Thursday, September 22, 2016

Cisco Talos: Spam at levels not seen since 2010

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Sep 22, 2016
Featured Image

Cisco Talos: Spam at levels not seen since 2010

"Many of the host IPs sending Necurs' spam have been infected for more than two years. To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions. An infected host might be used for two to three days, and then sometimes not again for two to three weeks. This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

More than 840,000 Cisco devices are vulnerable to NSA-related exploit
Security challenge: Wearing multiple hats in IT
3D printers hackable via smartphone
How to protect your mission-critical information
Cisco CEO Robbins: Wait til you see what's in our innovation pipeline
Apple's new macOS Sierra fixes over 60 security flaws
Is security making the grade? What IT and business pros really think
Education needs to study up on fighting ransomware
Hackers sell tool to spread malware through torrent files

White Paper: Masergy Communications Inc.

5 Business Requirements for a Software Defined WAN

The corporate WAN is now the focus of considerable attention after years of modest network innovation. This is due in large part to new efforts behind Software Defined Networking (SDN) standards and architectures. Read More

Thumbnail Image

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

More than 840,000 Cisco networking devices from around the world are affected by a recently discovered vulnerability that's similar to one exploited by a hacking group believed to be linked to the U.S. National Security Agency. Read More

Thumbnail Image
INSIDER

Security challenge: Wearing multiple hats in IT

Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits. Read More

Thumbnail Image

3D printers hackable via smartphone

Hackers can use a smartphone to capture electromagnetic energy and sound emanating from a 3D printer nozzle, allowing them to steal intellectual property. Read More

Thumbnail Image

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them. Read More

Thumbnail Image
INSIDER

Cisco CEO Robbins: Wait til you see what's in our innovation pipeline

Analytics, collaboration and security key to addressing hyper-distributed data centers and networks, Cisco CEO Chuck Robbins says. Read More

Thumbnail Image

Apple's new macOS Sierra fixes over 60 security flaws

Aside from new and interesting features, macOS Sierra 10.12 has a large number of important security fixes. Read More

Thumbnail Image

Is security making the grade? What IT and business pros really think

When it comes to security, who's in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light. Read More

Thumbnail Image

Education needs to study up on fighting ransomware

Of five major industries examined by BitSight - finance, retail, healthcare, energy/utilities, government and education – education is hit by ransomware at a much higher rate than the others. Read More

Thumbnail Image

Hackers sell tool to spread malware through torrent files

Be careful with what you torrent. A new tool on the black market is helping hackers distribute malware through torrent files in exchange for a fee. Read More

White Paper: Masergy Communications Inc.

Cloud-based Unified Communications Buyer's Guide

UCaaS is an increasingly attractive approach to delivering the latest communications and collaboration tools in a highly distributed and mobile workforce. A cloud-based UC solution frees you from the hassle of upgrading hardware, updating software and keeping up with the onslaught of security patches. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Open source routers deliver low cost, flexibility

25 CIO pay packages revealed Read More

Most-Read Stories

1. Cisco CEO Robbins: Wait til you see what's in our innovation pipeline
2. Dell-EMC positioned to take the lead in the HCI space
3. Researchers remotely hack Tesla Model S while it is being driven
4. Cisco CEO: Spin-in technologies aren't dead at Cisco
5. Black Friday 2016 tech ads will be leaking before you know it
6. 7 free tools every network needs
7. Teenager claims he accessed FTPs, downloaded data from every state with .us domain
8. 19 free cloud storage options
9. Why this hospital is moving to Amazon's cloud
10. Boo! iPhone 7 hissing for some customers
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive