Friday, March 3, 2017

Shape-up your network to precent attacks; Ramsomware is the new spam

Chrome for MacOS to block rogue ad injections and settings changes

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 03, 2017
Featured Image

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure's The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Chrome for MacOS to block rogue ad injections and settings changes
How to respond to a cyber attack
Free decryption tools now available for Dharma ransomware
Ransomware roundtable: Is this the new spam?
Slack bug paved the way for a hack that can steal user access
Avaya wants out of S.F. stadium suite, not too impressed with 49ers either
Cisco tries to squash Smart Install security abuse
Cisco warns of NetFlow appliance vulnerability

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Chrome for MacOS to block rogue ad injections and settings changes

Google has expanded its Safe Browsing service, allowing Google Chrome on macOS to better protect users from programs that locally inject ads into web pages or that change the browser's home page and search settings. Read More

Thumbnail Image

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software President and CEO Patrick Dennis have compiled best practices for preparing and responding to a cyber-attack and working with law enforcement. Read More

Thumbnail Image

Free decryption tools now available for Dharma ransomware

Researchers have created decryption tools for the Dharma ransomware after someone recently leaked the encryption keys for it. Read More

Thumbnail Image
Video

Ransomware roundtable: Is this the new spam?

Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it. Watch Now

Thumbnail Image

Slack bug paved the way for a hack that can steal user access

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick its users into handing over access. Read More

Thumbnail Image

Avaya wants out of S.F. stadium suite, not too impressed with 49ers either

Staring at a Chapter 11 bankruptcy, Avaya told the court last week it wants out of the$350,000 annual payment for its San Francisco 49ers stadium suite and that the team's recent miserable performance has made the suite harder to sell off. According to a Reuters report, the cost of the license for the suite, $350,000 due this month, is a burden on Avaya's estate and the company is seeking court permission to reject the agreement which was signed for 10 years. Read More

Thumbnail Image

Cisco tries to squash Smart Install security abuse

Cisco wrote in a blog this week that a "Smart Install network consists of one Smart Install director switch or router, also known as the integrated branch director (IBD), and one or more Smart Install client switches, also known as integrated branch clients (IBCs). Only Smart Install client switches are affected by the abuse. While there are no obvious indicators of an attacker abusing the Smart Install capabilities Read More

Thumbnail Image

Cisco warns of NetFlow appliance vulnerability

Specifically, Cisco wrote: "A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition Read More

White Paper: Turbonomic

Capacity Management in the Modern Data Center

As we have seen, capacity management tools are inappropriate for assuring application performance. What is needed in the modern data center is a real-time control system that solves the intelligent workload management problem that was left out of the design of the software-defined data center with the advent of virtualization. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. 5 lessons from Amazon's S3 cloud blunder and how to prepare for the next one
2. Border agents go all Monty Python on visa-holding software engineer
3. 10 killer Raspberry Pi projects (Collection 1)
4. Cisco warns of NetFlow appliance vulnerability
5. Google hopes cord-cutters will sign up for YouTube TV: 44 channels for $35
6. Coolest new Android phones at Mobile World Congress 2017
7. Hotel chain bets big on digital transformation and is seeing great results
8. Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform
9. Edge computing will blow away the cloud
10. Palo Alto Networks pays $105M for LightCyber to better detect network attacks
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive