Wednesday, November 06, 2013

FBI adds five lawbreakers to Cyber Most Wanted list

Battling against zero-day exploit black market, Microsoft expands $100,000 bug bounty | Employees easily tricked on social media prime phishing attacks

Network World Security

Forward this to a Friend >>>


FBI adds five lawbreakers to Cyber Most Wanted list
The FBI said today it had added five people wanted for a variety of cyber crimes - ranging from domestic and international hacking to fraud - to its Cyber Most Wanted list. Rewards of up to $100,000 are offered for information leading to their arrests, the FBI says. The criminals are responsible for hurting hundreds of thousands of victims and incurring tens of millions of dollars in losses, the FBI... Read More


RESOURCE COMPLIMENTS OF: Sophos

Gartner Magic Quadrant for Unified Threat Management (UTM)
Get independent research and analysis of the top vendors in the UTM market – compliments of Sophos. Click to continue

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Battling against zero-day exploit black market, Microsoft expands $100,000 bug bounty
In the current zero-day exploit market, it's common to pay out six-figures for a single exploit and now Microsoft has thrown open the door and invited more security-minded individuals to compete for the $100,000 prize. Read More

Employees easily tricked on social media prime phishing attacks
Spear phishing is one of the most effective ways to break into a corporate network, and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Trade some privacy for a special offer? Consumers aren't sure
Consumers are getting more aware that they can be tracked while they walk around stores but plenty still feel uncomfortable about it, according to a new survey. Read More

Biggest Tech Industry Layoffs of 2013
HP, IBM, Cisco and Juniper among those slimming down this year Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

'Selfish miner' attack could devastate Bitcoin, researchers say
Bitcoin is vulnerable to an attack that could have devastating effects on the virtual currency, but it can be fixed with a software update, according to researchers from Cornell University. Read More

Senators question security at HealthCare.gov
U.S. lawmakers questioned the security of HealthCare.gov, the U.S. government's troubled insurance-shopping website, after reports that one applicant's personal information was shared with another applicant. Read More

Spike in traffic with TCP source port zero has some researchers worried
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more serious attacks, according to security researchers from Cisco Systems. Read More

NIST to review standards after cryptographers cry foul over NSA meddling
The federal institute that sets national standards for how government, private citizens and business guard the privacy of their files and communications is reviewing all of its previous recommendations. Read More


SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Intel's open-source Galileo computer on sale for $69.90

2. Chinese professor builds Li-Fi system with retail parts

3. 12 must-have iPad apps for newbies

4. Microsoft to can Skype API, third-party products will not work

5. 11 sure signs you've been hacked

6. Arista fires broadside at Cisco/Insieme with new switches

7. 10 companies making the Internet of things a reality

8. CryptoLocker crooks charge 10 Bitcoins for second-chance decryption service

9. Cisco puts its unified computing servers into OpenStack clouds

10. Google introduces Helpouts, a new way to get help over video


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment