Monday, January 4, 2016

20 years ago: Hot sci/tech images from 1995

The weirdest, wackiest and coolest sci/tech stories of 2015

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 04, 2016
Featured Image

20 years ago: Hot sci/tech images from 1995

From Bill Gates to cool drones and space shots it was a cool year, mostly. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The weirdest, wackiest and coolest sci/tech stories of 2015
5 information security trends that will dominate 2016
Infosec's wish list for 2016
About those unsecured security cameras in the U.S. without password protection
How cameras in cars and drones are boosting wireless innovation
Cisco switch software vulnerable
The year in security, identify theft and fraud
The next wave of cybercrime will come through your smart TV

White Paper: Sophos Inc

Deciphering the Code: A Simple Guide to Encryption

This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Read More

Thumbnail Image

The weirdest, wackiest and coolest sci/tech stories of 2015

It's that time of year again when we take a look at some of the most interesting and sometimes silly sci/tech stories of the year. This year we have flame-throwing drones, wicked cool pictures of Pluto and quantum computing advancements to name just a few topics. Take a look. Read More

Thumbnail Image

5 information security trends that will dominate 2016

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends. Read More

Thumbnail Image

Infosec's wish list for 2016

As we approach 2016, several security experts joined us to provide their InfoSec Wish List for the new year. Some experts wish for the cyber equivalent of world peace, while others are just hoping for their digital Red Ryder, carbine action, two-hundred shot range model air rifle. Read More

Thumbnail Image

About those unsecured security cameras in the U.S. without password protection

Observations of some of the unsecured security cameras purportedly located in the U.S. Read More

Thumbnail Image

How cameras in cars and drones are boosting wireless innovation

We're already accustomed to cameras everywhere, in security and other fixed applications, and cameras are mainstream in mobile. Cars and drones are the next logical applications for cameras, and the use cases are already established and gaining momentum. The trend will introduce a new field of innovation and opportunity that I call "cameras in motion." Read More

Thumbnail Image

Cisco switch software vulnerable

IOS XE 16.1.1 for Catalyst 3850, 3650 could allow attackers to reload devices Read More

Thumbnail Image
INSIDER

The year in security, identify theft and fraud

There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More

Thumbnail Image

The next wave of cybercrime will come through your smart TV

Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers. Read More

White Paper: Sophos Inc

Encryption Buyers Guide

This guide details the capabilities to look for when evaluating endpoint encryption solutions. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive