Wednesday, April 30, 2014

FBI/IC3 alert says phishing attacks on phone customers is rising again

How to beat hackers exploiting the latest IE zero-day bug | Siemens patches Heartbleed in popular SCADA system

Network World Security

Forward this to a Friend >>>


FBI/IC3 alert says phishing attacks on phone customers is rising again
Phishing attacks coming from fraudsters acting like your phone company are again on the upswing according to a new warning from the FBI and its partner agency the Internet Crime Complaint Center (IC3). Read More


RESOURCE COMPLIMENTS OF: SAP

The Keys To Boosting PSO Success
Professional services organizations (PSOs) strive to help their clients' businesses run more smoothly. But what are they doing to make their own businesses run more efficiently? One method for success with proven results: deploying technology, from vendors such as SAP, that delivers both internal efficiency and external results. Learn how to deliver a higher percentage of on-time, on-budget project completions, boost revenue and customer retention, and ultimately improve profit margins.

WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

How to beat hackers exploiting the latest IE zero-day bug
Companies have several options for defending against a recently discovered zero-day vulnerability in Internet Explorer and experts say businesses should get started immediately. Read More

Siemens patches Heartbleed in popular SCADA system
Siemens released a security update to address the Heartbleed vulnerability in SIMATIC WinCC Open Architecture, a supervisory control and data acquisition (SCADA) system that's used in a large number of industries to operate processes, machines and production flows. Read More

DeRodes steps into breach as Target's new CIO
Target has named veteran IT executive Bob DeRodes as its CIO and is tasking him with taking the $73 billion retailer in a new technology direction following the mammoth data breach that it disclosed late last year. The breach resulted in information being stolen from 70 million payment card users and prompted the resignation of CIO Beth Jacob. Read More


WHITE PAPER: Sophos, Inc.

Managing BitLocker With SafeGuard Enterprise
This whitepaper explains how Sophos SafeGuard Enterprise secures your data wherever it's stored; and how it allows you to support diverse platforms and encryption products including BitLocker. Learn More

How one woman kept her pregnancy a secret from online advertisers
By now, the story of Target's role in informing a Minnesota father of his teenage daughter's pregnancy has become sort of an urban legend about the risks of data-based advertising. Read More

6 free network vulnerability scanners
Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. Read More

FCC targets costs, security and mobile communications with IT upgrade plans
The Federal Communications Commission's in-house IT infrastructure has to modernize, in order to save money and become more efficient, according to FCC CIO David Bray. Read More


WEBCAST: CDW

Compose a software Management Symphony
Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel View Now

Lawyers ask US Supreme Court to limit mobile phone searches
Police shouldn't be able to search suspects' mobile phones at the time of arrest because of the huge amounts of private information now stored on those devices, lawyers for two criminal defendants argued before U.S. Supreme Court Tuesday. Read More

Why facial recognition isn't the way of the future...yet
It's the how the future is meant to be, isn't it? The good guys need to find a bad guy in a crowd of people, so they start scanning the environment with a camera that is equipped with facial recognition technology. Seconds later, they scan a face that's a positive match with an entry in their criminal database and bam, they've smoked him out. Read More

5 Things You Need to Know About Cybersecurity Insurance
Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. Read More


SLIDESHOWS

Fave Raves: 33 tech pros share their favorite IT products

It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft warns Internet Explorer 6 to 11 vulnerable to zero-day spotted in the wild

2. 10 users IT hates to support

3. 6 free network vulnerability scanners

4. Michael Dell: On SDNs and networking for the masses

5. Just how much bigger AWS is compared its next competitor may surprise you

6. Microsoft Security Essentials goes bonkers just as support ends

7. New IE zero-day first to leave Windows XP exposed, unprotected

8. Fave Raves: 33 tech pros share their favorite IT products

9. Cisco, Akamai team to boost branch performance

10. FCC's new net neutrality proposal: What do we really know?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment