Search This Blog

Friday, December 27, 2013

Google’s Vint Cerf defines Internet of Things challenges

Cryptolocker ransom Trojan infected 250,000 PCs, Dell SecureWorks estimates | 10 top tests of 2013

Network World Security

Forward this to a Friend >>>


Google's Vint Cerf defines Internet of Things challenges
We are going to have to live through a period of mistakes and challenges before we can make any strong regulations about the privacy issues and other challenges the Internet of Things present. That was Vint Cerf, vice president and chief internet evangelist for Google's response to a regulation question at his keynote before today's Federal Trade Commission's workshop on the Internet of Things trend.... Read More


RESOURCE COMPLIMENTS OF: Netop - NWW

Provide Secure Remote Support from a Browser
With enterprise-grade secure remote access solution, Netop Remote Control, you can connect to and support Windows devices from a web browser. To establish a connection, just launch your favorite browser, enter the IP address of the target device and your credentials. Learn more.

WHITE PAPER: Cisco and Netapp

Total Economic Impact Of FlexPod Data Center Platform
FlexPod is a data center platform jointly developed by NetApp and Cisco that delivers networking, computing and storage. This Forrester report offers key findings from Forrester's interviews with FlexPod customers. View Now

Cryptolocker ransom Trojan infected 250,000 PCs, Dell SecureWorks estimates
The feared Cryptolocker ransom Trojan has infected at least a quarter of a million PCs worldwide, a success rate probably generating somewhere in the low millions of dollars in ransom payments, a new analysis by Dell SecureWorks has estimated. Read More

10 top tests of 2013
Network World tested hundreds of products in 2013, but here are our top 10 tests of the year. In order to make the list, the product review had to be a comparative test of multiple products in a single category and it had to break new ground or deliver fresh insight into an important product area. Read More

INSIDER
Big data's biggest challenges
IT pros from social media, healthcare and insurance industries share their big-data success stories and lessons learned. Read More

Juniper vs. Palo Alto Networks: Firewall court battle set to begin
Call it the fist fight over firewalls for 2014. Juniper Networks is going for a knock-out against rival Palo Alto Networks in a patent-dispute lawsuit related to next-generation firewalls that's set to go to trial in Delaware in February. And Palo Alto wants to take out Juniper in its own separate patent lawsuit. Read More


WEBCAST: IBM

Business Value of Creating Exceptional Digital Experiences
Watch this on-demand webcast to review the findings of IDC's recent analytical report titled: "The Business Value of IBM's Exceptional Digital Experience Solutions." Learn More

ZeroAccess bot-herders abandon click-fraud network
Microsoft is claiming a total victory – at least for this round – over the ZeroAccess bot-herders whose criminal network was the target of a joint effort among Microsoft, the FBI, Europol and a group of security vendors. Read More

Proposed California law would mandate smartphone kill switch
Kill-switch technology that can render a lost or stolen smartphone useless would become mandatory in California under a new bill that will be proposed to the state legislature in January. Read More

Blue Coat acquires anti-malware firm Norman Shark
Blue Coat Systems today announced it has acquired anti-malware firm Norman Shark for an undisclosed price, in order to integrate its technologies, such as sandboxing, into other security products available through Blue Coat. Read More

Good guys should compete with criminals in buying zero-day vulnerabilities, report says
An effective way to significantly improve software security is to compete head-to-head with the black market for previously unknown vulnerabilities, a security research company says. Read More


WEBCAST: Solutionary, Inc.

Information Security: Options for Threat Detection
This webcast will identify the pros and cons of an on-premise SIEM and an MSSP approach, as well as provide an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider. Learn More.

How to trace a stolen MacBook: use Find My Mac to find stolen MacBook
Your precious Apple laptop has been stolen, and you are bereft and angry. But all may not be lost. If you have Find My Mac enabled on your MacBook you can track it, lock it, and even message the oxygen waster who lifted your laptop. Here's how to trace a stolen MacBook. Read More

2013 computer crime blotter
Prisons around the world this year made way for techie criminals alongside the more garden variety murderers, thieves and schemers. Read More

State of the CSO in 2013 shows an improved outlook
On paper, in many ways, the state of the CSO appears to be improving. Budgets in many enterprises appear to be headed in the right direction: up. So is staffing. CSOs are also getting to do what they've wanted to do for a decade and are spending more time with the top executives in their organizations. Read More

Bogus antivirus program uses a dozen stolen signing certificates
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday. Read More

Free for SMBs: A detailed guide for cybersecurity to ensure business vitality
Many small- to midsize businesses have woeful cybersecurity plans—if they have a plan at all. Cybersecurity is a complex issue but there are many simple steps that businesses can take to protect themselves. The Greater Houston Partnership has developed a thorough (but free) guide to help SMBs improve their security posture. Read More


SLIDESHOWS

10 best Android smartphones of 2013

2013 was a big year for the Android smartphone ecosystem.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 best Android smartphones of 2013

2. Report on NSA 'secret' payments to RSA fuels encryption controversy

3. Inside knowledge likely in Target breach, experts say

4. 10 ex-Cisco employees making an impact in the industry

5. 'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

6. Juniper vs. Palo Alto Networks: Firewall court battle set to begin

7. What's Microsoft going to look like after Ballmer?

8. Notable deaths of 2013 from the worlds of technology, science & inventions

9. Bah humbug. IT pros expect to work over holiday break

10. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: