Friday, July 18, 2014

Why '123456' is a great password

Network World Compliance - Newsletter - networkworld.com
  Virtual machine (VM) security still a work in progress | The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)

 
  Network World Compliance

Forward this to a Friend >>>


Why '123456' is a great password
New research shows that "123456" is a good password after all.In fact, such useless credentials from a security standpoint have an important role in an overall password management strategy, researchers at Microsoft and Carleton University, Ottawa, Canada, have found.[The 25 worst passwords of 2013: "password" gets dethroned]Rather than hurt security, proper use of easy-to-remember, weak credentials encourages people to use much stronger passwords on the few critical sites and online services they visit regularly.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: VCE

Migrate Oracle Apps from RISC/UNIX to Virtualized x86
This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment and achieve the availability and scale your applications require. Learn how VCE VblockTM System helps ensure SLAs are maintained during migration, quality of service is improved and that licensing costs are reduced. Learn More

WHITE PAPER: HP and Intel®
 
12 Questions For Evaluating Your Convergence Vendor
Use the checklist in this research to derive a weighted analysis and to score whether fabric-based integration solutions should be a priority for your enterprise, or relegated for later pursuit. Learn More

 

INSIDER
Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. Read More

 

The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)
  2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development Read More
 

There's almost a million fake apps targeting your phone
Trend MIcro finds hundreds of thousands of fake Android apps in trawl of online stores, forums Read More
 


WHITE PAPER: BMC Software
 
MyIT- Consumer Cool for Business Apps
Rich Ptak discusses how BMC's MyIT combines the ease and familiarity of accessing today's consumer apps with the stability, security and strengths of the enterprise IT infrastructure. Learn More

Aloha point-of-sale terminal, sold on eBay, yields security surprises
An HP researcher's findings highlight ongoing problems with POS software and hardware Read More
 

Wave of 100Gbps 'mega' DDoS attacks hits record level in 2014
Mega is going giga Read More
 

Vulnerability exposes some Cisco home wireless devices to hacking
Specially crafted HTTP requests could trigger remote code execution on the affected devices, Cisco said Read More
 


WHITE PAPER: VCE

Vblock™ Systems and SAP: Transform Your Business
You rely on your ERP System to drive your business and give you a strategic advantage. Now you can speed time-to-value throughout your operations while also lowering costs by running your SAP applications on VCE™ Vblock™ Systems. Learn More

Overreliance on the NSA led to weak crypto standard, NIST advisers find
NIST needs to improve its cryptographic expertise in order to challenge advice received from the NSA when developing standards, report says Read More
 

Google sets up cybercrime-busting task force
After unearthing the Heartbleed flaw, Google sets up a research group dedicated to finding vulnerabilities in Web software Read More
 

The Black Hat Quiz 2014
How well do you know the security conference's revelations about NSA, pwned cars, spying cell phones and more? Read More
 

 

INSIDER
Encrypting sensitive data is a must; new key management tools make it easy
  Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can mean that nothing useful is taken. Read More
 

 

 

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco customers are brutally consolidating too

2. Microsoft to lay off 18,000 in next year

3. 10 Web Services That Make Your Life Easier

4. Say goodbye to desktop phones

5. 17 obscure Windows tools and tricks too powerful to overlook

6. Microsoft may announce its biggest layoffs ever on Thursday

7. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

8. Ubuntu 14.04: Is Canonical taking on too much

9. 10 disturbing attacks at Black Hat USA 2014

10. Microsoft researchers: Re-use the same password across sites likely to be hacked


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: