Search This Blog

Friday, September 20, 2013

FBI warns “Beta Bot” malware can kill your anti-virus programs, steal data

70 percent of business users vulnerable to latest Internet Explorer Zero-Day | Vampire mice and zombie hard drives: USB dangers lurk in Linux

Network World Security

Forward this to a Friend >>>


FBI warns "Beta Bot" malware can kill your anti-virus programs, steal data
The FBI sent out a warning today about an uptick in the use of malware known as Beta Bot that can steal sensitive data such as log-in credentials and financial information. The FBI says Beta Bot blocks computer users' access to security websites and disables anti-virus programs, leaving computers vulnerable to compromise. Cyber criminals aiming Beta Bot at financial institutions, e-commerce sites,... Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Free Whitepaper from SolarWinds: NetFlow Tips & Tricks
Network bandwidth usage is one of the biggest contributors to your network performance. By taking advantage of the flow technology that is built into most routers and switches, you can quickly identify bottlenecks and troubleshoot bandwidth related problems. Take your NetFlow skills to the next level! Read this FREE whitepaper for an introduction to NetFlow & other flow technologies, as well as configuring your network to collect flow data.

WEBCAST: CDNetworks

Reaching China with Your Website & Cloud Application
Reaching customers and employees with cloud applications when they are located in emerging markets (such as Russia, Indonesia, Brazil and China) poses a major challenge. Learn how a CDN can help you not only deliver a fast download of your website and web applications even in China, but can also help you manage content and regulatory issues. View Now

70 percent of business users vulnerable to latest Internet Explorer Zero-Day
Microsoft alert says all supported versions of Internet Explorer contain a zero day vulnerability that is being actively targeted online, and 70 percent of Windows business users are impacted Read More

Vampire mice and zombie hard drives: USB dangers lurk in Linux
NEW ORLEANS - Linux kernel developer Sarah Sharp is searching for a solution to the problem posed by vampire mice, she said in a presentation at LinuxCon North America Wednesday afternoon. Read More


WHITE PAPER: Good Technology

10 Requirements from Real Customer Deployments
Mobile Device Management (MDM) has ushered in on-the-go access to enterprise data, but that convenience has only whetted the appetite of enterprise users. View Now

Energy Department spends $30M to bolster utility cybersecurity tools
The Department of Energy today awarded $30 million to a 11 security vendors to develop technology the agency says will better protect nation's electric grid, oil and gas infrastructure from cyber-attack. Read More

Healthcare IT Security Is Difficult, But Not Impossible
Data breaches threaten healthcare organizations from all angles -- from hackers, thieves and forgetful employees -- and touch all facets of IT infrastructure. Updated HIPAA rules make organizations responsible for the actions of their business associates, too. Healthcare IT security is a daunting task, but with a little planning, it's not an impossible one. Read More


WHITE PAPER: Symantec

Are Your Mobile Policies Keeping Up?
For CIOs, CISOs, VPs of IT Operations, Mobile Architects, Mobile Program Managers, this paper summarizes the late 2012 Ovum study on what BYOD is, why business people should pay attention to it, and how they should meet emerging opportunities and threats. View Now

Critics say federal court got it wrong in defense of NSA activity
Court's rationale allows collection of almost any information on Americans, including all financial transactions and Internet activity Read More

12 lines the IT helpdesk hates to hear
These 12 questions and requests are guaranteed to draw groans from practically any IT pro in the world Read More

Hacking courses offer cybercrooks tips on how to hone skills
A growing number of experienced hackers have begun offering structured hacking courses for crooks seeking to make a career in cybercrime. Read More

Another flawed Office update tells users to buy the suite
Microsoft yesterday acknowledged yet another problem with its Sept. 10 updates, confirming that one of those fixes broke Office 2010 Starter Edition by changing the file associations of already-created documents. Read More


SLIDESHOWS

The Android naming quiz

The upcoming version of Android is called KitKat, but how well do you know the earlier release names?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Today's iOS 7 downloads an unprecedented challenge for IT

2. Microsoft warns of IE zero day in the wild, all IE versions vulnerable

3. The 7 best new features in iOS 7

4. iPad 5 rumor rollup for the week ending Sept. 17

5. Apple iOS 7: Six key things to do before you tap 'Download'

6. Education networks see massive traffic spikes from iOS 7 update

7. KVM vendor creating open source hypervisor specifically for cloud workloads

8. Apple issues internal high priority alert in light of iOS 7 download issues

9. Apple's iOS 7 icons are ugly and a step backwards

10. Computer science major ranks No. 8 for salary potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: