Wednesday, December 04, 2013

Targeted attacks spotted in the wild exploiting Windows XP zero-day

Gaming company caught building Bitcoin mining botnet from users' computers gets off light | Experimental malware uses inaudible sound to defeat network air gaps

Network World Security

Forward this to a Friend >>>


Targeted attacks spotted in the wild exploiting Windows XP zero-day
If you need another reason to upgrade from Windows XP or Server 2003, then the new zero-day exploit is the 'tip of the iceberg.' Read More


RESOURCE COMPLIMENTS OF: Sophos

Gartner Magic Quadrant for Unified Threat Management (UTM)
Get independent research and analysis of the top vendors in the UTM market – compliments of Sophos. Click to continue

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Gaming company caught building Bitcoin mining botnet from users' computers gets off light
Read More

Experimental malware uses inaudible sound to defeat network air gaps
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Eight tips for more secure mobile shopping
Online shopping trends point to lots of people, particularly men, using their smartphones and tablets to buy holiday presents. Since some of that browsing and buying will occur at work, experts say companies would be wise to give employees the following eight tips to protect themselves and corporate data. Read More

300-pound crime-predicting mobile robot: Crime-preventing precog or 'R2D2's evil twin'?
Imagine a five-foot-tall, 300-pound mobile robot, which has a striking resemblance to R2D2, "that can see, hear, feel and smell" as it predicts and prevents crime. But not everyone thinks the surveillance-machine on wheels is cute; in fact, Marc Rotenberg, director of the Electronic Privacy and Information Center, told The New York Times that the Knightscope K5 Autonomous Data Machine "is like R2D2's... Read More


WHITE PAPER: CDW

Software Asset Management: Getting Started
Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now

Quick look: Inside Amazon's vast distribution business
Amazon has made online product selling and distribution an art form Read More

Worm may create an Internet of Harmful Things, says Symantec (Take note, Amazon)
Security researches are gradually raising warnings that the Internet of Things will increase, by multitudes, the number of things that can be hacked and attacked. The Hitchcockian plotlines are endless. Read More

DHS agent cites private medical history to deny Canadian entry into US
How did the U.S. Department of Homeland Security get hold of "confidential" medical records that indicated a wheelchair-bound Canadian woman's "mental illness" episode, which was then used to refuse her entry into the United States? Read More


SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 18 Hot IT Certifications for 2014

2. Don't click on these links

3. BlackBerry open letter to customers is long on cliches

4. VMware vSphere 5.5 bulks up with more muscle, high-availability

5. Sneaky software turns your PC into a Bitcoin-mining zombie

6. Microsoft's new volume-licensing scheme could simplify buying, managing products

7. Cisco has this SDN thing covered

8. Google Cloud Compute goes live

9. How to stay one step ahead of phishing attacks

10. Rumored Microsoft CEO plan is a very bad idea


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment