Search This Blog

Wednesday, June 27, 2012

FBI busts 24 in massive international online financial crime takedown

  LinkedIn lawsuit, stealing your password via LinkedIn phishing, password reuse | The 10 most demanding jobs in IT
 
  Network World Security

Forward this to a Friend >>>


FBI busts 24 in massive international online financial crime takedown
The FBI today said it directed what it called the largest coordinated international law enforcement action in its history directed at online "carding" crimes typically involving stolen credit card, bank account or personal identification information of hundreds of thousands of victims around the world. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Top 5 Reasons to Choose SolarWinds® LEM Over Splunk®.
SolarWinds Log & Event Manager (LEM), with node-based licensing that lets you pay only for what you monitor, is an affordable alternative to volume-based Splunk pricing. With real-time, in-memory event log correlation, active response technology and advanced IT search, you get all the features of a powerful SIEM solution, at an affordable price! Interested in learning more about powerful SIEM software for log collection, analysis and event management from SolarWinds? Click here to learn more and why to choose SolarWinds LEM over Splunk!

WHITE PAPER: Sourcefire, Inc.

Sourcefire FireSIGHT: Context-Aware and Adaptive Security
Learn why Context-Aware and Adaptive Security is the key to effective protection today. View Now

LinkedIn lawsuit, stealing your password via LinkedIn phishing, password reuse
The fallout over the password breach continues for LinkedIn which is facing a $5 million class-action lawsuit [PDF] after 6.5 million users had their passwords stolen. Read More

The 10 most demanding jobs in IT
What are the 10 most demanding jobs in IT? Read More

Bank hack: 'Operation High Roller' has netted $78M – so far
A global fraud ring has been targeting high net-worth businesses and individuals has netted the criminals an estimated $78 million (60 million euros). Read More


WHITE PAPER: Palo Alto Networks

Firewall Buyers Guide
Palo Alto Networks has asked IANS Research, an independent IT security, risk, and compliance research organization, to set the context for this Firewall Buyers Guide by evaluating how aspects of today's network security operations are changing, how user behaviors are shifting and the complexity of threats is increasing, and more. View Now

President Obama: Romney would be "outsourcer in chief"
Outsourcing has become a hot political football lately as the overall rhetoric builds in this presidential election year. The latest round of shots this time comes from President Obama who has released ads in Iowa, Ohio and Virginia that say presidential challenger Mitt Romney would be the "outsourcer-in-chief" should he be elected. Read More

Top CIOs take home seven-figure pay packages
CIOs and senior IT leaders have ascended the ranks of corporate America, and in some cases, they rate among the most highly paid executives at the largest U.S. companies. IT leaders at Fortune 500 companies including Aetna, Gap, FedEx, Home Depot and Walgreens took home multimillion-dollar pay packages in 2011. Read More

Cyber Security: LulzSec hackers plead guilty to DDoS Attack on SOCA website
Two teenage members of the LulzSec hacking group have pleaded guilty to charges that they attacked Serious Organised Crime Agency (SOCA) website. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Advanced persistent threats can be beaten, says expert
Officially, advanced persistent threats (APTs) from China are not even happening. But everybody in information security, especially those trying to protect enterprises from economic espionage, knows that APTs, typically originating in China, are a fact of life in the cyber world, government denials notwithstanding. Read More

FTC files lawsuit over data breaches at large hotel operator
The U.S. Federal Trade Commission has filed a lawsuit against hotel operator Wyndham Worldwide and three of its subsidiaries after three data breaches at Wyndham hotels in less than two years, the agency announced Tuesday. Read More

Summer security concerns: 4 warm-weather worries
Think summer means emptier offices and less to worry about in the security department? Not anymore. Read More

 
 
 

SLIDESHOWS

Top CIOs take home seven-figure pay packages
Fortune 500 CIOs and IT SVPs netted multimillion dollar compensation packages in 2011.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why Microsoft spent $1.2B on Yammer
  2. Top CIOs take home seven-figure pay packages
  3. Five needs driving SDNs
  4. DARPA spends $21.4M for Android mobile device security development
  5. OpenStack company Piston adds virtual desktop infrastructure
  6. Windows Phone 8 seen cementing developer loyalty to Microsoft
  7. Motorola's amazing wireless badge
  8. The more you encrypt, the more the government breaks into your cloud
  9. Gartner: One-third of consumer data will be stored in the cloud by '16
  10. Silent CEO, shadowy avatars fuel Google + 'ghost town' vibe
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: