Thursday, March 24, 2016

The most momentous tech events of the past 30 years

9 ways technology will change within the next 10 years

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 24, 2016
Featured Image

The most momentous tech events of the past 30 years

History-making events from Cisco, IBM and Nortel to Facebook, Google and Apple. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

9 ways technology will change within the next 10 years
Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks
Uber dares hackers to find flaws, offers up to $10K bounty
IRS: Top 10 2015 identity theft busts
Social engineering 101: 18 ways to hack a human [Infographic]
FBI warning puts car hacking on bigger radar screen
This bag of tricks may help stop a Locky ransomware infection
FBI grows "Cyber Most Wanted" list with Syrian Electronic Army members

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image

9 ways technology will change within the next 10 years

Ten years ago, there were no smartphones. It was the coffeeshop era of Wi-Fi, which meant that the Internet was just beginning to follow us out the door and into the world. Amazon first released EC2, to some confusion. Here's a look ahead to 10 years in the future, and how the tech world may change. Read More

Thumbnail Image

Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks

Systems administrators should get ready to fix a critical vulnerability on April 12 that affects the Windows and Samba implementations of the Server Message Block (SMB) protocol. Read More

Thumbnail Image

Uber dares hackers to find flaws, offers up to $10K bounty

Uber has announced its first reward program to hackers who can find flaws in its computer and communications systems. Read More

Thumbnail Image

IRS: Top 10 2015 identity theft busts

The IRS faces an uphill battle in combatting identity theft, but that doesn't mean it isn't trying. In fiscal year 2015, the IRS said it started 776 identity theft related investigations, which resulted in 774 sentencings through its Criminal Investigation enforcement efforts. The courts continue to impose significant jail time with the average penalty in 2015 at 38 months in jail— the longest sentencing being over 27 years. Read More

Thumbnail Image
INSIDER

Social engineering 101: 18 ways to hack a human [Infographic]

Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Read More

Thumbnail Image

FBI warning puts car hacking on bigger radar screen

The FBI this week warned carmakers and owners that they need to pay much closer attention to automotive cybersecurity. The National Highway Transportation Safety joined with the FBI in warning consumer that the increasing number of computers in the form of electronic control units (ECUs) that control numerous vehicle functions from steering, braking, and acceleration, to the lights and windshield wipers make them vulnerable to potential cybersecurity problems. Read More

Thumbnail Image

This bag of tricks may help stop a Locky ransomware infection

A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs. Read More

Thumbnail Image

FBI grows "Cyber Most Wanted" list with Syrian Electronic Army members

According to the FBI, the new cybercriminals Amad Umar Agha 22, known online as "The Pro," and Firas Dardar, 27, known online as "The Shadow," engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. Read More

White Paper: SecureAuth

SecureAuth Bolsters Threat Detection with BehavioSec Partnership

SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Comedians find Apple-FBI standoff a laughing matter (watch videos)

How to respond to ransomware threats Read More

Most-Read Stories

1. 'Unicorn' Domo unveils new business analytics cloud features, more funding
2. Chuck Robbins rewires Cisco
3. Cisco reorganizes engineering in a big way; veteran Ahuja out
4. 19 free cloud storage options
5. Male computer programmers shown to be right up there with chefs, dentists on gender pay gap scale
6. First Look: The iPhone SE, and the rest of Apple's big announcements
7. FBI grows "Cyber Most Wanted" list with Syrian Electronic Army members
8. GoDaddy's now offering a cloud – why don't more companies do that?
9. Let's hope the FBI really can crack the terrorist's iPhone
10. 7 free Wi-Fi stumbling and surveying tools for Windows
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive