Friday, November 22, 2013

Cryptolocker: The evolution of extortion

20-plus eye-popping Black Friday tablet, computer & tech deals | HP: 90% of Apple iOS mobile apps show security vulnerabilities

Network World Compliance

Forward this to a Friend >>>

Cryptolocker: The evolution of extortion
The Cryptolocker Trojan is an evolution of "ransomware," not a revolutionary change from past criminal attempts to extort money from PC owners, a security expert said today. Read More


The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now


Maximizing Enterprise Resource Planning ROI
In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More.

20-plus eye-popping Black Friday tablet, computer & tech deals
Apple iPads, latest Android and Windows machines all in for big discounts. Oh, and free snow globes. Read More

HP: 90% of Apple iOS mobile apps show security vulnerabilities
HP today said security testing it conducted on more than 2,000 Apple iOS mobile apps developed for commercial use by some 600 large companies in 50 countries showed that nine out of 10 had serious vulnerabilities. Read More

VMware and Palo Alto team to more quickly secure virtual resources
In connection with its NSX network virtualization software effort, VMware is teaming with Palo Alto Networks to jointly develop a virtualized network-generation firewall (NGFW) tightly integrated with VMware's platform. Read More

Top Tech Turkeys of 2013
Gobble, gobble - these techies deserve to be carved up Read More

WHITE PAPER: PC Connection

Unlock the Power of Flash
Continuous data growth coupled with a new generation of multi-core CPUs has placed new demands on storage systems to handle an unprecedented number of workloads. As organizations move toward fully virtualized datacenters, the storage systems they choose today must be able to handle hundreds, even thousands, of virtual machines and mixed workloads. Learn More

Stratfor hacker Jeremy Hammond given 10 year sentence
AntiSec activist to serve 10 years in federal prison for his attack on geopolitical intelligence firm Strategic Forecasting Inc. Read More

FireEye, Palo Alto top network companies on Deloitte Fast 500 list
Newly public FireEye, a Milpitas, Calif., company whose sandboxing technology has been the envy of other security companies, is the fastest growing network company on this year's Deloitte Fast 500 list. Read More

The 10 fastest supercomputers on Earth
The latest twice-yearly Top500 report is out – see which supercomputers are the world's fastest. Read More

Experts applaud Google completion of SSL certificate upgrade
Google's faster-than-expected upgrade of all its SSL certificates to an RSA key length of 2048 bits will make cracking connections to the company's services more difficult without affecting performance, experts say. Read More

WHITE PAPER: Mobiquity Inc.

Not Getting Real Value Out of Mobile? Think Beyond the App.
Mobility promises to drive real competitive advantage. But why hasn't it happened yet? Because it's about true innovation, not just building an app. Find out more. Learn More

Detect and respond: How organizations are fighting off targeted attacks faster
It doesn't matter how high, deep, or long the IT walls are that security pros build around their networks, it seems attackers find ways to fly over, dig under, or drill through. The most recent Verizon Data Breach Investigations Report found that more than 50 percent of all breaches were caused by some form of hacking -- and it took months to years for more than two thirds of successful breaches to be detected. Read More

Verizon rolls out certificate services for 'Internet of things'
Verizon today said it is rolling out digital certificate services aimed at the "Internet of things" in order to provide security and authentication for machine-to-machine systems. Read More

Warning! Targeted Internet misdirection on the rise
Unknown attackers have successfully hijacked and redirected Internet traffic belonging to financial services companies, VoIP providers and governments many times over the past year. Read More

How IT found savings by tackling (instead of cringing at) photocopiers
Say the word 'photocopier,' and most IT leaders have visions of skilled workers wasting time undoing paper jams. But for Karl Collins, vice president of technical services and infrastructure at SavaSeniorCare, IT's newfound ownership of enterprise-wide photocopiers has yielded $739,000 annual savings and increased visibility among executives. Read More

Products of the week 11.18.13
Our roundup of intriguing new products from companies such as Extreme and CloudLock Read More


20 hottest tech toys for the holidays

Cool Yule Tools 2013: Our Tester Elf-approved picks for awesome gadgety goodness.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 20-plus eye-popping Black Friday tablet, computer & tech deals

2. LG Smart TV spying, owner claims his USB filenames posted on LG servers

3. This is how Amazon cleans its servers when customers are done with them

4. Gartner analyst slams OpenStack, again

5. Fake Windows tech support calls continue to plague consumers

6. Microsoft reveals Black Friday deals for Surface, laptops

7. Big data's biggest challenges

8. 8 iPad Apps That Are Complex, Powerful and Advanced

9. 5 ways that BYOD is shaking up tech support

10. 10 reasons to upgrade to Windows 8.1

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: