Search This Blog

Friday, May 25, 2012

Banking malware monitors victims by hijacking webcams and microphones, researchers say

9 warning signs of bad IT architecture | 9 great open-source media apps

Network World Compliance

Forward this to a Friend >>>


Banking malware monitors victims by hijacking webcams and microphones, researchers say
A new variant of SpyEye malware allows cybercriminals to monitor potential bank fraud victims by hijacking their webcams and microphones, according to security researchers from antivirus vendor Kaspersky Lab. Read More


WHITE PAPER: FireEye

Strategies for advanced threat security in 2012
Download this new FireEye research brief and learn how traditional security defenses can leave you vulnerable and necessary steps to gain visibility into all stages of the attack vector. Read now.

WHITE PAPER: CommVault

ESG Report: Modernizing Data Protection
In order to assess the current state of the data protection market, ESG recently conducted a global survey among IT professionals familiar with and/or responsible for data protection solutions and processes, as well as potential future plans. Learn More

9 warning signs of bad IT architecture
From kludges to manual re-keying to redundant apps, these are the telltale indicators of an IT environment gone amok Read More

9 great open-source media apps
No proprietary license? No problem Read More

Tech's $20 million CEOs
Eyebrow-raising executive compensation shows no signs of abating, and Network World's analysis of CEO pay finds the tech/telco industry is no exception. Read More


WHITE PAPER: F5

Controlling Migration to IPv6: A Gateway to Tomorrow
This White Paper describes how the BIG-IP LTM system help organizations migrate to IPv6, and can operate as an IPv4 to IPv6 gateway; operating identically in either environment, and within mixed environments. Learn More!

Confidential data: Delete it or eat it, say security experts
The only way for companies to guarantee their confidential data can't be stolen is to delete it. But few companies are making use of that guarantee, say security experts. Read More

NASA and cybersecurity: Ground control to Major Tom?
Latest claimed attack by Iranian students piles on to 47 attacks in fiscal year 2011, with 13 compromising the agency's computers Read More

How to avoid 5 common email management mistakes
Email managers have a lot at stake. After all, the volume of global electronic messages sent via email dwarfs all other forms of electronic communication, including social networking. Since the inception of electronic mail, which, according to some Internet historians, can be traced to a small mainframe app called 'MAILBOX' from the mid-1960s, human-to-human messages have been created, transmitted and stored in electronic format. But early email administrators could hardly have envisioned the complexity of current email infrastructure and the concomitant maze of technical, security, business and regulatory challenges. Read More


WHITE PAPER: Box

Cloud-Based Content Collaboration Services
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors. Read Now!

Intel launches cloud-based single sign-on service
Listed on AppExchange, Cloud SSO has been tightly integrated with Salesforce.com applications Read More

'Clueless' boards risk lawsuits, threaten national security
Energy/utilities sector ranks last on four of the best practices for cybersecurity, report exposes Read More

LulzSec MilitarySingles data breach caused by weak security
The major LulzSec data raid on the MilitarySingles.com dating site in March was caused by a catalogue of security problems including poor web application design and the use of weak encryption, an analysis from Imperva has claimed. Read More

McAfee reports big spike in malware
PC malware had its "busiest quarter in recent history," according to McAfee's quarterly security report released Wednesday. Read More

Windows 8 Security: What's New
When Windows 8 comes out later this year, the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet. Read More



SLIDESHOWS

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google warns users infected with DNSCharger as Web outage nears
  2. Groups launch gigabit-per-second broadband project
  3. Sales of unused IPv4 addresses gathering steam
  4. 9 warning signs of bad IT architecture
  5. Study finds 1 in 2 Americans are 'clueless' about Webcam hacking
  6. 10 years later, Alcatel-Lucent revisits Cisco and Juniper in the core
  7. VMware acquires desktop management company Wanova
  8. Is your dirty, nasty office making you sick?
  9. Consider desktops in the cloud for BYOD
  10. Windows 8 puts end to endless reboots

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: