Friday, November 02, 2012

20 notorious worms, viruses and botnets

  Want a security pro? For starters, get politically incorrect and understand geek culture | Security researcher shares blow-by-blow account of advanced persistent threat
 
  Network World Compliance

Forward this to a Friend >>>


20 notorious worms, viruses and botnets
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame. Read More


WHITE PAPER: Riverbed

Steelhead Cloud Accelerator Solution Brief
Learn how enterprises must tackle these challenges for SaaS applications to remain a viable option. Read now.

In this Issue


RESOURCE COMPLIMENTS OF: AT&T

VoIP Solutions Provide Enterprises With Various Benefits
VoIP migration is a top telecom priority for many North American enterprises. Do you know why? Find out in this Forrester study, which reveals the opinions of telecommunications decision-makers like you. Read the report.

Want a security pro? For starters, get politically incorrect and understand geek culture
While complaints can be heard far and wide that it's hard to find the right IT security experts to defend the nation's cyberspace, the real problem in hiring security professionals is the roadblocks put up by lawyers and human resources personnel and a complete lack of understanding of geek culture, says security consultant Winn Schwartau. Read More

Security researcher shares blow-by-blow account of advanced persistent threat
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week. Read More

INSIDER
The race toward compliance is 'not optimal'
More security managers find themselves running compliance programs rather than performing security and risk management. Read More

Courts widening view of data breach damages, lawyers say
Would make companies liable for steps taken to prevent financial harm, which might require then carrying insurance to cover identity theft Read More

Hitting back at cyberattackers: Experts discuss pros and cons
The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so? Read More


WHITE PAPER: Cisco

Understanding the Options to Find the Right Fit
Wondering which cloud collaboration solution is best for your business? Learn the four key factors you must consider when choosing a supplier--and find the right solution that will enable faster time to market. Read Now

Security research labels more than 290,000 Google Play Android apps as 'high-risk'
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users, according to new research. Read More

California's mobile privacy crackdown praised
California's top prosecutor has sent warnings to scores of mobile app developers that have allegedly violated the state's privacy laws, a crackdown that security experts applaud as good for the industry. Read More

Researcher warns "zombie browsers" are skyrocketing
Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's session, spy on webcams, upload and download files, and in the newer mobile-device area, hack into Google Android phones. Read More

One year after DigiNotar breach, Fox-IT details extent of compromise
The 2011 security breach at Dutch certificate authority (CA) DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration, according to Fox-IT, the security company contracted by the Dutch government to investigate the incident. Read More

Malware infects 13 percent of North American home networks
Some 13 percent of home networks in North America are infected with malware, half of them with "serious" threats, according to a report released Wednesday by a cyber-security company. Read More


WHITE PAPER: CDW & Symantec

Don't Wait for Disaster to Strike
It's inevitable. At some point your business will experience data loss. It could be a simple PC meltdown, a hard-drive crash or something much worse. See what happens if you neglect to protect your mission-critical applications and data, and learn what you can do to mitigate disaster. Learn More.

Bank phishing gang arrested after hotel swoop
UK police have arrested three men accused of being involved in large-scale Trojan phishing attacks against a range of banks. Read More

Hopes for federal cybersecurity standards fading
Cybersecurity is clearly on the agenda of both Congress and President Obama. But it is just as clearly not at the top of their list. Read More

Ernst & Young's IT security survey shows struggle to control cloud computing, social media and mobile risks
Many CIOS and chief information security officers are struggling to adapt security practices to a changing environment that includes cloud computing, social media and tablets , according to a survey of 1,850 such IT pros. Read More

Breach prevention is dead. Long live the 'secure breach'
Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era. Read More

The geek skills challenge: 10 talents worth mastering
From replacing a hard drive to picking a lock, these are the skills you need to earn the name 'geek' Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Stolen cell phone database switched on in U.S.
  2. 12 effective habits of indispensable IT pros
  3. Researcher warns "zombie browsers" are skyrocketing
  4. The 7 scariest monsters in tech
  5. Thin client vendor Pano Logic disappears into thin air
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  9. Caveats for VPM users in public Wi-Fi hotspot networks
  10. iPad mini: "It's the future until May ... at least" (Apple spoof video)
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment