Monday, July 25, 2016

At Black Hat: A free tool for spear phishing Twitter

Researchers release free decryption tools for PowerWare and Bart ransomware

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 25, 2016
Featured Image

At Black Hat: A free tool for spear phishing Twitter

A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Researchers release free decryption tools for PowerWare and Bart ransomware
3 ways device fingerprinting must evolve to prevent fraud
Firefox sets kill-Flash schedule
Sift Security helps SecOps teams analyze and visualize patterns of threats and speed up investigations  
A hackable election: 5 things you need to know about e-voting machines
Cybersecurity: A vertical industry application?
This Tinder scam promises to verify your account, but actually sells porn
FBI needs to beef-up high-tech cyber threat evaluations says DoJ Inspector General

Research/Infographic: Level 3 Communications

Communicate Simply. Migrate Confidently.

Simple conversations live at the heart of business. Level 3 Voice Complete lets you easily migrate to SIP, enabling you to have those conversations with customers, colleagues and partners with far greater reliability and security. Read More

Thumbnail Image

Researchers release free decryption tools for PowerWare and Bart ransomware

Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare. Read More

Thumbnail Image

3 ways device fingerprinting must evolve to prevent fraud

Advanced techniques such as fuzzy matching, reverse engineering and predictive modeling will make device fingerprinting more effective at spotting and stopping fraud online. Read More

Thumbnail Image

Firefox sets kill-Flash schedule

Mozilla will follow other browser markers by curtailing use of Flash in Firefox next month. Read More

Thumbnail Image

Sift Security helps SecOps teams analyze and visualize patterns of threats and speed up investigations  

Sift Security is a new entry in the market of tools that quicken and simplify the hunt for security threats. The graphical interface helps security analysts see threat patterns at a glance Read More

Thumbnail Image

A hackable election: 5 things you need to know about e-voting machines

As the U.S. heads toward a contentious national election in November, 15 states are are still clinging to outdated electronic voting machines that don't support paper printouts used to audit their internal vote counts. Read More

Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application. Read More

Thumbnail Image

This Tinder scam promises to verify your account, but actually sells porn

Tinder users beware. The popular dating app generally doesn't verify user accounts, but that hasn't stopped spammers from pretending to offer the service. Read More

Thumbnail Image

FBI needs to beef-up high-tech cyber threat evaluations says DoJ Inspector General

a report out this week from the Department of Justice's Office of the Inspector General which found that while the FBI has an annual process, known as Threat Review and Prioritization (TRP), to identify the most severe and substantial threats and direct resources to them, the process employs subjective terminology that is open to interpretation, and as such does not prioritize cyber threats in an objective, data-driven, reproducible, and auditable manner. Read More

White Paper: CloudFlare

Breaking Down a DoS Attack

Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Integration projects that went terribly wrong

10 advanced endpoint protection tools Read More

Most-Read Stories

1. 19 free cloud storage options
2. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
3. Credibility and trust: Microsoft blows it
4. Peeping into 73,000 unsecured security cameras thanks to default passwords
5. 7 free tools every network needs
6. How Forbes inadvertently proved the anti-malware value of ad blockers
7. 9 Common Spanning Tree Mistakes
8. 6 free network vulnerability scanners
9. Ten operating systems for the Raspberry Pi
10. 10 biggest home networking mistakes (and how to fix them)
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive