Monday, June 13, 2016

Swatting and phone scams: Hazards of caller ID spoofing

Malware Museum's 10 greatest hits

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 13, 2016
Featured Image

Swatting and phone scams: Hazards of caller ID spoofing

The anonymity that caller ID spoofing provides means people regularly fall victim to swatters and phone scammers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Malware Museum's 10 greatest hits
Industrial control systems vendors get careless about domain squatting
New Mozilla fund will pay for security audits of open-source code
Twitter locks some accounts after passwords exposed
National Intelligence office wants to perfect the art of security deception
NASA describes out of this world data glitch that almost finished its planet hunter

White Paper: Cisco Systems

5 Steps For Securing The Data Center: Why Traditional Security May Not Work

Datacenter admins face a significant challenge: They need to secure the datacenter without compromising the performance and functionality that new datacenter environments enable. Learn about the 5 steps you need to take to secure your data center. Read More

Thumbnail Image

Malware Museum's 10 greatest hits

Since the malware museum opened its virtual doors in February, its collection of de-fanged DOS-based malware from the 80s and 90s has attracted nearly 1 million views. Here are the museum's most downloaded viruses: Read More

Thumbnail Image

Industrial control systems vendors get careless about domain squatting

Many companies protect their brands by registering domain names that are very similar to their own, but manufacturers of industrial control systems don't seem to follow suit, potentially leaving customers open to malicious attacks. Read More

Thumbnail Image

New Mozilla fund will pay for security audits of open-source code

A new Mozilla fund, called Secure Open Source, aims to provide security audits of open-source code, following the discovery of key security bugs like Heartbleed and Shellshock in key pieces of the software. Read More

Thumbnail Image

Twitter locks some accounts after passwords exposed

Twitter said it had locked and called for a password reset of some accounts after an unconfirmed claim of a leak of nearly 33 million usernames and passwords to the social network. Read More

Thumbnail Image

National Intelligence office wants to perfect the art of security deception

This week the advanced technology developers from the Intelligence Advance Research Projects Activity (IARPA) office put out a Request For Information about how to best develop better denial and deception technologies – such as honeypots or deception servers for example -- that would bolster cyber security. Read More

Thumbnail Image

NASA describes out of this world data glitch that almost finished its planet hunter

The latest happened in April when Kepler went into "Emergency Mode" which among other things allows for priority access to ground-based communications via NASA's Deep Space Network. NASA noted at the time that the spacecraft is nearly 75 million miles from Earth, making the communication slow. Even at the speed of light, it takes 13 minutes for a signal to travel to the spacecraft and back. Read More

Video/Webcast: Juniper Networks

7 Trends Impacting Enterprise Campus Networks

Campus networks hold a critical role in enabling the success of the organization. To meet the next set of challenges, campus networks must now provide better capabilities for:

- Next generation mobility with unified wireless
- Effective security in a campus setting
- Improve access and integration with the Cloud Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 more pointless (but awesome) Linux terminal tricks

40 years of Apple: Apple's most innovative products Read More

Most-Read Stories

1. Hot security startups to watch
2. 19 free cloud storage options
3. Millions of sensitive services exposed on the internet reveal most hackable countries
4. Qualcomm's Connected Car Reference Platform to connect smart cars to everything
5. Four top innovators are leaving Cisco
6. Massive DDoS attacks reach record levels as botnets make them cheaper to launch
7. VMware: We love OpenStack!
8. LinkedIn data breach still causing problems
9. 7 free tools every network needs
10. Your step-by-step guide to repairing Windows 10
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive