Search This Blog

Tuesday, April 01, 2014

Forget physical access as now remote USB attacks can blue screen Windows servers

Mass malware on mobile devices: Why haven't we seen it yet? | Encrypting sensitive data is a must; new key management tools make it easy

Network World Security

Forward this to a Friend >>>


Forget physical access as now remote USB attacks can blue screen Windows servers
NCC Group Research Director Andy Davis likes to test USB host security; over the years, Davis has "identified over 100 bugs covering all the major operating systems." He said most vendors typically respond with "Thank you for the bug, but as you need physical access to plug in your rogue device, the impact is actually quite low." Yet Davis continued researching USB security, giving presentations such... Read More


RESOURCE COMPLIMENTS OF: FireEye

Gain Insight into Advanced Attacks & Protect Your Enterprise
Read the latest FireEye Advanced Threat Report that analyses more than 40,000 advanced attacks to map out the latest trends in advanced persistent threat (APT) attacks. The report correlates real-time threat intelligence from millions of security alerts to provide insight that spans countries, industries, and threat vectors. Download the FireEye Advanced Threat Report Now

WHITE PAPER: Plantronics

Unleash your UC Potential By Putting Users First
What's holding back Unified Communications (UC) adoption? Too often, today's solutions are simply too hard to use. Now, survey results show high-quality audio and a simple and intuitive user experience can turbo-charge acceptance. Read this exclusive report from Plantronics and IDG to learn how you can start making the most of UC. Read now!

Mass malware on mobile devices: Why haven't we seen it yet?
This post is probably going to get my mobile phone hacked, but conflicting news reports have got me wondering whether mobile devices are really as vulnerable as some vendors and doomsayers would suggest. Read More

Encrypting sensitive data is a must; new key management tools make it easy
Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can mean that nothing useful is taken. Read More


WHITE PAPER: Spirent

Hardware Test is the Key to Accurate Network Testing
Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More>>

The government as whopping UFO skeptic
A newly released response to public UFO sighting only increases the notion that the military - which was often forced into looking into "flying saucer" sightings - was exceptionally skeptical about such reports. Read More

China's unsupported XP machines hold the potential to become a massive botnet army
Unsupported Windows XP machines in China could pose a threat to the Internet in general if bot-herders round up significant numbers of them to use as launch pads for malicious exploits, according to a top white-hat hacker. Read More


WHITE PAPER: ForeScout Technologies

2014 Cyberthreat Defense Report for North America & Europe
The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Learn more >>

7 Hot IT Jobs That Will Land You a Higher Salary
Looking to give your career (and your wallet) a boost? Here are seven in-demand positions that have companies throwing budgets out the window. Read More

Google, Level 3 DNS services hijacked by TurkTelekom
Google said its free DNS (Domain Name System) service is being intercepted by most Turkish ISPs as the country battles users trying to circumvent censorship efforts by the government. Read More


SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. MIT researchers bring Javascript to Google Glass

2. Businesses: Forget Microsoft Office for iPad, pay attention to Enterprise Mobility Suite

3. How do the FBI and Secret Service know your network has been breached before you do?

4. So you think you know the IBM mainframe? Try our quiz

5. 16 terrible computer pranks that could get you fired

6. (Free!) Security Tools you should try

7. Cisco fixes denial-of-service flaws in IOS software for networking devices

8. 5 free software tools for greater privacy

9. 5 free Ethernet tools you should check out

10. Driving innovation at Fidelity Investments


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: