Monday, August 1, 2016

Black Hat: 9 free security tools for defense & attacking

The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Aug 01, 2016
Featured Image

Black Hat: 9 free security tools for defense & attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)
New Android Trojan SpyNote leaks on underground forums
There are mobile and IoT companion documents for the CIS (Top 20) Critical Security Controls
Cisco: Potent ransomware is targeting the enterprise at a scary rate
Cisco patches critical exposure in management software
Trump's hacking comment rattles the cybersecurity industry
Bugs & Bugs: National Moth Week, PHP, Black Hat & more

Video/Webcast: Google

Citrix Customers Put Google Chromebooks to Work

Work is no longer where we go in the morning, work is what we do - what we get done. Watch this Citrix and Google webcast to learn how you can implement a secure, fast, simple and sharable solution within your organization today. Read More

Thumbnail Image

The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)

Yes it's that time again…Time to search the old news-feed and find some of the most interesting and sometimes weird and wacky high-tech stories of the year. This time out we feature a look at everything from fireworks displays in space to Starship Enterprise remakes and mermaid robots – just to name a few cool stories. Read More

Thumbnail Image

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks. Read More

There are mobile and IoT companion documents for the CIS (Top 20) Critical Security Controls

Security practitioners are familiar with the Center for Internet Security (CIS) Critical Security Controls. Did you know there are versions of these controls tailored to mobile and Internet of Things? Read More

Thumbnail Image

Cisco: Potent ransomware is targeting the enterprise at a scary rate

Enterprise targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco's Mid-Year Cybersecurity Report out this week. Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target. Read More

Thumbnail Image

Cisco patches critical exposure in management software

Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines. Read More

Thumbnail Image

Trump's hacking comment rattles the cybersecurity industry

Donald Trump's muddled stance on hacking has disturbed security experts at time when the tech industry is looking for clarity on the U.S.'s cyber policy. Read More

Thumbnail Image

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event Read More

White Paper: AT&T / AT&T Wireless

Flexible Network-Based, Enterprise-Class IP VPN Solutions for Hybrid Public/Private Network Connectivity

Today's enterprise WAN networking environment is characterized by global coverage, an end-to-end IP-based application environment, increasing use of on-demand applications, and a wide variety of network topologies, network carriers, and access services. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Happy anniversary, Windows 10: Here's what coming in the latest update

2016 technology industry graveyard Read More

Most-Read Stories

1. 10 ways to celebrate Sysadmin Day
2. The CIA, NSA and Pokémon Go
3. Black Hat: 9 free security tools for defense & attacking
4. Baguette vending machine is the greatest invention since sliced bread
5. 19 free cloud storage options
6. Microsoft gives Office 365 a major upgrade
7. JavaScript keeps its spot atop programming language rankings
8. Microsoft brings Edge JavaScript engine to Linux, Mac OS X
9. Cisco: Potent ransomware is targeting the enterprise at a scary rate
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive