Monday, December 16, 2013

2013 computer crime blotter

US NSA debates amnesty for Edward Snowden | Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

Network World Security

Forward this to a Friend >>>


2013 computer crime blotter
Prisons around the world this year made way for techie criminals alongside the more garden variety murderers, thieves and schemers. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

WHITE PAPER: Fortinet

Key Security Considerations for the Data Center
Your Data Center firewall security will soon need to support throughput over 100Gbps. John Grady, in an IDC Analyst Connection answers key questions regarding protecting the heart of the Enterprise. Learn more >>

US NSA debates amnesty for Edward Snowden
The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about." Read More

Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards
While there's nothing quite like the warm and fuzzy feeling of giving gifts to the less fortunate, TeamBerserk hacktivists are donating "thoughtful gifts" that are paid for with credit cards belonging to naughty government officials, politicians and corporations. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Bogus antivirus program uses a dozen stolen signing certificates
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday. Read More

Security Chalk Talk: History of Computer Viruses (Part 2)
Security Chalk Talk: History of Computer Viruses (Part 2) In part 2 of this chalk talk, we explore the evolution of computer viruses from early 1990s weaponized viruses to the computer worms that dominated into the late 1990s. From: Network World Videos Views: 0 0 ratings Time: 07:13 More in Science & Technology Read More


WHITE PAPER: Dell

OVUM –Technology Profile of Dell Boomi AtomSphere
Discover an easy-to-use, powerful integration (iPaaS) solution. Organizations can now build, deploy, and manage integration processes directly from a web browser. It seamlessly connects and integrates with hundreds of SaaS appplications, and automates complex business processes. Learn more in this OVUM technical profile Learn more

Twitter reverses policy that would allow blocked persons to follow user
Twitter has reversed a controversial policy change announced Thursday that would let a user block others on Twitter, but the blocked people could still continue to follow and see the user's tweets and interact with them. Read More

FTC wants to be enforcer of data security
Despite growing pushback from some companies and powerful industry groups, the Federal Trade Commission continues to insist that it wants to be the nation's enforcer of data security standards. Read More

EFF criticizes Google for removing 'vital privacy feature' with Android 4.4.2
The Android 4.4.2 update that began to roll out Monday to Google's Nexus devices removed a feature that gave users fine-grained control over app permissions, prompting criticism from the Electronic Frontier Foundation. Read More


SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending Dec. 12

2. 10 Linux distros to watch in 2014

3. Switch to open source successfully completed, city of Munich says

4. WiFi might rot your brain (or kill your cress)

5. ITU standardizes 1Gbps over copper, but services won't come until 2015

6. Stats don't lie: Windows 8 has failed

7. Microsoft joins group seeking to replace passwords

8. As Unix fades away from data centers, it's unclear what's next

9. 25 (mostly) tech company logos with hidden meanings

10. Cisco cuts long-term revenue forecast


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment