Thursday, January 26, 2017

That online job candidate may be carrying a virus

Cisco scrambling to fix a remote-code-execution problem in WebEx

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 26, 2017
Featured Image

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco scrambling to fix a remote-code-execution problem in WebEx
Kaspersky Lab employee reportedly arrested in Russia on treason charges
Ransomware makes California nursing school feel ill
Four lesser-known Wi-Fi security threats and how to defend against them
Trump fence-sitting on encryption backdoors can't last
What to ask IDaaS vendors before you buy
(From our archives) 10 tips from the front lines of enterprise public cloud use
(From our archives) Airport 'X-ray art' courts TSA trouble

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Cisco scrambling to fix a remote-code-execution problem in WebEx

Cisco's Webex Browser Extension contain a critical bug that can open up customers' entire computers to remote code execution attacks if the browsers visit websites containing specially crafted malicious code. Read More

Thumbnail Image

Kaspersky Lab employee reportedly arrested in Russia on treason charges

One of the leading cybercrime investigators at antivirus vendor Kaspersky Lab was reportedly arrested in Russia as part of a probe into activities that could represent high treason. Read More

Thumbnail Image

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More

Thumbnail Image

Four lesser-known Wi-Fi security threats and how to defend against them

You've hardened your network against all the common weaknesses, now we'll show you how to take your wireless security to the next level. Read More

Thumbnail Image

Trump fence-sitting on encryption backdoors can't last

Politicians have to address encryption backdoors honestly if they hope to preserve strong encryption. Read More

Thumbnail Image
INSIDER

What to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need. Read More

Thumbnail Image

(From our archives) 10 tips from the front lines of enterprise public cloud use

A working group with representatives from some of the top companies in the world – GE, FedEX, Bank of America, JP Morgan Chase and Morgan Stanley to name a few – share lessons learned from using the hybrid cloud. Read More

(From our archives) Airport 'X-ray art' courts TSA trouble

Read More

White Paper: Cloudian

Modern, Cloud-conscious Approaches to Data Protection

Most data protection solutions make you choose between two imperfect storage options: high-cost disk or high-maintenance tape. There is a third option: object storage as a backup target. This analyst research note discusses how object storage works, how it uniquely solves the data protection challenge, and how it helps you meet your backup SLAs at 70% less cost than purpose-build backup appliances. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 painful ways people hurt themselves with computers/video games

10 amazing Raspberry Pi clusters Read More

Most-Read Stories

1. Game over for Solaris and SPARC?
2. Cisco snatches AppDynamics from IPO market for $37 billion
3. Avaya, in no-brainer, pulls $1 billion IPO in wake of bankruptcy filing
4. Saudi Arabia again hit with disk-wiping malware Shamoon 2
5. REVIEW: Home security cameras fall short on security
6. Severe vulnerability in Cisco's WebEx extension for Chrome leaves PCs open to easy attack
7. 5 tech jobs that will boom (and 2 that will bust) in 2017
8. 10 of the latest craziest and scariest things the TSA found on your fellow travelers
9. LinkedIn pumps water down to its server racks, uses one type of network switch for both Spine and Leaf network fabric
10. 19 free cloud storage options
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive