Wednesday, August 27, 2014

Hackers prey on Russian patriotism to grow the Kelihos botnet

  Brandpost: Can Your Data Center Survive a Subpoena? | Most websites are "One Day Wonders" – and that's worrisome

 
  Network World Security  

Hackers prey on Russian patriotism to grow the Kelihos botnet
The gang behind the Kelihos botnet is asking Russian-speakers to sign their computers up for the DDoS botnet as an act of patriotism to help the gang stage attacks against the Websites of governments that have imposed sanctions on Russia. Read More
 


WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

WHITE PAPER: Skyhigh Networks
 
Cloud Adoption & Risk Report Reveals Top 20 Cloud Services
Based on anonymized data from over 10 million users across over 200 companies, the Skyhigh Cloud Adoption and Risk Report has become the de-facto data source on cloud adoption and risk View Now>>

Brandpost: Can Your Data Center Survive a Subpoena?
Corporate security pros need to keep an eye on the so-far successful U.S. government case against Microsoft to force the company to respond to a U.S. subpoena by turning over customer data even thought it's stored in another country. Read More
 

Most websites are "One Day Wonders" – and that's worrisome
Web sites that exist for only a day are proliferating and could be dangerous to visitors, but because they linger so briefly, they may do damage and disappear before security platforms have the chance to identify them and block them. Read More
 


WEBCAST: IBM

Leveraging Software-Defined Flash to Drive Your Business
With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency of SDS and the speed of flash storage all at once. Learn More

California passes law mandating smartphone kill switch
A new California law mandating kill switches to lock or wipe smartphones when they're stolen will have a wider impact because phone makers are likely to add the feature to all their phones, not just those sold in California. Read More
 

Cleveland Indians turn to SIEM in malware, botnet battle
When anti-virus software proved ineffective, the Cleveland Indians turned to security information and event management tools to help spot machines that have been commandeered by attackers so IT staff can clean them up. Read More
 


WHITE PAPER: Cisco

Cisco Connected Mobile Experiences (CMX)
Amplify customer interactions with Cisco Connected Mobile Experiences. Our platform's Wi-Fi intelligence meets the needs of a growing mobile audience. And with Cisco Services, we'll help you design a mobile infrastructure that addresses your unique business goals for a high return on your investment. Learn more

5 million Arizona citizens' details stolen from counterterrorism center?
  A data breach that reaped the personal details of 5 million Arizona residents from the Arizona Counter Terrorism Information Center was covered up after a Chinese national gained free access to the center's network. Read More
 

Verizon Says Passwords Suck, QR Codes Offer Better Way
Verizon says replacing usernames and passwords with QR code logins provides better protection without increasing the work or cost enterprises must expend in order to provide secure authentication to network resources. Read More
 

Report: NSA built 'Google-like' search engine for metadata
The NSA built its own search engine so agencies in the U.S. and allied nations can sort through the details of billions of phone calls, texts and instant messages. Called ICReach, the engine was used to search metadata on calls made largely but not exclusively by foreign nationals. Read More
 

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. One frustrating Linux problem that Windows, Mac users don't deal with

2. Is massive DNS hack responsible for Charter Internet outage?

3. Hot products at VMworld 2014

4. The worst cloud outages of 2014 (so far)

5. The iPhone 6 unknowns

6. Internet of Overwhelming Things

7. Most websites are "One Day Wonders" – and that's worrisome

8. iPhones, iPads ripe for the picking

9. Russia's bid to expose users highlights law enforcement's tricky relationship with Tor

10. Is Wi-Fi killing us...slowly?

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment