US NSA debates amnesty for Edward Snowden | Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards | |||||||||
Network World Security | |||||||||
2013 computer crime blotter WHITE PAPER: New Relic Secure, Reliable & Proven APM for the Enterprise Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now In this Issue
WHITE PAPER: Fortinet Key Security Considerations for the Data Center Your Data Center firewall security will soon need to support throughput over 100Gbps. John Grady, in an IDC Analyst Connection answers key questions regarding protecting the heart of the Enterprise. Learn more >> US NSA debates amnesty for Edward Snowden Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards WHITE PAPER: AT&T How to navigate the ever-changing mobile device landscape Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More Bogus antivirus program uses a dozen stolen signing certificates Security Chalk Talk: History of Computer Viruses (Part 2) WHITE PAPER: Dell OVUM Technology Profile of Dell Boomi AtomSphere Discover an easy-to-use, powerful integration (iPaaS) solution. Organizations can now build, deploy, and manage integration processes directly from a web browser. It seamlessly connects and integrates with hundreds of SaaS appplications, and automates complex business processes. Learn more in this OVUM technical profile Learn more Twitter reverses policy that would allow blocked persons to follow user FTC wants to be enforcer of data security EFF criticizes Google for removing 'vital privacy feature' with Android 4.4.2 | |||||||||
SLIDESHOWS 8 tricks to optimize Windows 8.1 Here are eight things we recommend doing to make Windows 8.1 more efficient. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. iPhone 6 rumor rollup for the week ending Dec. 12 2. 10 Linux distros to watch in 2014 3. Switch to open source successfully completed, city of Munich says 4. WiFi might rot your brain (or kill your cress) 5. ITU standardizes 1Gbps over copper, but services won't come until 2015 6. Stats don't lie: Windows 8 has failed 7. Microsoft joins group seeking to replace passwords 8. As Unix fades away from data centers, it's unclear what's next 9. 25 (mostly) tech company logos with hidden meanings 10. Cisco cuts long-term revenue forecast | |||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, December 16, 2013
2013 computer crime blotter
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment