Network World Security Alert | | | | You know you've "made it" when you attract attention from malware distributors. Read More ▶ | | | White Paper: PC Connection In this white paper, you will learn how PC Connection and EMC have partnered together to offer IT solutions built on the latest, most innovative flash technologies. Read More ▶ | Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers. Read More ▶ | | The Defense Advanced Research Projects Agency (DARPA) is looking to bolster the nation's grid defenses with a system called Rapid Attack Detection, Isolation and Characterization (RADICS) that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More ▶ | | The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead Read More ▶ | | | The U.S. Marshals Service today warned of a telephone scam that has some scamster calling random victims and alleging they or their family members have an active federal arrest warrant and demanding payment of fines. The scam is similar to one the IRS says still plagues the agency and public whereby the fraudster calls victims saying they are from the IRS and want payments for back taxes or other made up scenarios. Read More ▶ | | The former US Department of State man accused of hacking into hundreds of victims' e-mail and social media accounts, stealing thousands of sexually explicit photographs, and threatening at least 75 victims that he would post those photos and other personal information unless they agreed to his "sextortionate" demands has entered a guilty plea to the nefarious attacks. Read More ▶ | | In Computerworld's latest video podcast, Executive News Editor Ken Mingis and writers discuss the sorry state of health records security and out-there predictions for IT in 2016. Watch Now ▶ | | DHS said ...By using the Internet and its various connection mediums (e.g., Bluetooth, Wi-Fi, serial interface, wireless), any IoT system can be connected to any other device on the Internet. This level of connectivity opens tremendous opportunities for the capabilities of IoT-based systems, but also allows every node, device, data source, communication link, controller and data repository attached to IoT to serve as a security threat and be exposed to security threats. Therefore, any IoT system's security is limited to the security level of its least secure component Read More ▶ | | There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More ▶ | | White Paper: PC Connection Although hardware has become more resilient and virtualization has increased service and application portability, most BC/DR plans still fail to adequately protect organizations from harm when the unexpected happens. Read More ▶ | | | |
0 comments:
Post a Comment