Search This Blog

Tuesday, January 28, 2014

21 more crazy and scary things the TSA has found on travelers

Target breach update, bad passwords and mobile malware turns 10 | Can TVs and refrigerators really spew botnet spam?

Network World Security

Forward this to a Friend >>>


21 more crazy and scary things the TSA has found on travelers
Each year Transportation Security Administration airport screeners have the truly thankless task of securely checking the traveling public's carry-ons and luggage. (This year tragically the job was dangerous as well, as one officer, Gerardo Hernandez, was killed in the line of duty at Los Angeles International Airport). But in that luggage they sure find some wacky and scary things according to the Transportation Security Administration Blog. Here's a look at some of the most interesting things people tried to travel with in 2013. Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference – CSO40 Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/

Target breach update, bad passwords and mobile malware turns 10
It's time once again for our monthly security video series, "Security Threat Landscape", in which Fortinet global security strategist Derek Manky and I chat about the latest security threats. In this month's episode, we chat about the latest information on the Target data breach, the list of the most commonly used passwords ("password" no longer #1!) and the 10-year-anniversary of mobile malware. ... Read More

Can TVs and refrigerators really spew botnet spam?
Refrigerators might hold spam to keep it cold in the meat bin. But in the Internet of Things world, can fridges connected to the Web blast malicious e-mail as part of a botnet? And how about TVs or other smart devices? In the stranger side of the Internet of Things, Proofpoint said it uncovered a cyberattack in which compromised refrigerators and TVs sent out malicious e-mail. But Symantec, says it saw no evidence of such an attack. Read More

Security Threat Landscape - January 2014
Security Threat Landscape - January 2014 Keith Shaw from IDG Enterprise and Derek Manky from Fortinet discuss the latest security threat news in this monthly series. This month - more information on... From: Network World Videos Views: 3 0 ratings Time: 13:38 More in Science & Technology Read More


WEBCAST: Citrix and Palo Alto Networks

Networking Imperatives in the Cloud Era
IT professionals are struggling to keep their networks up to date with the rising cloud computing trend. With an effective network in place, businesses can ensure safe, high-performance application delivery. Is your network up to par? This brief video explores solutions for your network issues. Learn more

FBI takes out alleged Android app scammers
The FBI has charged four people in court with conspiracy to commit criminal copyright infringement. According to the FBI, Kody Peterson, of Clermont, Florida, was charged with one count of conspiracy to commit criminal copyright infringement; Thomas Dye of Jacksonville, Florida; Nicholas Anthony Narbone, 26, of Orlando, Florida; and Thomas Pace of Oregon City, Oregon, were hit with one count of... Read More

Microsoft: Targeted phishing attacks allowed SEA to steal law enforcement documents
Since the start of 2014, the Syrian Electronic Army (SEA) has twice attacked Microsoft, accusing the Redmond giant of helping the government spy on and monitor our email as well as warning people not to use Microsoft email like Hotmail or Outlook. The first hack was via all of Skype's social media accounts. Read More

Attacks similar to Target breach could stall adoption of emerging tech
Continuous, high-profile cyberattacks like the one against retailer Target could slow adoption of emerging technologies, resulting in a loss of as much as $3 trillion to the global economy, a study shows. Read More


WHITE PAPER: Citrix and Palo Alto Networks

Scaling Next-Generation Firewalls with Citrix NetScaler
IT professionals are always looking for new ways to deliver their applications quickly and effectively. Unfortunately, network scaling and security can be difficult. Luckily, there are ways to protect your network while delivering fast business services. This guide outlines next-generation firewalls that can help your network. Learn more

It's getting easier to steal your neighbors' unused bandwidth over Wi-Fi
A new project from Telefonica called BeWifi enables internet users to snag unused bandwidth from Wi-Fi networks running nearby. So, if you have a family of five trying to stream five different movies at the same time, and neighbors who happen to be out for the night, you and your family could borrow their unused bandwidth until the neighbors come home and log on again. Read More

Your backup drive needs a backup plan: Three ways to safeguard the data
Congratulations on backing up your PC--but you aren't as safe as you may think you are. Files on your backup drive can be just as vulnerable to disaster as files on your main system are. Most recently, CryptoLocker demonstrated that an external drive connected to a PC--a secondary hard drive, for example, or an external USB hard drive used for backup--could fall victim to ransomware just as easily as the PC on the other end of the cable. Read More

Report: Spy agencies collude to gather personal data from mobile apps
Spy agencies including the U.S. National Security Agency have been working together to extract personal information, including location data and address books, from mobile apps as part of a globe-spanning effort to thwart terrorist plots, according to newly disclosed documents provided by former NSA contractor Edward Snowden. Read More

Inside a working Security Operations Center
CSO recently took a tour of a SOC operated by eSentire, which has spent the last few years growing their operations to secure hundreds of data centers globally. They use the familiar process of automation, detection, and mitigation, but focus on the human element more than anything, as their SOC operators work to assess and mitigate threats directly rather than rely on a script. Read More


SLIDESHOWS

FIRST LOOK: New Cisco Nexus switches

Cisco extends its Nexus data center switching line.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. FIRST LOOK: New Cisco Nexus switches

2. Macbook Pro delivers blazing speed in Gigabit Wi-Fi test

3. Cisco UCS 2.0: Flashy new data center servers revealed

4. Teacher's online safety experiment takes trollish turn

5. Microsoft retains weapon to silently scrub XP

6. 10 big myths about Big Data

7. Did Microsoft reach into your PC to stomp a botnet?

8. Why VMware spent $1.5B on AirWatch

9. Punish careless employees to reduce security breaches, vendor says

10. Microsoft says law enforcement documents likely stolen by hackers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: