Search This Blog

Friday, November 15, 2013

Businesses offer best practices for escaping CryptoLocker hell

Security Threat Landscape - November 2013: Bad BIOS and CryptoLocker | Research shows arms dealer used in cyberespionage attacks

Network World Security

Forward this to a Friend >>>


Businesses offer best practices for escaping CryptoLocker hell
It is an IT nightmare: Businesses hit with the CryptoLocker malware find their electronic files locked up inside strong encryption and the extortionist operating the malware botnet demanding money to give them the security key that would let companies get their data back. What do you do to escape this crypto hell of ransomware? A few corporations here detail their experiences with the nasty malware and say in many cases back-up and restoration was their only way out. Read More


WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

RESOURCE COMPLIMENTS OF: SolarWinds

New Video: How to Configure NetFlow v9 on a Cisco Router
Networks can grow fast—really fast. This rapid growth leads to increased network traffic, more endpoints, and new IPs consuming bandwidth. Key to a complete understanding of network behavior at your growing organization is the ability to collect and analyze NetFlow data in your routers. SolarWinds new video shows you how, in less than 5 minutes! Looking to enable Flexible NetFlow on your Cisco routers? In less than 5 minutes, SolarWinds lead Sales Engineer demonstrates how to enable NetFlow v9 on Cisco routers with custom flow records. Watch the short how to video now!

Security Threat Landscape - November 2013: Bad BIOS and CryptoLocker
Security Threat Landscape - November 2013: Bad BIOS and CryptoLocker Network World's Keith Shaw talks with Fortinet's Derek Manky about the Bad BIOS malware proof-of-concept (and how it can jump air-gapped networks) and the latest on the CryptoLocker ransomware... From: Network World Videos Views: 4 0 ratings Time: 11:17 More in Science & Technology Read More

Research shows arms dealer used in cyberespionage attacks
Companies battling tireless cyberespionage campaigns may be up against well-organized attackers that are fed a steady stream of malware from a talented developer of cyber-arms. Read More

Hackers compromise 860,000 MacRumors forum accounts
The estimated 860,000 users of the popular MacRumors web forum have been told to change their passwords immediately after hackers successfully compromised an admin account in order to steal personal and login data. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Seven ways PSIM helps campuses address tough security challenges
A rash of deadly shootings at college campuses and schools in recent years has placed security in the spotlight. The debate over school violence and how to combat it has typically focused on mental health, training, and gun control. But can security technology play a role? Read More

Keypic, replacing CAPTCHA without annoying users
Read More

Security policy orchestration eases the process of making changes to complex networks
It's growing more difficult to monitor and manage the near-constant changes to network configurations. Tufin Technologies introduces security policy orchestration is order to bring automation, collaboration and integration to the process. The benefits include reducing the time to make secure changes from a week to a day. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Adobe patches critical vulnerabilities in Flash Player, ColdFusion
Adobe Systems released security updates for Flash Player, AIR and ColdFusion to fix critical vulnerabilities that could allow attackers to take control of affected systems or read information from servers without authorization. Read More

10 mistakes companies make after a data breach
Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy. Read More

Keypic, replacing CAPTCHA without annoying users
Read More


SLIDESHOWS

Recent iOS app updates people hate

We looked at the top 100 iPhone and iPad apps in the Business category, free or paid, that were last updated in September or October 2013 to find the ones users HATE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. US intelligence wants to radically advance facial recognition software

2. Amazon bashes private clouds, launches virtual desktops

3. 12 hot security start-ups to watch

4. Microsoft: No, we're not ditching on-premise Exchange

5. New Juniper CEO: Meet the real Shaygan Kheradpir

6. Nexus 5 is designed to work on Verizon Wireless, and most other networks

7. Juniper taps new CEO with CIO roots

8. Verizon: LTE service didn't keep up with demand

9. Cruise line plans 11ac network upgrades for stem-to-stern Wi-Fi

10. Wikileaks releases draft of long-secret trade proposal


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: