Friday, January 24, 2014

Did Microsoft reach into your PC to stomp a botnet?

CNN's Twitter and Facebook accounts hacked | Tech's biggest lobbyists

Network World Security

Forward this to a Friend >>>


Did Microsoft reach into your PC to stomp a botnet?
Microsoft took down yet another botnet, but its method for doing so many not sit well with a lot of people, as the company removed software from their computers without their knowledge. Read More


WHITE PAPER: IBM

Advanced Multi-Platform Virtualization Management
Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience. Learn More

WHITE PAPER: VCE

Rompetrol Case Study
After a successful acquisition and growth phase, Rompetrol turned its energy into improving global operations by consolidating IT operations and launching a series of IT initiatives including an SAP rollout and a move toward private cloud. Learn More

CNN's Twitter and Facebook accounts hacked
A number of CNN's social media accounts and blogs were hacked Thursday by a group styling itself as the Syrian Electronic Army. Read More

Tech's biggest lobbyists
How Cisco, Google & others looked to win friends, influence legislators in 2013 Read More


WHITE PAPER: 8x8, Inc

When Disaster Strikes, Can the Cloud Save Your Business?
Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place." Learn more >>

Three security startups you should keep an eye on
Security start-ups Skyfence Networks and Zimperium made their official debut today, while another still in stealth mode, Bluebox Security, announced this week additional funding bringing it to a $27.5 million in venture capital. Read More

Hacker groups embracing more effective tactics in targeted attacks
Hacker groups increasingly compromised industry websites in 2013 in an attempt to load malware onto the computers of employees of targeted companies and government agencies, a global threat report found. Read More


WHITE PAPER: IBM

A Smarter Approach to CRM: An IBM Perspective
Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More.

Dungeons & Dragons at 40: A history
An overview of the first tabletop RPG and a look back at its four decades of life. Read More

Why smart users are the key to secure online banking
Online banking is not 100% secure -- nothing is. That is not expected to change in 2014. But a number of security experts, along with an industry official, say it is reasonably safe, if users take reasonable precautions. Read More

New Windows malware tries to infect Android devices connected to PCs
A new computer Trojan program attempts to install mobile banking malware on Android devices when they're connected to infected PCs, according to researchers from Symantec. Read More

Google dismisses eavesdropping threat in Chrome feature
Google said there's no threat from a speech recognition feature in its Chrome browser that a developer said could be used to listen in on users. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Modern PCs that run the Windows you really want

2. Why VMware spent $1.5B on AirWatch

3. Windows 9 rumors freeze corporate Windows 8 uptake

4. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

5. Lenovo agrees to buy IBM's server business for $2.3 billion

6. Top 25 most commonly used and worst passwords of 2013

7. Boycotting RSA Conference is a misplaced endeavor

8. 12 privacy-destroying technologies that should scare you

9. Better than TV! White spaces bring wireless bonanza to West Virginia

10. SDN showdown: Examining the differences between VMware's NSX and Cisco's ACI


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment