Tuesday, March 29, 2016

Why IT can’t handle data breaches alone

New ransomware abuses Windows PowerShell, Word document macros

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 29, 2016
Featured Image
INSIDER

Why IT can't handle data breaches alone

"The entire C-suite and board is on the hot seat for security these days," says Matthew Karlyn. And that makes data breaches everyone's business. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

New ransomware abuses Windows PowerShell, Word document macros
DARPA $2M contest looks to bring AI to wireless spectrum provisioning
Malware authors quickly adopt SHA-2 through stolen code-signing certificates
People are (still) the biggest security risks
Petya ransomware overwrites MBRs, locking users out of their computers
A very cool twist on optical communications
New products of the week 3.28.16

Research/Infographic: Ixia

Infographic: What is the Cost of One More Test?

Think you can't afford one more test before launch? Consider the the cost of cleanup if there's a breach. Read More

Thumbnail Image

New ransomware abuses Windows PowerShell, Word document macros

A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including healthcare organizations, researchers from Carbon Black warn. Read More

Thumbnail Image

DARPA $2M contest looks to bring AI to wireless spectrum provisioning

The defense research agency recently announced a $2 million Grand Challenge called the Spectrum Collaboration Challenge (SC2) and said the primary goal of the contest was to infuse radios with "advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today's intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies." Read More

Thumbnail Image

Malware authors quickly adopt SHA-2 through stolen code-signing certificates

Researchers from Symantec have recently found samples of the Carberp.B online banking Trojan that were digitally signed with two stolen certificates: one using a SHA-1 signature and one using a SHA-2 signature. Read More

Thumbnail Image

People are (still) the biggest security risks

Social engineering and 'download this attachment' scams are back – as if they ever left – and working better than ever, unfortunately. Read More

Thumbnail Image

Petya ransomware overwrites MBRs, locking users out of their computers

The new Petya ransomware overwrites the master boot record (MBR) of the affected PCs, leaving the OS in an unbootable state, researchers from antivirus firm Trend Micro said. Read More

Thumbnail Image

A very cool twist on optical communications

University of Ottawa researchers say their discovery that a twisted optical beam in a vacuum travels more slowly than the speed of light could be a boon for quantum computing and communications, and could benefit enterprise IT shops down the line. Read More

Thumbnail Image

New products of the week 3.28.16

Our roundup of intriguing new products from companies such as CloudBerry and BlueData. Read More

Video/Webcast: Bromium

Roland Cloutier, CSO of ADP, on How to Prevent Endpoint Breaches

In this webcast, Roland Cloutier, CSO of ADP and one of the "Most Influential People in Security" according to Security Magazine shares his perspective on how to protect your enterprise from advanced cyber attacks in a mobile and cloud era. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

The most momentous tech events of the past 30 years

25 real-life ways people have been hurt using their phones Read More

Most-Read Stories

1. Microsoft's AI Tay offends and goes offline; Deepdrumpf AI snarks
2. iPhone 7 Rumor Rollup: Here come the airpods and 4K display; beyond the Phablet; iPhone 5SE mocking
3. 19 free cloud storage options
4. 10 big announcements from Google's Cloud Conference
5. 9 ways technology will change within the next 10 years
6. Thumbing through issue No. 1 of NetworkWorld
7. FAQ: What you need to know about 802.11ax Wi-Fi
8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
9. Data scientist Hilary Mason wants to show you the (near) future
10. iPhone SE reviews are glowing as device now available for pre-order
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive