Friday, July 05, 2013

The nastiest cyber security stink-bombs of 2013 (so far)

Researchers mimic board game to bolster computer security | 10 biggest home networking mistakes (and how to fix them)

Network World Compliance

Forward this to a Friend >>>


The nastiest cyber security stink-bombs of 2013 (so far)
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess Read More


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

WHITE PAPER: IBM

A Smarter Approach to CRM: An IBM Perspective
Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More.

Researchers mimic board game to bolster computer security
By studying the memory game Concentration, they hope to lay the groundwork for highly accurate bot-detection programs Read More

10 biggest home networking mistakes (and how to fix them)
The chances are pretty good that you have a wireless home network, or you've been asked by friends, family or co-workers to help install one in their home. Read More

California's first data-breach report finds 131 incidents hit 2.5 million citizens
The state of California yesterday issued its first annual data-breach report saying for 2012 it recorded a total of 131 data breach incidents that put the personal data of more than 2.5 million Californians at risk. Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

China's great firewall censorship architect retires citing ill health
Chinese anti-censorship campaigners have rejoiced at the news that the man considered to be the architect of the country's 'great firewall', Fang Binxing, has announced plans to retire his post after suffering ill health. Read More

Fruity Instagram spam dies quickly on the vine
What sets this fruit-picture spam attack apart is that it appears to have involved hacked accounts, however Read More

More than 50% of consumers say they've been victimized by bad apps
Two-factor authentication could bolster security, but many don't know what it is or resist using it Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

INSIDER
Hot cloud products IT pros swear by
Spending on cloud services is so far just a fraction of total IT spending -- roughly 3% -- but the market is growing. IT pros explain what they like about their favorite cloud-based security, storage and management services. Read More

Researchers turn Android phone into Agent 007 tool
Kindsight proof-of-concept said to be ideal tool 'to launch an insider attack against a corporate network or government network' Read More

With Carberp source code's release, security pros expect the worst
Leak of the once-pricey Trojan's code more dangerous than 2011 Zeus release because Carberp includes a bootkit component, experts note Read More

3 things to consider before buying into Disaster Recovery as a Service
Disaster Recovery as a Service (DRaaS) backs up the whole environment, not just the data. Read More

Best security tools for under $3,000
Check Point wins test of eight unified threat management (UTM) devices for small business Read More


SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 biggest home networking mistakes (and how to fix them)

2. Microsoft shutters TechNet subscriptions

3. 10 things we love about Ubuntu 13, 5 things we hate

4. Meet the next open-source stars

5. The biggest security snafus of 2013 (so far)

6. Getting the most out of flash storage

7. The worst cloud outages of 2013 (so far)

8. VMware brain drain: Former sales chief moves on to Amazon's cloud biz

9. Stuart Biggs, the first Cisco CCIE, dies at age 53

10. A look at 22 Linux Foundation newbies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: