Search This Blog

Wednesday, October 31, 2012

Irked by cyberspying, Georgia outs Russia-based hacker -- with photos

  Gartner: How big trends in security, mobile, big data and cloud computing will change IT | Election watchdogs keep wary eye on paperless e-voting systems
 
  Network World Security

Forward this to a Friend >>>


Irked by cyberspying, Georgia outs Russia-based hacker -- with photos
In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered. Read More


WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

Gartner: How big trends in security, mobile, big data and cloud computing will change IT
When you go to a Gartner conference one of he main things you'll notice is the sheer volume of data they can generate on just about any IT topic. Last week's Gartner Symposium/ITxpo in Orlando, Fla., was no different. The conference, attended by some 9,000 executives focused on the changes security challenges, mobile computing, big data and cloud will be bringing to IT in the near future. Read More

Election watchdogs keep wary eye on paperless e-voting systems
As the clock winds down to what could turn out to be an extremely close presidential race, some election watchdogs are keeping a wary eye on paperless electronic voting machines that are scheduled to be used in several key states and jurisdictions around the country. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Insecure industrial control systems, hacker trends prompt federal warnings
Security researchers fed up with what they see as the glacial pace with which vendors fix holes in industrial control systems have exposed vulnerabilities that raised concerns among federal officials. Read More

Hopes for federal cybersecurity standards fading
Cybersecurity is clearly on the agenda of both Congress and President Obama. But it is just as clearly not at the top of their list. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Tuesday, October 30th at 12:00pm ET Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Security researcher shares blow-by-blow account of advanced persistent threat
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week. Read More

South Carolina breach exposes 3.6M SSNs
In the biggest data compromise of the year, Social Security Numbers belonging to about 3.6 million residents in South Carolina have been exposed in an intrusion into a computer at the state's Department of Revenue. Read More

Progress only by permission
The Copyright Clause in the U.S. Constitution reads: "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." The copyright part of this clause -- the part referring to authors -- has become a stick to bludgeon technology, not just to protect authors' rights. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Want a security pro? For starters, get politically incorrect and understand geek culture
  2. The geek skills challenge: 9 talents worth mastering
  3. Caught taking pictures during Hurricane Sandy
  4. Hurricane Sandy crashes Google's party, but not its Nexus announcement
  5. 5 things Juniper must do to reignite growth
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Cisco network really was $100 million more
  8. .xxx to launch porn search engine
  9. Scott Forstall, father of iOS, set to leave Apple next year in sweeping executive shakeup
  10. First look: Google's new Nexus 4
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: