Advertisements


Cisco security researcher: Ransomware crowd big on customer service

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. “They’re in it to.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

FTC warns on “Can you hear me now” robocall: Hang up!

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. The FTC says it has received hundreds of complaints on the calls whi.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

Now WikiLeaks threatens to disclose software vulnerabilities

Earlier this month, the notorious info leaker WikiLeaks published a batch of documents from the CIA detailing how the CIA has developed several tools to crack, break into or infect all kinds of devices—from PCs to Smart TVs—even if they are no.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

Marine Corps Wants Foreign Buyer to Curb CH-53K Cost

The top officer of the Marine Corps said he’s pleased with how development of the service’s new CH-53K heavy-lift helicopter is progressing, but concerned about... The top officer of the Marine Corps said he’s pleased with how d.....»»

Source:  DefensetechCategory: SecurityMar 23rd, 2017Related News

Marine Corps Want Foreign Buyer to Curb CH-53K Cost

The top officer of the Marine Corps said he’s pleased with how development of the service’s new CH-53K heavy-lift helicopter is progressing, but concerned about... The top officer of the Marine Corps said he’s pleased with how d.....»»

Source:  DefensetechCategory: SecurityMar 23rd, 2017Related News

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs if Apple does not fork over $150,000 within two weeks."This group is known for getting accounts and credentials, they hav.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Cisco: IOS security update includes denial of service and code execution warnings

Cisco is warning IOS and IOS EXE users of five security vulnerabilities it rates as “High” that could lead to denial of service attacks or allow an invader to execute arbitrary code on an particular system.The warnings – which include Cisco.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Navy May Redesign MQ-25A Drone Refueling Tanker

Development of the U.S. Navy‘s first drone refueling tanker — the MQ-25A — is progressing but may require some redesign before final bids go out,... Development of the U.S. Navy‘s first drone refueling tanker — the M.....»»

Source:  DefensetechCategory: SecurityMar 22nd, 2017Related News

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for wor.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Can you imagine Mars with Saturn-like rings?

It’s hard to fathom and may be even harder for it to happen but a couple NASA-funded scientists say Mars might have had Saturn-like rings around it in the past and may have them again sometime in the distant future.NASA’s Jet Propulsion Lab sa.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

US bans electronics larger than smartphones in cabins on certain flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage, citing increa.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for wor.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

IDG Contributor Network: Blockchain the perfect data protection tool for banks using mainframes

Technophobic thrillers in popular media are always trying to convince us hackers are just a few malicious keystrokes away from crashing the world economy. And while doing such a thing is more complicated than just “deleting all the money,” one.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Cloud security still a work in progress

A few years ago, ESG (and other) research indicated that security concerns posed the biggest impediment for more pervasive use of cloud computing. What happened next?  Business executives and CIOs found that cloud agility, flexibility and potenti.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

A newfound vulnerability in smartphones could let hackers remotely control the devices.With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device acceleromet.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

What it takes to become an IT security engineer

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His deter.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

IDG Contributor Network: Protect your unstructured data with user behavior analytics

The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It’s iron.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Critical infrastructure: Off the web, out of danger?

The debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation.But it hasn’t been settled – in some ways it is more intense now than ever.On.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

10 greatest inside security risks

Internal threatsImage by ThinkstockLast year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user acces.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News

Security Sessions: Where is VC security funding going?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security compa.....»»

Source:  NetworkworldCategory: SecurityMar 22nd, 2017Related News