Wednesday, March 2, 2016

IRS warns of nasty W-2 phishing scheme

Social media cyberstalker gets 10 years in slammer

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 02, 2016
Featured Image

IRS warns of nasty W-2 phishing scheme

The IRS said the scheme has claimed several victims as payroll and human resources offices mistakenly email payroll data including Forms W-2 that contain Social Security numbers and other personally identifiable information to cybercriminals posing as company executives. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Social media cyberstalker gets 10 years in slammer
FTC: Imposter scams, identity theft, and debt collection top consumer grumbles
Why you need to be proactive not reactive to cybersecurity threats
Cybercriminals face hacker talent shortage
FBI director admits mistake was made with San Bernardino iCloud reset
Legislation seeks independent commission on security and technology
Review: 5 application security testing tools compared
As encryption debate rages, inventors of public key encryption win prestigious Turing Award

White Paper: Axway

API Security Checklist

Check out this security checklist to learn 11 ways to guard your enterprise entry points. Read More

Social media cyberstalker gets 10 years in slammer

A 31-year-old Florida man got 10 years behind bars for hacking women's social media accounts including Facebook, stealing pictures and personal information and posting it on pornographic websites. Specifically Michael Rubens was sentenced to 10 years in prison for cyberstalking, unauthorized access to a protected computer and aggravated identity theft, a $15,000 fine and $1,550 in restitution his crimes, according to acting Northern District of Florida U.S. Attorney Christopher Canova. Read More

Thumbnail Image

FTC: Imposter scams, identity theft, and debt collection top consumer grumbles

The Federal Trade Commission found few surprises in its annual summary of consumer complaints – offensive debt collection activities, identity theft, and imposter scams were the main offenders in 2015. Imposter scams have been in the news of late because the Internal Revenue Service issued a report in January that said that aggressive and threatening phone calls by criminals impersonating IRS agents continues to plague taxpayers. Read More

Thumbnail Image

Why you need to be proactive not reactive to cybersecurity threats

Security executives urge firms not to lose focus on prevention. They advise developing a holistic plan for IT and business units to fight cybersecurity together. Read More

Thumbnail Image

Cybercriminals face hacker talent shortage

Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this morning. Read More

Thumbnail Image

FBI director admits mistake was made with San Bernardino iCloud reset

The director of the Federal Bureau of Investigation has conceded it was a mistake to ask San Bernardino County to reset the password of an iCloud account that had been used by gunman Syed Farook. Read More

Thumbnail Image

Legislation seeks independent commission on security and technology

Bipartisan legislation introduced in Congress on Monday calls for creating an independent, 16-member national commission on security and technology challenges. Read More

Thumbnail Image
INSIDER

Review: 5 application security testing tools compared

Users weigh in on favorite features, room for improvement. Read More

Thumbnail Image

As encryption debate rages, inventors of public key encryption win prestigious Turing Award

The inventors of public key cryptography have won the 2015 Turing Award, just as a contentious debate kicks off in Washington over how much protection encryption should really offer. Read More

White Paper: Sumo Logic

Are Users the Achilles Heel of Security

In this white paper, you will learn why growth in security spend does not equate with elimination of security threats. You will also learn what steps you can take to prevent security breaches from your greatest threat - your users. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 cheap alternatives to the Microsoft Surface

Apple v. FBI – Who's for, against opening up the terrorist's iPhone Read More

Most-Read Stories

1. Microsoft separates Windows 10 Mobile updates from firmware
2. Cautionary tale: What happens after daring elite hackers to hack you?
3. NASA wants to get supersonic with new passenger jet
4. Elementary boss watches the Linux distro make great strides
5. 20 cool things you can do with a Raspberry Pi
6. 19 free cloud storage options
7. Hot security products at RSA 2016
8. Amazon, Google and Microsoft's cloud acquisitions
9. Cisco's dominance continues
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive