Thursday, December 31, 2015

Malware peddlers offered Raspberry Pi money to infect your micro-PC

The next wave of cybercrime will come through your smart TV

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 31, 2015
Featured Image

Malware peddlers offered Raspberry Pi money to infect your micro-PC

You know you've "made it" when you attract attention from malware distributors. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The next wave of cybercrime will come through your smart TV
DARPA wants early warning system for power-grid cyberattacks
The most innovative and damaging hacks of 2015
U.S. Marshals issue telephone scam warning
Ex-US State Dept. worker pleads guilty to extensive "sextortion," hacking and cyberstalking acts
Mingis on Tech: Hackable health records, bold predictions for 2016
US Homeland Security wants heavy-duty IoT protection
The year in security, identify theft and fraud

White Paper: PC Connection

Harness the Power of Flash Storage

In this white paper, you will learn how PC Connection and EMC have partnered together to offer IT solutions built on the latest, most innovative flash technologies. Read More

Thumbnail Image

The next wave of cybercrime will come through your smart TV

Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers. Read More

Thumbnail Image

DARPA wants early warning system for power-grid cyberattacks

The Defense Advanced Research Projects Agency (DARPA) is looking to bolster the nation's grid defenses with a system called Rapid Attack Detection, Isolation and Characterization (RADICS) that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More

Thumbnail Image

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead Read More

Thumbnail Image

U.S. Marshals issue telephone scam warning

The U.S. Marshals Service today warned of a telephone scam that has some scamster calling random victims and alleging they or their family members have an active federal arrest warrant and demanding payment of fines. The scam is similar to one the IRS says still plagues the agency and public whereby the fraudster calls victims saying they are from the IRS and want payments for back taxes or other made up scenarios. Read More

Thumbnail Image

Ex-US State Dept. worker pleads guilty to extensive "sextortion," hacking and cyberstalking acts

The former US Department of State man accused of hacking into hundreds of victims' e-mail and social media accounts, stealing thousands of sexually explicit photographs, and threatening at least 75 victims that he would post those photos and other personal information unless they agreed to his "sextortionate" demands has entered a guilty plea to the nefarious attacks. Read More

Thumbnail Image
Video

Mingis on Tech: Hackable health records, bold predictions for 2016

In Computerworld's latest video podcast, Executive News Editor Ken Mingis and writers discuss the sorry state of health records security and out-there predictions for IT in 2016. Watch Now

Thumbnail Image

US Homeland Security wants heavy-duty IoT protection

DHS said ...By using the Internet and its various connection mediums (e.g., Bluetooth, Wi-Fi, serial interface, wireless), any IoT system can be connected to any other device on the Internet. This level of connectivity opens tremendous opportunities for the capabilities of IoT-based systems, but also allows every node, device, data source, communication link, controller and data repository attached to IoT to serve as a security threat and be exposed to security threats. Therefore, any IoT system's security is limited to the security level of its least secure component Read More

Thumbnail Image
INSIDER

The year in security, identify theft and fraud

There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More

White Paper: PC Connection

Protect Your Organization When the Unexpected Happens

Although hardware has become more resilient and virtualization has increased service and application portability, most BC/DR plans still fail to adequately protect organizations from harm when the unexpected happens. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive