Thursday, April 28, 2016

Headaches likely to grow over auto cybersecurity concerns

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Apr 28, 2016
Featured Image

Headaches likely to grow over auto cybersecurity concerns

But while some short-term fixes may develop, forthcoming government auto cybersecurity standards won't happen until at least 2018. Furthermore, technologies, such as message encryption and authentication, which can be used to secure and verify the legitimacy of communications occurring along in-vehicle networks—cannot be incorporated into existing vehicles. Rather, such technologies must be incorporated during the vehicle design and production process, which according to experts, will take approximately 5 years to complete, Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises
4 password managers that make online security effortless
Man who hijacked HBO's satellite signal 30 years ago would face far different fate today
"The Good Wife" TV show could teach you a few things about modern technology
How to keep your small business safe from data breaches and hacks
More protection needed to guard grid from electromagnetic storm threat
Cyberespionage group abuses Windows hotpatching mechanism for malware stealth
Security Recruiter Directory
US Marshals set to auction fraudster's $1.5M high-end auto collection

White Paper: Lookout Mobile Security

Enterprise Mobile Threat Report

Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android. Read More

Thumbnail Image

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit. Read More

Thumbnail Image

4 password managers that make online security effortless

From complex-password generation and storage to auto-login and syncing across desktop and mobile devices, these programs make it so easy to keep your sensitive info safe. Read More

Thumbnail Image

Man who hijacked HBO's satellite signal 30 years ago would face far different fate today

On April 27, 1986, a Florida man with workplace access to a satellite transmission dish – and a financial beef with HBO -- pulled off the kind of audacious stunt that were it to happen today would likely land him in prison for a long, long time. Read More

Thumbnail Image

"The Good Wife" TV show could teach you a few things about modern technology

The CBS legal and political drama The Good Wife ends its 7-season run on May 8, and if you're not a regular viewer of the show it might surprise you to learn how clever the writers are at coming up with plots ripped from the day's top technology news headlines. Read More

Thumbnail Image

How to keep your small business safe from data breaches and hacks

Ecommerce and security experts provide 10 tips for preventing breaches and hacks and keeping customer data safe. Read More

Thumbnail Image

More protection needed to guard grid from electromagnetic storm threat

The United States isn't as deeply unprepared for electromagnetic threats – either from space or man-made -- as it was a few years ago but a lot of work remains and awareness of the danger needs to be amped-up if the country wants to truly protect the electric grid. Read More

Thumbnail Image

Cyberespionage group abuses Windows hotpatching mechanism for malware stealth

A cyberespionage group active in Asia has been leveraging a Windows feature known as hotpatching in order to better hide its malware from security products. Read More

Thumbnail Image
INSIDER

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read More

Thumbnail Image

US Marshals set to auction fraudster's $1.5M high-end auto collection

The US Marshals this week announced the auction of the Hauk's spoils -- 25 vehicles, including Ferrari, Mclaren, BMW and Porche cars worth more than $1.5 million. According to the United States Attorney for the Western District of Missouri, Hauk embezzled over $4 million from investors from his firm's clients and just went to town with it. Aside from the high-end cars and motorcycles, during a five-year period, Hauk spent also approximately $1,207,639 using three credit cards Read More

White Paper: Lookout Mobile Security

IDG Whitepaper: IT Leaders Buying into Mobile Security

This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Send in the Microsoft Surface clones

10 whaling emails that could get by an unsuspecting CEO Read More

Most-Read Stories

1. 19 free cloud storage options
2. 7 million accounts compromised via Lifeboat hack, a Minecraft Pocket Edition community
3. Peeping into 73,000 unsecured security cameras thanks to default passwords
4. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
5. Microsoft outlines new features coming in Windows 10 Anniversary Update
6. Most powerful Internet of Things companies
7. The Ethernet community is working to introduce six new rates in the next 3 years
8. 7 free tools every network needs
9. New products of the week 4.25.16
10. Cool products at OpenStack Austin Summit
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive