Thursday, January 21, 2016

Serious flaw patched in Intel Driver Update Utility

Privacy-conscious users rejoice: You can now use Facebook's Android app over Tor

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 21, 2016
Featured Image

Serious flaw patched in Intel Driver Update Utility

A software utility that helps users download the latest drivers for their Intel hardware components contained a vulnerability that could have allowed man-in-the-middle attackers to execute malicious code on computers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Privacy-conscious users rejoice: You can now use Facebook's Android app over Tor
5 things that top CSO candidates need on a resume
Intel Authenticate Hands-On
Netflix will have trouble blocking VPNs used to stream blocked content
Healthcare IT execs fear loss of life due to hacked medical devices or networks
Feds seek balance between privacy and data collection
Data center outages increasingly caused by DDoS

Video/Webcast: EMA Research

Ahead of RSA - Threat Detection Algorithms Make Big Data into Better Data

Join David Monahan of EMA, and Wade Williamson, director of product marketing at Vectra Networks, on February 9th @11AM PST/ 2PM EST for this insightful webinar that explains how threat detection algorithms can replace your Big Data with better data. Read More

Thumbnail Image

Privacy-conscious users rejoice: You can now use Facebook's Android app over Tor

Facebook has added the option to route traffic from its Android mobile app over the Tor anonymity network. Read More

Thumbnail Image
INSIDER

5 things that top CSO candidates need on a resume

If all the recent IT hiring surveys are to be believed, chief security officers can expect a pretty sweet year in 2016. Job demand is up. Salaries are way up. And neither trend is expected to slow anytime soon. Yes, good CSOs can pretty much write their own ticket in 2016. That is, if they can write a good resume. Read More

Thumbnail Image
Video

Intel Authenticate Hands-On

Intel has quietly built what it calls Authenticate technology into its Skylake with vPro chips for businesses, combining multiple means of authentication for greater security. Watch Now

Thumbnail Image

Netflix will have trouble blocking VPNs used to stream blocked content

Netflix announced that it will block VPNs, proxies, and unblocking services its international subscribers use to access content blocked in their areas, as part of its plan to release content to 130 new countries. Here's why Netflix will fail. Read More

Thumbnail Image

Healthcare IT execs fear loss of life due to hacked medical devices or networks

According to Veracode's 'The State of Web and Mobile Application Security in Healthcare,' healthcare IT executives cited 'the potential for loss of life due to compromised networks or medical devices, brand damage due to theft of patient information and regulatory enforcement as their top fears related to such security breaches.' Read More

Thumbnail Image

Feds seek balance between privacy and data collection

Federal consumer-protection authorities expect companies to do more to educate consumers and offer options to limit how personal data is collected and used. Read More

Thumbnail Image

Data center outages increasingly caused by DDoS

UPS failure is still main cause of data center outages, says a report. However, cybercrime and human error is closing in on UPS's heels. DDoS-caused outages are up from 2% in 2010 to 22% now. Read More

White Paper: Cisco Systems

AMP BDS: Cisco AMP Excels in NSS Labs Test

Read the NSS Labs report to see how Cisco AMP proved effective against all evasion techniques tested and passed all stability and reliability tests. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best open source email security products

15 big data and analytics companies to watch Read More

Most-Read Stories

1. These are the 25 worst passwords of 2015
2. Data scientists have the hottest job in America
3. 19 free cloud storage options
4. Peeping into 73,000 unsecured security cameras thanks to default passwords
5. Linux kernel flaw endangers millions of PCs, servers
6. The 4 kinds of cybersecurity customers
7. Google details its vision for the IoT
8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
9. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise
10. The $2.3 million home lab of Scott Morris, Quadruple CCIE
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive