FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say | Nintendo warns against super Pokemon creator app |
|||||||||
Network World Security | |||||||||
The nastiest cyber security stink-bombs of 2013 (so far)
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess Read More WHITE PAPER: Stonesoft Corporation Stonesoft Firewall Appliances for Demanding Environments To keep up with today’s sophisticated threats and complex network traffic, a first generation firewall will not do. View now
In this Issue
WHITE PAPER: Dell Inc. 2013 Next Generation Firewall Security Value Map Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say Voluntary program welcomed, but advocates would like to see the agency do more with the authority it has to guard consumer privacy online Read More Nintendo warns against super Pokemon creator app Nintendo warned Friday against the use of a smartphone app that can be used to create custom, all-powerful Pokemon characters for use in its handheld games. Read More WHITE PAPER: McAfee Eight “Must-Have” Firewall Rules With the torrent of new threats resulting from Web 2.0, it’s likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now More than 50% of consumers say they've been victimized by bad apps Two-factor authentication could bolster security, but many don't know what it is or resist using it Read More Encryption practices vary widely in the cloud, survey finds A survey by Ponemon Institute of 4,205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the cloud, while taking various approaches to encrypting that data. Read More WHITE PAPER: Cisco Systems Getting the Most Out of Your Next-Generation Firewall Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now Report: US general under investigation for Stuxnet leak A former high-ranking U.S. military official is reportedly under investigation for leaking classified information related to the use of malicious software to disrupt Iran's uranium refinement program. Read More With Carberp source code's release, security pros expect the worst Leak of the once-pricey Trojan's code more dangerous than 2011 Zeus release because Carberp includes a bootkit component, experts note Read More FTC wins monster $7.5 million penalty against "Do Not Call" list violator The Federal Trade Commission today said it has won a $7.5 million civil penalty – the largest ever -- against Mortgage Investors Corporation, one of the nation's biggest refinancers of veterans’ home loans for allegedly violating "Do Not Call" requirements. Read More |
|||||||||
SLIDESHOWS
Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.
JOIN THE NETWORK WORLD COMMUNITIES
As
network pros you understand that the value of connections increase as
the number of connections increase, the so called network effect, and no
where is this more evident than in professional relationships. Join
Network World’s LinkedIn and Facebook communities to share ideas, post
questions, see what your peers are working on and scout out job
applicants (or maybe find your next opportunity).
MOST-READ STORIES
|
|||||||||
Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld. |
Monday, 1 July 2013
The nastiest cyber security stink-bombs of 2013 (so far)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment