Thursday, May 26, 2016

5 active mobile threats spoofing enterprise apps

Not dead yet: 7 of the oldest federal IT systems still wheezing away

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 26, 2016
Featured Image

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Not dead yet: 7 of the oldest federal IT systems still wheezing away
Apple hires mobile encryption pioneer amid encryption debate
Five arrested for impersonating the IRS, listen to a recorded scam in progress
How to use Anycast to provide high availability to a RADIUS server
Top-level domain expansion is a security risk for business computers
Regulators: cybersecurity poses biggest risk to global financial system
Software-Defined WANs: Viptela gets $75M in funding
DARPA moves "aircraft-like" spacecraft technology to next phase

White Paper: Okta

Businesses @ Work, March 2016

Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Read More

Thumbnail Image

Not dead yet: 7 of the oldest federal IT systems still wheezing away

From an IBM Series/1 and floppy drives to COBOL and Assembly languages, old federal systems never die. Read More

Thumbnail Image

Apple hires mobile encryption pioneer amid encryption debate

Apple revealed Tuesday that it rehired a security expert who has a background as a mobile encryption pioneer, as the company continues to face scrutiny from governments wanting more access to its products. Read More

Thumbnail Image

Five arrested for impersonating the IRS, listen to a recorded scam in progress

Five people have been arrested in Miami who are said to be responsible for scamming 1,500 people out of more than $2 million by impersonating IRS agents. Their scams centered on contacting individual taxpayers out of the blue and demanding payments under the threat of jail time. Read More

Thumbnail Image

How to use Anycast to provide high availability to a RADIUS server

A brilliant solution for providing high availability in a small RADIUS server/ISE deployment Read More

Thumbnail Image

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between internal domain names used inside corporate networks and domains that can now be registered on the public Internet. Read More

Thumbnail Image

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. The SEC promises to step up regulation and Swift itself is expected to launch a new cyber security initiative this week that includes independent security audits of its customers. Read More

Thumbnail Image

Software-Defined WANs: Viptela gets $75M in funding

Looking to continue tapping a market IDC says will be worth $6 billion by 2020, Software-Defined WAN company Viptela today said it raised $75M in a Series C round of financing. The new round of funding brings Viptela's total funding to about $110M. The company said it would use the proceeds to grow sales, marketing, technical support and research and development. Read More

Thumbnail Image

DARPA moves "aircraft-like" spacecraft technology to next phase

The reusable Experimental Spaceplane (XS-1) XS-1 will demonstrate the potential for low cost and "aircraft-like" high operations payload delivery to orbit. DARPA said Phase 2 and 3 development will likely see a single contract worth $140M (Phase II - $123M, Phase III - $17M). The research agency in 2014 awarded Boeing (working with Blue Origin) Masten Space Systems (working with XCOR Aerospace) and Northrop Grumman Corporation (working with Virgin Galactic) contracts to begin phase 1 XS-1 work. Read More

White Paper: C Spire Wireless

Finding Your Cloud: A down-to-earth guide to cloud planning

Given how entrenched "the cloud" has become in the business/IT lexicon, it's not surprising to see growing enthusiasm for the potential and power of cloud computing. A study from IDG found that half of executive-level managers see cloud computing as transformational to their business. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

20 best new iPhone, iPad games

Top 10 ways to retain IT security talent Read More

Most-Read Stories

1. To fix long security checkpoint lines, kick the TSA out of airports
2. Why I switched back to Firefox
3. 19 free cloud storage options
4. 10 things we love about the new Firefox browser
5. HPE to spin out its huge services business
6. 10 more pointless (but awesome) Linux terminal tricks
7. Windows 7 updates have been broken for several days
8. 13 things you need to know about MU-MIMO Wi-Fi
9. Microsoft has been conning Windows users for two months
10. There's finally reason to hope in the war against ransomware
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive