Search This Blog

Wednesday, August 20, 2014

5 cool new security research breakthroughs

Why would Chinese hackers want hospital patient data? | Death notice: In Delaware your social media accounts now go to your heirs

Network World Security

Forward this to a Friend >>>


5 cool new security research breakthroughs
USENIX Security '14 line-up explores Apple iOS security, Web privacy and more Read More


RESOURCE COMPLIMENTS OF: Code 42 Software

SharePlan–Secure, enterprise-ready file sync and share
SharePlan is the secure file sync and share solution that balances the needs of employees with the technical requirements unique to enterprise IT. SharePlan is built on the Code42 engine, leveraging the same proven, enterprise-grade administration, security and management capabilities used by CrashPlan, our award-winning endpoint backup solution. See how simple SharePlan truly is–so simple it makes everything else seem way harder. Then download our Enterprise File Sync and Share Toolkit to access white papers, executive briefs, tech notes, on-demand webinars and more.

WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

Why would Chinese hackers want hospital patient data?
The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.Already this year, around 150 incidents of lost or stolen personal data—either due to hacking or ineptitude—have been reported by medical establishments to the U.S. Department of Health and Human Services.In the case of Community Health Systems, hackers stole patient names, addresses, birth dates, telephone numbers and Social Security numbers. They did not steal medical data, Community Health Systems said—but that data can be the real prize in such breaches.To read this article in full or to leave a comment, please click here Read More

Death notice: In Delaware your social media accounts now go to your heirs
Varied death policies of Twitter, Facebook, Instagram and others cause concern, lead to legislation Read More


WHITE PAPER: Alert Logic

State of Cloud Security Report
In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is which applications and workloads to move to the cloud and when. Learn More

Top 5 things to watch for at VMWorld 2014
A year ago everyone wanted to know about VMware’s big plan. The company had just undergone a major executive shakeup, with CEO Paul Maritz leaving to pilot VMware/EMC spinout Pivotal and long-time CTO Steve Herrod departing to join a venture capital firm. Parent company EMC’s COO Pat Gelsinger - former CTO of Intel - stepped in to become VMware’s CEO.To read this article in full or to leave a comment, please click here Read More

Facebook says most outbound email is encrypted now
Nearly all of Facebook’s outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry’s push to thwart the NSA’s spying programs.In May, only 58 percent of the social networking site’s email was encrypted when it was sent since the receiving entity must have the technology, called STARTTLS, enabled, wrote Michael Adkins, a messaging integrity engineer at Facebook, on a company blog.Since that time, Microsoft, Yahoo and other email providers have enabled STARTTLS, which has pushed the percentage of Facebook’s encrypted messages to 95 percent, he wrote.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

Nuclear Regulatory Commission hacked 3 times in 3 years
“Protecting people and the environment” is listed like a motto on the U.S. Nuclear Regulatory Commission’s website. But hopefully that protection exceeds NRC employee’s abilities to spot targeted spearphishing emails, since falling for the tactic caused the agency to be hacked three times in the past three years.A fraction of NRC’s annual $1 billion budget helps about 4,000 employees attend annual cyber-awareness training which includes warnings about phishing, spearphishing and other methods attackers might exploit to gain entry into the agency’s networks. Apparently not everyone was paying attention and heeded those “don’t-fall-for-phishing” instructions as NextGov learned that the NRC was hacked twice by foreigners and a third time by an unknown attacker.To read this article in full or to leave a comment, please click here Read More

NASA's green rocket fuel set for major space test
NASA said today it would launch a spacecraft that would for the first time test fire green propellant technology in space.NASA’s Green Propellant Infusion Mission (GPIM) will use a small satellite using a Hydroxyl Ammonium Nitrate fuel/oxidizer mix, developed by the Air Force Research Laboratory, is also is known as AF-M315E propellant. This fuel may replace the highly toxic hydrazine and complex bi-propellant systems in-use today, NASA said.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!); The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here Read More

Symantec folds nine Norton products into one service
A single product, Norton Security, can be used across Windows, OS X, Android and iOS Read More

Senator questions airlines' data privacy practices
Jay Rockefeller raises concerns about airlines collecting and sharing personal information Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Munich reverses course, may ditch Linux for Microsoft

2. New Microsoft same as the old Microsoft

3. Password1 tops lists of top 10 corporate environment passwords

4. Best and funniest Apple iWatch design concepts

5. 2014's Hottest IT Certification

6. Why TCP/IP is on the way out

7. Google: The cost of hardware is falling at a faster rate than the price of cloud

8. Powerful Soap router surpasses funding goal, headed for production

9. 17 ways to hate Microsoft Outlook 2013 less

10. Gartner: Think twice before deploying Windows 7

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: