Friday, June 3, 2016

Mysterious malware targets industrial control systems

Fed reports 50-plus breaches from 2011 to 2015, some instances of espionage

Email not displaying correctly? View it in your browser.

Computerworld Security

Jun 03, 2016
Featured Image

Mysterious malware targets industrial control systems

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Fed reports 50-plus breaches from 2011 to 2015, some instances of espionage
Facebook DeepText -- clever artificial intelligence, but YOU are the product
Extortion schemes expand, threatening consumers and businesses with data leaks

White Paper: Navisite

7 Steps to Developing a Cloud Security Plan

Security concerns are top-of-mind for IT executives in light of highly publicized data breaches at a wide range of leading enterprises and organizations. Read More

Thumbnail Image

Fed reports 50-plus breaches from 2011 to 2015, some instances of espionage

The U.S. Federal Reserve, the nation's central bank, detected more than 50 cybersecurity breaches between 2011 and 2015, including a handful attributed to espionage. Read More

Thumbnail Image

Facebook DeepText -- clever artificial intelligence, but YOU are the product

Facebook reveals artificial intelligence, which it calls DeepText. The deep-learning A.I. will help Zuck's social network to "improve user experiences" by "solving tricky language challenges." Read More

Thumbnail Image

Extortion schemes expand, threatening consumers and businesses with data leaks

Hackers use high-profile data breaches as opportunity to extort money from victims by threatening to release personal and sensitive data about them. Read More

White Paper: Anomali

Anomali Enterprise: An Operational Model for Breach Analytics and Intelligence

Shift to a single unifying methodology and model to slow the growing number data breaches. Learn about a new model that focuses on prioritization and relevance for both security operations and threat analysts. Read More

May Digital Magazine: Cross-border data blues

Check out our May Digital Magazine, featuring an in-depth story on the EU's new data protection regulations and the pressure on IT teams to achieve compliance. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive