Advertisements


IDG Contributor Network: Top 5 InfoSec concerns for 2017

Cloudbleed, WannaCry, ransomware, hackers. Each and every day, it seems, the tech community wakes up to news of another attack on data security and privacy. As IT professionals, we spend our days working to the best of our knowledge and ability to.....»»

Source:  NetworkworldCategory: SecurityJun 11th, 2017Related News

Witcher 3 developers won"t bow to extortion for stolen Cyberpunk 2077 files

With E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 20.....»»

Source:  NetworkworldCategory: SecurityJun 11th, 2017Related News

US Lawmaker Chastises South Korea for Suspending THAAD

A U.S. senator blasted the South Korean government’s delay in accepting a missile-defense system and questioned Army leaders why the vulnerable Pacific country would have... A U.S. senator blasted the South Korean government’s delay i.....»»

Source:  DefensetechCategory: SecurityJun 8th, 2017Related News

US Army Ready to Field Israeli Anti-Missile Tech, Chief Hints

The Army’s chief of staff hinted to Congress on Wednesday that the service has decided to equip its armored vehicles with Israeli-made anti-missile technology. Sen.... The Army’s chief of staff hinted to Congress on Wednesday that the.....»»

Source:  DefensetechCategory: SecurityJun 7th, 2017Related News

NSA"s EthernalBlue exploit ported to Windows 10

If you were running Windows 10, then you didn’t need to worry about your box being hit with the leaked NSA EternalBlue exploit; but things change and now researchers have ported EternalBlue to Windows 10.After the WannaCry ransomware attack, som.....»»

Source:  NetworkworldCategory: SecurityJun 7th, 2017Related News

McCain Prods Air Force to Lift ‘Veil of Secrecy’ on B-21 Program

Sen. John McCain on Tuesday demanded the Air Force lift the “veil of secrecy” on certain aspects of the B-21 Long Range Strike Bomber program.... Sen. John McCain on Tuesday demanded the Air Force lift the “veil of secrecy”.....»»

Source:  DefensetechCategory: SecurityJun 6th, 2017Related News

Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 elect.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

IDG Contributor Network: Learn What NIST’s Cybersecurity Framework Can Do For You

The meteoric rise of cybercrime has caught many organizations unawares. Malware has spread from PCs to smartphones, phishing scams have grown more sophisticated, and ransomware is running rampant.You can hire hackers and botnets, or buy cybercrime.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

Researchers find gaps in IoT security

Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question:  “What are the new intellectual challenges in the science.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 elect.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

IDG Contributor Network: Learn What NIST’s Cybersecurity Framework Can Do For You

The meteoric rise of cybercrime has caught many organizations unawares. Malware has spread from PCs to smartphones, phishing scams have grown more sophisticated, and ransomware is running rampant.You can hire hackers and botnets, or buy cybercrime.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

Researchers find gaps in IoT security

Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question:  “What are the new intellectual challenges in the science.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

What Extreme’s string of networking acquisitions means for enterprises

Extreme Network’s recent string of acquisitions – including it’s recent $100 million auction-buy of Avaya’s networking business, it’s purchase of Brocade’s Ethernet IP networking assets and its purchase of wireless vendor Zebra Technol.....»»

Source:  NetworkworldCategory: SecurityJun 6th, 2017Related News

Air Force Eyes Replacing B-52 Engines

The Air Force has set aside $10 million in its fiscal 2018 budget request for risk-reduction efforts in support of a potential future B-52 bomber... The Air Force has set aside $10 million in its fiscal 2018 budget request for risk-reduction effo.....»»

Source:  DefensetechCategory: SecurityJun 5th, 2017Related News

Tell the FCC you don"t want robo-voicemail, spammy direct-to-voicemail messages

If your phone doesn’t ring, yet you have received voicemail, did that voicemail qualify as a call? If it didn’t count as a call, then the telemarketer behind the pre-recorded voicemail message may claim it can leave “ringless voicemail” (R.....»»

Source:  NetworkworldCategory: SecurityJun 5th, 2017Related News

Tell the FCC you don"t want robo-voicemail, spammy direct-to-voicemail messages

If your phone doesn’t ring, yet you have received voicemail, did that voicemail qualify as a call? If it didn’t count as a call, then the telemarketer behind the pre-recorded voicemail message may claim it can leave “ringless voicemail” (R.....»»

Source:  NetworkworldCategory: SecurityJun 5th, 2017Related News

Hackers leak 8 unaired episodes of ABC"s Steve Harvey’s Funderdome TV series

They’re back…The Dark Overlord, the hacking group which released 10 of 13 new Orange Is the New Black episodes in late April after Netflix refused to pay a ransom, has now leaked nearly the entire first season of ABC’s upcoming Steve Harvey.....»»

Source:  NetworkworldCategory: SecurityJun 5th, 2017Related News

Watch US Navy Carrier Strike Groups Sail Near Korea

The U.S. Navy on Thursday released video showing the Carl Vinson and Ronald Reagan carrier strike groups operating with Japanese navy ships in the Sea... The U.S. Navy on Thursday released video showing the Carl Vinson and Ronald Reagan carrier s.....»»

Source:  DefensetechCategory: SecurityJun 2nd, 2017Related News

Area 1 Security stops phishing campaigns before they become attacks

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing i.....»»

Source:  NetworkworldCategory: SecurityJun 1st, 2017Related News