Wednesday, July 27, 2016

Verizon's Yahoo deal creates tracking powerhouse, privacy groups warn

9 steps for a successful incident response plan

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 27, 2016
Featured Image

Verizon's Yahoo deal creates tracking powerhouse, privacy groups warn

Verizon's planned US$4.8 billion acquisition of Yahoo will create an international consumer tracking powerhouse that raises serious privacy concerns, some privacy advocates said. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

9 steps for a successful incident response plan
Cyberespionage group Patchwork sets its sights on multiple industries
Hackers can pick off, inject wireless keyboard keystrokes from 8 vendors, maybe more
Fitness device security inadequate
Nextdoor: Tool for good or another paranoid cog in the spy machine?
Kimpton Hotels is investigating a possible payment card breach
Identity Finder rebrands and comes out with a fear-inducing report
SMS-based two-factor authentication may be headed out the door

Video/Webcast: Endgame

The Endgame Hunt Cycle: Strategies from the Leader in Cyber Offense

The Endgame Hunt Cycle focuses solely on cyber offense and has redefined how enterprises hunt for never-before-seen adversaries within their network. Read More

Thumbnail Image

9 steps for a successful incident response plan

It is of vital importance to have a plan in place before an incident hits your company. Read More

Thumbnail Image

Cyberespionage group Patchwork sets its sights on multiple industries

A cyberespionage group known for targeting diplomatic and governmental institutions has branched out into many other industries, including aviation, broadcasting, and finance, researchers warn. Read More

Thumbnail Image

Hackers can pick off, inject wireless keyboard keystrokes from 8 vendors, maybe more

A vulnerability across at least eight brands of wireless keyboards lets hackers read keystrokes from 250 feet away. Read More

Thumbnail Image

Fitness device security inadequate

Many fitness trackers have a glaring lack of secure connections and can be tampered with to expose private user data, a security firm finds. Read More

Thumbnail Image

Nextdoor: Tool for good or another paranoid cog in the spy machine?

As more police agencies join the private social network Nextdoor, the better to engage and give news to communities, will people use the tool for good or turn it into another paranoid cog in the great spy machine? Read More

Thumbnail Image

Kimpton Hotels is investigating a possible payment card breach

Kimpton Hotels, operator of boutique hotels across the U.S., says it is investigating reports of a possible payment card data breach. If confirmed, it would become the latest in a string of successful attacks on hotel chain operators in the last year. Read More

Thumbnail Image

Identity Finder rebrands and comes out with a fear-inducing report

Identity Finder has rebranded as Spirion and released a fear-inducing report about sensitive data leakage whose purpose seems to be to drive sales. Read More

Thumbnail Image

SMS-based two-factor authentication may be headed out the door

SMS messaging for two-factor authentication might become a thing of the past. A U.S. federal agency is discouraging its use. Read More

White Paper: Endgame

Automate the Hunt for Hidden Threats Within Your Enterprise

Learn how to automate the hunt and deploy a continuous threat-hunting process to outmaneuver adversaries. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Happy anniversary, Windows 10: Here's what coming in the latest update

2016 technology industry graveyard Read More

Most-Read Stories

1. Apple's electric car plans just got serious
2. The CIA, NSA and Pokémon Go
3. 19 free cloud storage options
4. Low-speed Ethernet champions set plugfest ahead of new net standard
5. VMware, IBM, Microsoft are top cloud system managers, IDC says
6. Microsoft releases 'service pack 2' for Windows 7
7. Verizon unveils 'virtual network services'
8. Yahoo's homepage through the years
9. 6 Slack alternatives worth a look
10. Firefox sets kill-Flash schedule
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive