Friday, March 22, 2013

Honeypot for phony waterworks gets hammered on Internet

  9 classic hacking, phishing and social engineering lies | Where do Cisco's network security plans go from here?
 
  Network World Compliance

Forward this to a Friend >>>


Honeypot for phony waterworks gets hammered on Internet
An experiment in which a Trend Micro researcher set up two instances of an Internet-based simulation of an industrial-control system (ICS) for a nonexistent water-pump facility in rural Missouri found the simulated system was targeted 17 times over about four months in ways that would have been catastrophic if it had been a real waterworks operation. Read More


RESOURCE COMPLIMENTS OF: Cisco

The Cisco Unified Workspace
Trends such as mobility, virtualization, video, collaboration, knowledge management, and cloud have come to the forefront as companies struggle with how to integrate iPads, tablets, and smartphones into their business and IT models. In response, the Cisco Unified Workspace provides a solution for creating an organization-wide mobility strategy. Learn More.

RESOURCE COMPLIMENTS OF: InterMapper

The #1 real-time network mapping and monitoring tool.
InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections and traffic patterns. Drilling down on maps uncovers details needed to fix performance problems. It is an industrial strength monitoring, mapping and alerting tool that empowers network administrators to maintain healthy IT environments.

9 classic hacking, phishing and social engineering lies
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want Read More

Where do Cisco's network security plans go from here?
Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front. Read More

INSIDER
How to blunt spear phishing attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. Read More


WEBCAST: HP Intel VMware

Your IT Journey - Your Way
Faced with unrelenting pressure to do more with less, IT leaders are implementing virtualization, mobility and cloud computing in their enterprises. In this Knowledge Vault Exchange you'll find a plethora of valuable information, including videos, on-demand Webcasts, white papers and Twitter chats. View Now!

Please Follow Network World on Facebook
Share your favorite NW articles and more with your Facebook friends, join discussions with other NW readers, and more Read More

Android, iOS bugs expose phones to voyeurs, data thieves
Lock screen bypass lets intruder dial any number and run any app Read More

Botnet simulated humans to siphon millions in click-fraud scam
The sophisticated botnet, dubbed Chameleon, used Flash and Javascript to make site visits appear to be those of a human Read More


WHITE PAPER: MegaPath

Managing risk in the modern business world
What steps can you take to manage network risks as mobile apps, social and the cloud invade your network? Read Now

Bill would force agencies to take proactive security approach
Bipartisan House bill would require feds monitor computer systems for cyberthreats and perform regular threat assessments Read More

Microsoft: Hackers obtained high-profile Xbox Live accounts
Several high-profile Xbox Live accounts for former and current Microsoft employees were compromised by attackers using social engineering techniques, the company said late Tuesday. Read More

Former Tribune staffer denies giving hackers log-in credentials
Former Tribune Company employee Matthew Keys has denied giving a username and password to anyone, or conspiring to cause damage to a protected computer. Read More

The 'Minority Report' shopping experience
Everywhere you go these days -- every store, every urban street, every car park, every ATM -- there are video cameras watching where you go and what you do. Just what are "they" (whoever "they" are) doing with all of that video surveillance? Read More

Products of the week 3.18.13
Our roundup of intriguing new products from companies such as Cisco, Fortinet, Sepaton Read More

 
 
 

SLIDESHOWS

The Goog-father: Google's big shakeup isn't personal ... just business

Today, Google takes care of all family business.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco inadvertently weakens password encryption

2. 10 mobile apps for March Madness 2013

3. Microsoft's cash-for-apps pitch to devs smells like desperation

9. Top Metro apps for Windows 8 power users

5. Open-Xchange to launch open-source, browser-based office suite

6. Samsung Galaxy S 4 vs. HTC One

7. If it ain't broke, don't fix it: ancient computers in use today

8. Amazon building $600M cloud for CIA

10. Software testing can be sexy too

4. Seems Google really can't wait to get rid of Reader

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment