Thursday, March 10, 2016

How eye-tracking could stop PII leaks

Bill Gates on Apple v. FBI: A balance has to be made between the needs of investigators and privacy rights

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 10, 2016
Featured Image

How eye-tracking could stop PII leaks

Personally identifiable information getting inadvertently disclosed through phishing could be reined in by eye-tracking sensors, think scientists. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Bill Gates on Apple v. FBI: A balance has to be made between the needs of investigators and privacy rights
Why certain kinds of cyberattacks come from certain places
Mac ransomware KeRanger has flaws that could let users recover files
World's coolest concept cars
Microsoft patches remote code execution flaws in Windows, IE, Edge, Office
US national lab advances wireless charging for electric cars
Encryption project issues 1 million free digital certificates in three months
Home Depot will pay up to $19.5 million for massive 2014 data breach

Video/Webcast: Centrify Corporation

6 Ways to Avoid Data Breaches When Outsourcing IT

Join Tony Goulding, Director of Technical Product Management at Centrify, to learn how to secure remote access, minimize your organization's attack surface, thwart in-progress attacks and govern privileged access, while outsourcing IT administration. Read More

Thumbnail Image

Bill Gates on Apple v. FBI: A balance has to be made between the needs of investigators and privacy rights

Bill Gates thinks new laws are needed to sort out the encryption conflict going on between law enforcement and tech companies. Read More

Thumbnail Image

Why certain kinds of cyberattacks come from certain places

To understand the threat landscape, you need to know about history, economics, and more. Read More

Thumbnail Image

Mac ransomware KeRanger has flaws that could let users recover files

The KeRanger file-encrypting ransomware program for Mac OS X is based on Linux.Encoder and contains crypto flaws that could allow users to recover their files without paying cybercriminals. Read More

Thumbnail Image

World's coolest concept cars

Read More

Thumbnail Image

Microsoft patches remote code execution flaws in Windows, IE, Edge, Office

Microsoft has fixed 39 vulnerabilities in multiple Windows components, Internet Explorer, Edge, Office and .NET Framework, many of which allow for remote code execution. Read More

Thumbnail Image

US national lab advances wireless charging for electric cars

This week the US Energy Department's Vehicle Technologies Office, Oak Ridge National Laboratory (ORNL) and Hyundai America Technical Center Inc. said that technology they have been working on since 2012 could soon make wireless charging for electric cars more widespread. Read More

Thumbnail Image

Encryption project issues 1 million free digital certificates in three months

Let's Encrypt, an organization set up to encourage broader use of encryption on the Web, has distributed 1 million free digital certificates in just three months. Read More

Thumbnail Image

Home Depot will pay up to $19.5 million for massive 2014 data breach

Home Depot has agreed to pay as much as $19.5 million to remedy the giant data breach it suffered in 2014, the company confirmed on Tuesday. Read More

White Paper: SentinelOne Inc

A New Era in Incident Response

Organizations face advanced malware, exploits, and other cyber attacks targeting the endpoint. Even when a threat is identified, the organization remains vulnerable until it is mitigated. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best Apple iPhone 7 design concepts of 2016

Four years of Raspberry Pi: In pictures Read More

Most-Read Stories

1. 11 highest paying tech jobs in America
2. Windows 95 freaks out teenagers (See video)
3. Why Bank of America is not using the public cloud
4. 19 free cloud storage options
5. Home Depot will pay up to $19.5 million for massive 2014 data breach
6. Inside Bank of America's IT transformation
7. Skip deploying 802.11ac Wave 2
8. Cisco security chief: How to beat back security system complexity
9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
10. 4 presidential candidates on 4 tech issues
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive