Search This Blog

Tuesday, June 03, 2014

You’re under arrest! (Not with this scam you’re not)

Network World Security - Newsletter - networkworld.com
Beware the next circle of hell: Unpatchable systems | 77% of lawyers can't be trusted … with your confidential data

Network World Security

Forward this to a Friend >>>


You're under arrest! (Not with this scam you're not)
It seems likely most people would know if they had done something that would warrant their arrest but that apparently isn't stopping scammers from trying. The US Federal Court System today issued a warning about scammers using the threat of arrest unless of course you pay them off. Read More


WHITE PAPER: Dell SecureWorks

Advanced Threat Services
This white paper defines advanced threats, reviews the types of techniques advanced threat actors use as they relate to the kill chain, recommends specific steps for an effective defense strategy and defines how Dell SecureWorks services can help organizations detect, defend and eradicate advanced threats. Learn more

WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Beware the next circle of hell: Unpatchable systems
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling Read More

77% of lawyers can't be trusted … with your confidential data
When using email to communicate, more than three-quarters of all lawyers treat their clients' confidential information with all the care you'd expect from a teenager posting to Facebook, according to a new survey. Only 22 percent claim to use encryption. And a full 77% cop to relying solely on "confidentiality statements," otherwise known as virtually nothing. Read More


WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Palo Alto Networks report fingers UDP as major malware helper
Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise networks almost always uses the User Datagram Protocol (UDP) to communicate, blending in with legitimate UDP-based applications such as video. Read More

Cisco purchase of CIA-funded company may fuel distrust abroad
The CIA's non-profit venture capital arm, In-Q-Tel, has been pumping millions of dollars into technology startups since its launch in 2000, meaning it's not the least bit unusual for major vendors to have acquired and assimilated one of these CIA-nurtured seedlings. Read More


WHITE PAPER: Spirent

Hardware Test is the Key to Accurate Network Testing
Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More

TrueCrypt's abrupt demise 'puzzling, bizarre'
The abrupt discontinuation of the disk and file encryption freeware TrueCrypt by its secretive software developers has left many security experts stunned, some of whom say there now are no viable alternatives left in non-commercial encryption software. Read More

Cloud provider FireHost's security chief brings lessons from the front lines
Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity. Read More


SLIDESHOWS

15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TrueCrypt's abrupt demise 'puzzling, bizarre'

2. Cisco purchase of CIA-funded company may fuel distrust abroad

3. How MIT and Caltech's coding breakthrough could accelerate mobile network speeds

4. What's really behind the Microsoft-Salesforce deal

5. America's 6 top-paid CTOs

6. ITworld cartoons 2014: The year in geek humor

7. iPhone 6 rumor rollup for the week ending May 30

8. The PSTN Transition to VoIP: Security Must be Addressed

9. Beware the next circle of hell: Unpatchable systems

10. How consumers are holding back retail tech advances


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: