used RSA public key cryptography algorithm obsolete, Black Hat attendees were told. Read More


SLIDESHOWS

Sizzling back-to-school tech deals

Apple Macs to Google Chromebooks to Microsoft Surface tablets are being discounted in hopes of wooing students (or their parents and teachers).

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. China has massive Windows XP problem

2. Android device manager confirms that, yes, Google really is watching

3. IBM devises software for its experimental brain-like chips

4. Why Amazon and others don't specifically report cloud revenues

5. 15 more useful Cisco sites

6. The high-tech world of Jeff Bezos

7. Verizon worker thankful 911 operator could hear him now

8. First California AMBER alert shows AT&T's Emergency Alerts System to be a mess

9. 11 signs your IT project is doomed

10. China's Huawei unveils SDN programmable switch, taking aim at Cisco


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: