|
White Paper: Axway Check out this security checklist to learn 11 ways to guard your enterprise entry points. Read More ▶ |
A 31-year-old Florida man got 10 years behind bars for hacking women's social media accounts including Facebook, stealing pictures and personal information and posting it on pornographic websites. Specifically Michael Rubens was sentenced to 10 years in prison for cyberstalking, unauthorized access to a protected computer and aggravated identity theft, a $15,000 fine and $1,550 in restitution his crimes, according to acting Northern District of Florida U.S. Attorney Christopher Canova. Read More ▶ | |
The Federal Trade Commission found few surprises in its annual summary of consumer complaints – offensive debt collection activities, identity theft, and imposter scams were the main offenders in 2015. Imposter scams have been in the news of late because the Internal Revenue Service issued a report in January that said that aggressive and threatening phone calls by criminals impersonating IRS agents continues to plague taxpayers. Read More ▶ | |
Security executives urge firms not to lose focus on prevention. They advise developing a holistic plan for IT and business units to fight cybersecurity together. Read More ▶ | |
|
Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this morning. Read More ▶ | |
The director of the Federal Bureau of Investigation has conceded it was a mistake to ask San Bernardino County to reset the password of an iCloud account that had been used by gunman Syed Farook. Read More ▶ | |
Bipartisan legislation introduced in Congress on Monday calls for creating an independent, 16-member national commission on security and technology challenges. Read More ▶ | |
Users weigh in on favorite features, room for improvement. Read More ▶ | |
The inventors of public key cryptography have won the 2015 Turing Award, just as a contentious debate kicks off in Washington over how much protection encryption should really offer. Read More ▶ | |
White Paper: Sumo Logic In this white paper, you will learn why growth in security spend does not equate with elimination of security threats. You will also learn what steps you can take to prevent security breaches from your greatest threat - your users. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Apple v. FBI – Who's for, against opening up the terrorist's iPhone Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment