Friday, June 06, 2014

TrueCrypt's abrupt demise 'puzzling, bizarre'

Network World Compliance - Newsletter -
Dark Wallet--Threat or No Threat? | 15 more weird things in the Internet of Things

Network World Compliance

Forward this to a Friend >>>

TrueCrypt's abrupt demise 'puzzling, bizarre'
The abrupt discontinuation of the disk and file encryption freeware TrueCrypt by its secretive software developers has left many security experts stunned, some of whom say there now are no viable alternatives left in non-commercial encryption software. Read More

WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more


Hardware Test is the Key to Accurate Network Testing
Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More

Dark Wallet--Threat or No Threat?
The Fuss About Dark Wallet Read More

15 more weird things in the Internet of Things
The Internet of Things is growing, and the things are getting weirder by the day. Read More

Palo Alto Networks report fingers UDP as major malware helper
Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise networks almost always uses the User Datagram Protocol (UDP) to communicate, blending in with legitimate UDP-based applications such as video. Read More

WHITE PAPER: Citrix Systems

The top 5 truths behind what the cloud is not
There's no doubt that cloud is a major paradigm shift for enterprise organizations from the way services are delivered, to the underlying solutions deployed to enable those services. This whitepaper clears the confusion around cloud to help you shape a successful strategy and implementation plan. Learn more

A year after Snowden revelations, Microsoft demands NSA reform
Microsoft joins Cisco and other companies that have objected to a delay in NSA reform Read More

China escalates rhetoric in campaign to ban Windows 8
PCs are too expensive, foreign OS makers can steal data, government mouthpiece charges Read More

Comcast to start encrypting email traffic with Gmail in the coming weeks
The company is currently testing the technology and plans for wider deployment Read More


Big Data Helps Defend Against Breaches
The prolific number of advanced threats makes it impossible for security teams to keep up. Automating detection and response is necessary to stay ahead of attackers. Big data analytics is a future-proof foundation for outlasting the cyber security malware arms race Read More

Groups launch Reset the Net campaign to resist NSA surveillance
Google, Snowden and digital rights groups encourage Web users to adopt privacy tools Read More

77% of lawyers can't be trusted … with your confidential data
Read More

Phishing campaign touts fake 'Heartbleed removal' tool
Trend Micro is warning of a phishing campaign touting a 'Heartbleed removal' tool, a nonsensical product that is actually malicious software. Read More

10 IT security risks that small businesses can't afford to ignore
While small- to midsized businesses (SMB) don't have the luxury of information security teams and resources that large enterprises can afford, they still face many of the same threats. Read More

New products of the week 06.02.14
Our roundup of intriguing new products from companies such as IBM and Netsocket Read More


15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 9 new iOS features from Apple's WWDC

2. Cisco Q1 slump drops Ethernet switch market

3. Juniper wires up WLAN deal with Aruba

4. Meet the future of computing: 10 killer hardware advancements from Computex 2014

5. TrueCrypt's abrupt demise 'puzzling, bizarre'

6. Apple's coolest announcements at WWDC 2014

7. 10 hot cloud computing skills

8. Researchers urge hackers to exploit Hyper-V's huge attack surface

9. Sprint near deal to buy T-Mobile USA for $50 billion, reports say

10. Amazon teases launch of mysterious device with 50-second video

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: