Monday, 1 July 2013

The nastiest cyber security stink-bombs of 2013 (so far)

  FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say | Nintendo warns against super Pokemon creator app
 
  Network World Security

The nastiest cyber security stink-bombs of 2013 (so far)
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess Read More

WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today’s sophisticated threats and complex network traffic, a first generation firewall will not do. View now

WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now
FTC's 'Reclaim Your Name' alone won't rein in data brokers, experts say
Voluntary program welcomed, but advocates would like to see the agency do more with the authority it has to guard consumer privacy online Read More
Nintendo warns against super Pokemon creator app
Nintendo warned Friday against the use of a smartphone app that can be used to create custom, all-powerful Pokemon characters for use in its handheld games. Read More

WHITE PAPER: McAfee

Eight “Must-Have” Firewall Rules
With the torrent of new threats resulting from Web 2.0, it’s likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now
More than 50% of consumers say they've been victimized by bad apps
Two-factor authentication could bolster security, but many don't know what it is or resist using it Read More
Encryption practices vary widely in the cloud, survey finds
A survey by Ponemon Institute of 4,205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the cloud, while taking various approaches to encrypting that data. Read More

WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now
Report: US general under investigation for Stuxnet leak
A former high-ranking U.S. military official is reportedly under investigation for leaking classified information related to the use of malicious software to disrupt Iran's uranium refinement program. Read More
With Carberp source code's release, security pros expect the worst
Leak of the once-pricey Trojan's code more dangerous than 2011 Zeus release because Carberp includes a bootkit component, experts note Read More
FTC wins monster $7.5 million penalty against "Do Not Call" list violator
The Federal Trade Commission today said it has won a $7.5 million civil penalty – the largest ever -- against Mortgage Investors Corporation, one of the nation's biggest refinancers of veterans’ home loans for allegedly violating "Do Not Call" requirements. Read More
 
SLIDESHOWS
Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
MOST-READ STORIES
 
Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

No comments:

Post a Comment