Tuesday, February 2, 2016

8 hot technologies the CIA wants

Harvard study refutes 'going dark' argument against encryption

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 02, 2016
Featured Image

8 hot technologies the CIA wants

Spy agency's interests range from 3D printing of electronics to reconnaissance drones that hover indefinitely. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Harvard study refutes 'going dark' argument against encryption
The Endpoint Security Continuum
An interactive graphical history of large data breaches
At least some consumers are paying attention to cybersecurity
Trojanized Android games hide malicious code inside images
Communication breakdown: US Secret Service needs a radio-system upgrade
10 of today's really cool network & IT research projects
Microsoft Edge InPrivate browsing mode is full of fail and not private

White Paper: AllClear ID

Build a Privacy Organization to Manage Customer Data Effectively

Download this new report from Forrester Research, Inc., and learn what capabilities are necessary to build a cohesive and robust privacy program - and how your business will be able to more effectively manage consumer data as a result. Read More

Thumbnail Image

Harvard study refutes 'going dark' argument against encryption

A study from Harvard released Monday largely refutes claims that wider use of encryption in software products will hamper investigations into terrorism and crime. Read More

The Endpoint Security Continuum

Next-generation endpoint security action is divided into two camps: Advanced prevention and in-depth detection and response. In between these poles lie an assortment of additional security controls. Read More

Thumbnail Image

An interactive graphical history of large data breaches

Information Is Beautiful's interactive visualization of data breaches involving loss of 30,000 or more records is sobering. Read More

Thumbnail Image

At least some consumers are paying attention to cybersecurity

A new Experian survey shows that people are beginning to take cybersecurity and privacy into consideration. Read More

Thumbnail Image

Trojanized Android games hide malicious code inside images

Over 60 Android games hosted on Google Play had Trojan-like functionality that allowed them to download and execute malicious code hidden inside images. Read More

Thumbnail Image

Communication breakdown: US Secret Service needs a radio-system upgrade

The US Secret Service needs to upgrade its radio communications system before it creates problems in protecting the White House, the Vice President's residence and foreign diplomatic embassies. That was the general conclusion of a report issued this week by The Department of Homeland Security Inspector General who stated: In the case of radio communications, a single missed transmission or delay could result in a national incident. Secret Service must ensure that its communications programs work effectively. Read More

Thumbnail Image

10 of today's really cool network & IT research projects

New enterprise and consumer network technologies are coming fast and furious these days via well-heeled startups, and yes, even from more established tech players. But further back in the pipeline, in the research labs of universities and colleges around the world, that's where the really cool stuff is happening. Take a peek at some of the more intriguing projects under works in areas ranging from wireless to security to open source to robotics to cloud computing. Read More

Thumbnail Image

Microsoft Edge InPrivate browsing mode is full of fail and not private

Private browsing in Edge isn't so private as it records browsing history. Read More

White Paper: CatchPoint Systems Inc

DNS User Guide

With the DNS User Guide, you can better understand the complexities of DNS, and how optimizing your DNS servers will improve the performance of your website. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

26 of the craziest and scariest things the TSA has found on travelers

15 big data and analytics companies to watch Read More

Most-Read Stories

1. EVP Patel leaving Cisco
2. 19 free cloud storage options
3. An interactive graphical history of large data breaches
4. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
5. Peeping into 73,000 unsecured security cameras thanks to default passwords
6. VMware, Cisco SDNs Bring Home the Bacon
7. Forget Super Bowl 50: Let's crown the cabling Installer of the Year!
8. Despite layoffs, VMware has a big bet on this one cloud innovation
9. US lab develops gigantic turbine blades to capture vast wind energy
10. U.S. carriers stay tight-lipped on LTE-U deployments
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive