Monday, January 27, 2014

Google lays $2.7M on the line for Pwnium hacking contest

Romanian authorities arrest man suspected of being celebrity hacker Guccifer | Teacher's online safety experiment takes trollish turn

Network World Security

Forward this to a Friend >>>


Google lays $2.7M on the line for Pwnium hacking contest
Google will again host its Pwnium hacking contest at a Canadian security conference in March, putting $2.7 million at stake to draw out researchers who can hack its browser-based operating system, Chrome OS. Read More


WEBCAST: SAP

Big Data and Big Insights with Dell, SAP and Hadoop
Big Data is already a trend that companies are jumping to. The possibility of exploiting massive amounts of data from multiple sources to make sound business decisions seemed like nirvana a couple of years ago; however now this is a reality. View more. Learn more

WHITE PAPER: IBM

Protect Your IT System with Next Generation Security
A data breach, probings, and hacker activity endanger your your critical IT information. Perpetrators can attack companies through their IT systems. Read how trusted computing from IBM PureFlex System can help secure your systems against emerging threats. Learn More

Romanian authorities arrest man suspected of being celebrity hacker Guccifer
A Romanian man was arrested this week under suspicion that he is the hacker known online as Guccifer who hacked into the online accounts of various public figures and politicians, including former U.S. Secretary of State Colin Powell and members of the Bush family. Read More

Teacher's online safety experiment takes trollish turn
That the Internet can be both amazing and dangerous is common knowledge, unless you're a pre-teen, in which case you might need to see a real-life example to properly understand. Read More


WHITE PAPER: Code42

Top 3 Reasons Why File Sync/Share is Not Endpoint Backup
Employees unknowingly create corporate data security risks by adopting these easy-to-use, personal applications. Understanding at a high level the primary purpose of each application helps differentiate between them. Read this executive brief to learn the differences. Learn More

Authentication bypass bug exposes Foscam webcams to unauthorized access
The software used by many wireless IP cameras manufactured by Foscam Digital Technologies have a vulnerability that allows remote users to access their video streams and take snapshots without proper authentication. Read More

"Astonishingly accurate" optical clock could be new world time standard
Call it a clock's clock. Researchers say they have developed the world's most precise and accurate clock - besting the World's current timekeeping record holder -- the National Institute of Standards and Technology Quantum clock - by 50%. Read More


WHITE PAPER: Riverbed Technology

Optimizing Mobile Client Performance
As mobile devices continue to expand in business use, ensuring these devices have optimal performance is becoming an IT imperative. This EMA paper examines mobile client accelerators. It provides an overview of how the technology works, its business benefits and cites three examples of real-world use cases and their individual costs and ROI. Read More

Punish careless employees to reduce security breaches, vendor says
Security could be vastly improved by holding employees accountable for carelessly clicking on emailed links and attachments that lead to malware being downloaded to a corporate network, an awareness-training vendor says. Read More

Apple executives on the Mac at 30: 'The Mac keeps going forever.'
Thirty years ago, Apple introduced the Macintosh, and we all learned why 1984 wasn't going to be like 1984. A lot has changed in 30 years, and yet even in as fast-moving a field as technology, Apple and the Mac are still here. A time traveler from 1984, fresh from Steve Jobs's introduction of the original Mac, would probably be able to point at one of today's iMacs and identify it as the logical evolution of the original. Read More

US lab developing technology for space traffic control
Scientists at the Lawrence Livermore National Laboratory say they have tested technology that could eventually help them monitor and control space traffic. The driving idea behind the project is to help keep satellites and other spacecraft from colliding with each other or other debris in Low Earth Orbit. Read More

Neiman Marcus says 'complex' malware defeated its security
Neiman Marcus was unaware attackers had harvested payment card details until six weeks after the activity had ended, when its merchant processor zeroed in on a fraudulent spending pattern. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco UCS 2.0: Flashy new data center servers revealed

2. Did Microsoft reach into your PC to stomp a botnet?

3. FIRST LOOK: New Cisco Nexus switches

4. Windows 9 rumors freeze corporate Windows 8 uptake

5. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

6. Why VMware spent $1.5B on AirWatch

7. EMC to lean on VMware for public cloud

8. Modern PCs that run the Windows you really want

9. Three security startups you should keep an eye on

10. Just how cool is the Galaxy S 5 going to be, anyway?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment