Thursday, December 3, 2015

Biggest data breaches of 2015

Cisco patches permission hijacking issue in WebEx Meetings app for Android

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 03, 2015
Featured Image

Biggest data breaches of 2015

Data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups such as children. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco patches permission hijacking issue in WebEx Meetings app for Android
The world's most popular Instagram shots
Google accused of tracking school kids after it promised not to
Toy maker VTech says breach hit 6.4 million kids' accounts
Why you should lawyer up before a cyberattack
Ransomware and scammy tech support sites team up for a vicious one-two punch
7 security maneuvers to stay ahead of password exposures
Most hackable devices
Feds drive toward high-tech criminal tracking system standard

White Paper: Vormetric

Complying with Payment Card Industry (PCI DSS) Requirements with DataStax and Vormetric

DataStax with Vormetric offers a comprehensive data security solution to help organizations comply with PCI DSS requirements. Read More

Thumbnail Image

Cisco patches permission hijacking issue in WebEx Meetings app for Android

Cisco's WebEx Meetings application for Android had a vulnerability that allowed potentially rogue applications to hijack its permissions. Read More

Thumbnail Image

The world's most popular Instagram shots

Reuters Instagram account offers great shots of cats. Dogs, moon and other cool things. Read More

Thumbnail Image

Google accused of tracking school kids after it promised not to

Google has been collecting information about schoolchildren's browsing habits despite signing a pledge saying it was committed to their privacy, the EFF said Tuesday. Read More

Thumbnail Image

Toy maker VTech says breach hit 6.4 million kids' accounts

Educational toy maker VTech said Wednesday that 11.6 million accounts were affected by a mid-November cyberattack, including those of 6.4 million kids Read More

Thumbnail Image

Why you should lawyer up before a cyberattack

Damage from a breach isn't the only problem that comes along with a hack. Cybercrime exposes the enterprise to never-ending litigation too. Attorney-client privilege can help, though, say lawyers. Read More

Thumbnail Image

Ransomware and scammy tech support sites team up for a vicious one-two punch

Symantec has seen a curious fusing of two pernicious online threats, which could cause a big headache if encountered by users. Read More

Thumbnail Image

7 security maneuvers to stay ahead of password exposures

Attackers make unverified claims of compromised PayPal accounts on Pastebin Here are seven security habits and maneuvers enterprises and consumers can use to stay ahead of password exposures. Read More

Thumbnail Image

Most hackable devices

Many holiday gifts purchased this season are likely to be connected devices, including smart TVs, tablets, smartphones, notebooks and laptops, and video game consoles. Unfortunately, many of these devices will make homes more vulnerable to hackers. Read More

Thumbnail Image

Feds drive toward high-tech criminal tracking system standard

The main issue – and it's a big one – is that such the packages also known as offender tracking systems (OTS) operate and perform with no underlying industry standards for communications or software causing a myriad of problems for law enforcement agencies. An OTS typically consists of hardware, such as an ankle bracelet, used for collecting Global Positioning System (GPS) signals to determine an individual's location, and software for analyzing data collected from the hardware device. Read More

White Paper: Vormetric

Encryption as an Enterprise Strategy: An IANS Custom Report (July 2015)

IANS conducted a survey of over 100 information security professionals to see how they are dealing with advanced attacks while moving into cloud and outsourced service models, where they may have little control over security. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2015 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive