Friday, May 29, 2015

5 things you should know about cyber insurance

  20 best iPhone/iPad games | Like routers, most USB modems also vulnerable to drive-by hacking
 
 
  Network World Compliance  

 

INSIDER
5 things you should know about cyber insurance
  When Sony Pictures disclosed last November that hackers had plundered its networks and accessed virtually all of its data assets, loss estimates for the company ran from the tens of millions of dollars to the hundreds of millions. Similar data breaches at TJX and Heartland had cost each company well over $100 million, and there was little to indicate that Sony would fare any better. Read More
 

 


WHITE PAPER: BMC Software
 
Modernize Change Management While Minimizing Business Risk
Download this whitepaper to discover the three key principles required to modernize IT change management while minimizing business risk. Learn More

WHITE PAPER: PC Connection
 
The Document Disconnect in the U.S.
U.S. executives and managers in sales, HR, procurement, legal and other departments estimate that fixing the "document disconnect" could lead to 34% increase in revenue, 24% reduction in costs and a 14% reduction in risk. The new Acrobat DC can assist in helping mend the disconnect. Learn More

20 best iPhone/iPad games
GamesAs we head toward summer 2015, it's time to check in and see how the mobile gaming industry has fared for Apple iOS platforms, the iPhone and iPad. Here's a look at top rated games issued so far this year, based on App Store user reviews and professional reviewers on Metacritic. We hope you'll discover a few hidden gems in here.To read this article in full or to leave a comment, please click here Read More
 

Like routers, most USB modems also vulnerable to drive-by hacking
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.The flaws could allow attackers to steal or manipulate text messages, contacts, Wi-Fi settings or the DNS (Domain Name System) configuration of affected modems, but also to execute arbitrary commands on their underlying operating systems. In some cases, the devices can be turned into malware delivery platforms, infecting any computers they're plugged into.Russian security researchers Timur Yunusov and Kirill Nesterov presented some of the flaws and attacks that can be used against USB modems Thursday at the Hack in the Box security conference in Amsterdam.To read this article in full or to leave a comment, please click here Read More
 

College kids to the rescue with IT support startup HelloTech
Not that Baby Boomers or Gen X homeowners are clueless about technology, but startup HelloTech is banking on people of a certain age needing a bit of assistance to live the Internet of Things dream. Read More
 


WEBCAST: New Relic| Emulex| AppNeta| CA

How APM can Improve Operations and Development
Industry analyst Robin Layland joins Dan Kuebrick of AppNeta and Stevan Arychuk from New Relic to discuss what operations and developers need from a performance management solution. View now

7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Following up on our previous article highlighting 8 free Wi-Fi stumbling and surveying tools, here are 7 more tools that provide important details on known and unknown aspects of your WiFi network. Read More
 

German gov't proposes telecom data retention law
Critics say this revamped version is probably still illegal Read More
 

Judge classifies as class action an email scanning lawsuit against Yahoo
Plaintiffs allege that by scanning emails of people who don't use Yahoo Mail, the company violates federal and California wiretapping laws Read More
 


WEBCAST: CDW

Making Sense of PCI
If your company handles financial data for customers, you must keep current with the PCI-DSS standard not just to protect your company, but to protect your customers too. Even though the PCI Data Security Standard has been around for years, it's still poorly understood by many of the organizations it affects. Learn More

Seven best practices for cloud security
Learn how to protect yourself in the cloud from the next vulnerability and/or wide scale attack. Read More
 

 

INSIDER
Best practices for email security
Former Secretary of State Hillary Clinton's use of a private email server to conduct State Department business has left IT pros dumbfounded. They thought the days of executives acting autonomously were over and that governance within organizations was sound enough to prevent these actions.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

6 hottest IT jobs for new tech grads
College graduates are entering the workforce and interest in STEM and IT careers is reaching new heights. Here are the top 6 technology jobs for the class of 2015. Read More
 

Geekiest and techiest new Scrabble words
  The new Collins Official Scrabble Words book is out, and a lot of the new words are technology related. Read More
 

Home security demystified: How to build a smart DIY system
Everyone wants their home to be safe and secure, yet only 17% of homeowners own a home security system. Why? Because traditional systems cost hundreds of dollars to install, require long-term contracts and mean a lifetime of monthly fees.   Today, however, wireless technology has blown the DIY home security space wide open. Homeowners and renters can now build and maintain their own custom-designed home security system easily and inexpensively. In this guide, we'll discuss the options for DIY home security systems that offer similar -- and in some cases, better -- functionality to traditional systems, at substantially less cost. From connected cameras to smart sensors and whole home systems (with no monthly fees), to simple all-in-one gadgets, read on to find peace of mind for the right price.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

4 new access points deliver super-fast Wi-Fi

Linksys, Xclaim, Amped and ZyXel bring 802.11ac to SMB, enterprise markets.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 11 pointless but awesome Linux terminal tricks

2. Computer chips made of wood promise greener electronics

3. How to prevent the new Messages bug from crashing your iPhone

4. How a Florida fender-bender could threaten Uber's business model

5. Richard Stallman: Windows OS is malware

6. Research community looks to SDN to help distribute data from the Large Hadron Collider

7. Fiorina calls Chinese thieving automatons

8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

9. New 'sleeper' ransomware laid dormant on infected PCs until this week, report says

10. 6 hottest IT jobs for new tech grads


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment