Search This Blog

Wednesday, January 22, 2014

ATMs could be compromised when Windows XP support ends

Microsoft will furnish malware assassin to XP users until mid-2015 | Target hackers may have stolen useless data

Network World Security

Forward this to a Friend >>>


ATMs could be compromised when Windows XP support ends
If you think getting your father or elder family member to upgrade their old XP PC is tough ("Why?" they ask. "It works just fine," they say.), imagine what the banks face. They will be hit hard by the end of support for Windows XP because almost all of the automatic teller machines (ATMs) in the country use XP. Read More


WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

WHITE PAPER: IBM

Find Out 10 Ways to Build Better CRM Processes
When implemented properly, CRM and ERP can enable better sales, more efficient marketing, and drive both top line and bottom line revenue growth. This IT Managers' Journal gives IT managers and business leaders 10 steps that can help them transform CRM into a winning solution for revenue growth and business efficiency. Read Now

Microsoft will furnish malware assassin to XP users until mid-2015
Microsoft will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system in April. Read More

Target hackers may have stolen useless data
In a recent interview, Andrew Komarov, CEO of U.S. security startup IntelCrawler, described the malware used in the Target data breach to be a dump-memory-scraper that infected Target's Windows-based Point-Of-Sale (POS) registers. The malware Komarov identified, named Reedum, was a variant of the BlackPOS malware that he discovered in March of 2013, and is difficult to detect using malware scanners.... Read More

Top 25 most commonly used and worst passwords of 2013
All the website breaches and endless warnings about the use of weak passwords finally soaked in and resulted in a change to the most commonly-used and worst password on the Internet, which was "password". But before you get too excited about netizens embracing better cybersecurity habits, know that "123456" is #1 and "password" fell to #2 on the list of top 25 worst passwords of 2013. Read More


WHITE PAPER: F5 Networks

Achieving Brute Force DDoS Protection
Many security solutions tout the ability to withstand brute force layer 7 Dos attacks. However, most of today's DoS attacks overwhelm applications by sending more than one million request attempts per second. Learn more >> Read more>>

NASA: Space station dodged debris 16 times in past 15 years
NASA recently wrote that the International Space Station has, during its first 15 years of operations, made 16 space junk collision avoidance maneuvers and been closely threatened another four times. Read More

When will everyone be wearing their cameras?
I realized today I had forgotten to post at least one more video from CES 2014 - it was this interview with Steve Ward of VIEVU, which was showing off its new VIEVU2 (pronounced "Vee View Squared") wearable video camera. The company makes body-worn video cameras for police officers, and the VIEVU2 is aimed at the prosumer market, but this includes professionals such as "private security, insurance,... Read More

The Cybersecurity skills gap is worse than you think
Read More


WHITE PAPER: HP and Intel® Xeon® processors

Why Storage Convergence? Why Now?
In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage's comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one. Learn More

Start-up takes on threat detection and intelligence-sharing for the enterprise
Start-up Confer recently debuted with software and services aimed at detecting stealthy malware and attackers targeting enterprise servers, laptops and mobile devices. Though market competition is fierce, Confer believes it can win through its application behavior-analysis approach and its cloud-managed threat-intelligence platform that makes use of the open protocol called STIX. Read More

The 8 most significant ways physical security has evolved
Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Read More

Mysterious networking error stifles Internet access in China
A networking error in China briefly crippled Internet access to many local sites in the country, as the nation's user traffic was strangely redirected to an IP address located in the U.S. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 12 toughest U.S. cities for tech recruiting

2. 10 oddball real-world tech job interview questions

3. 14 steps to a better, faster Windows laptop

4. The hottest Chinese Internet firms you've never heard of

5. This Raspberry Pi Tablet is absolutely gorgeous

6. HP sticks thumb in Microsoft's eye, discounts consumer Windows 7 PCs

7. Watch out Amazon: What IBM's $1.2B cloud investment really means

8. SDN will never happen, says VMware exec

9. Firewall start-up Aorato sniffs out Active Directory anomalies

10. Top 25 most commonly used and worst passwords of 2013


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: