Thursday, February 25, 2016

Attackers can turn Microsoft's exploit defense tool EMET against itself

IT manager gets 30 months in jail for code-bombing firm's intellectual property

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 25, 2016
Featured Image

Attackers can turn Microsoft's exploit defense tool EMET against itself

Hackers can easily disable the Microsoft Enhanced Mitigation Experience Toolkit (EMET), a free tool used by companies to strengthen their Windows computers and applications against publicly known and unknown software exploits. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IT manager gets 30 months in jail for code-bombing firm's intellectual property
BlackBerry eyes IoT, diversifies with new cybersecurity practice
Lawmakers push for encryption commission to find compromise
Review: 8 password managers for Windows, Mac OS X, iOS, and Android
7 heavily-hyped information security products, vendors that hit the scrap heap
Nissan Leaf owners: Prepare to be pranked by hackers thanks to insecure API
Two-factor authentication not secure, say researchers

White Paper: CloudFlare

CloudFlare Advanced DDoS Protection

Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. Read More

Thumbnail Image

IT manager gets 30 months in jail for code-bombing firm's intellectual property

Shah admitted that in March 2012, he left Smart Online to work for another technology company, and on June 28, 2012, he sent malicious computer code to Smart Online's computer servers in Durham and Raleigh, North Carolina, deleting much of Smart Online's intellectual property and causing some $5,000 in damages. Read More

Thumbnail Image

BlackBerry eyes IoT, diversifies with new cybersecurity practice

Struggling smartphone vendor BlackBerry is looking to diversify its business by launching a cybersecurity consulting service, focusing in part on the Internet of Things, and providing related tools to customers. Read More

Thumbnail Image

Lawmakers push for encryption commission to find compromise

Congress should allow an expert commission to recommend ways to resolve a contentious debate over police access to encrypted communications before passing "knee-jerk" legislation, one lawmaker says. Read More

Thumbnail Image
INSIDER

Review: 8 password managers for Windows, Mac OS X, iOS, and Android

LastPass, 1Password, and Dashlane edge KeePass and company in features, flexibility, and ease Read More

Thumbnail Image
INSIDER

7 heavily-hyped information security products, vendors that hit the scrap heap

If they can't secure their own future, the fate of your data is also doubtful. Read More

Thumbnail Image

Nissan Leaf owners: Prepare to be pranked by hackers thanks to insecure API

Researchers revealed vulnerabilities in insecure APIs which could allow hackers to remotely control the heating and air conditioning in a Nissan Leaf and access your historic driving data. Read More

Thumbnail Image

Two-factor authentication not secure, say researchers

Once thought secure, questions are now being raised by researchers as to just how bullet-proof texted verification codes are. Read More

White Paper: Kony Inc

Mobility Challenges

This paper examines the most recent research on companies' top mobile priorities and challenges. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 rumored Apple products we can expect to see in 2016

Coolest and most unusual NYC Toy Fair 2016 techie playthings Read More

Most-Read Stories

1. Countless computers vulnerable to MouseJack attack through wireless mice and keyboards
2. 'Racking a switch upside down?'
3. Has open source hell frozen over?
4. IT manager gets 30 months in jail for code-bombing firm's intellectual property
5. VMware turns to IBM in the public cloud
6. Coolest new Android & Windows phones of MWC 2016
7. iPhone 7 Rumor Rollup: Interference-free & waterproof; dazzling new concept designs
8. 19 free cloud storage options
9. Skullcandy unplugs MPLS, moves to WAN-as-a-Service
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive