Advertisements


The modern guide to staying safe online

The internet can be a scary place. Threats come in many forms, lurking in practically any corner. Worse, yesterday’s prevailing advice for staying safe online -- avoid dodgy websites, don’t traffic in stolen or illegal goods, interact only wit.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

Future Air Force Weapon? Baby MOAB

The next “Mother of All Bombs” will probably be smaller, leaner and lighter but will still pack a punch. It’s what scientists and engineers at... The next “Mother of All Bombs” will probably be smaller, leaner and li.....»»

Source:  DefensetechCategory: SecurityMay 19th, 2017Related News

Army Says ‘WannaCry’ Malware Didn’t Infect Its Computers

Army Says ‘WannaCry’ Malware Didn’t Infect Its Computers.....»»

Source:  DefensetechCategory: SecurityMay 18th, 2017Related News

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chai.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other compan.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

How to make Fully Homomorphic Encryption "practical and usable"

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.The Intelligence Advanced Research Projects Activit.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

12 ways to improve run-time container security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.There still really aren’t many enterprise run-time security tools for con.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

How to use blockchain: Following an asset through its lifecycle to learn more

This contributed piece has been edited and approved by Network World editorsPossession is nine-tenths of the law, right?  But thanks to blockchain, this old adage may no longer be a viable way to settle property disputes.Artists and enterprises a.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning.That translates into a smaller average attack size, said Martin McKeay, senior security advocate.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Vocal theft on the horizon

Your voice is yours alone – as unique to you as your fingerprints, eyeballs and DNA.Unfortunately, that doesn’t mean it can’t be spoofed. And that reality could undermine one of the promised security benefits of multi-factor authentication,.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

China pays for Windows XP addiction as "WannaCry" hits

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP runs one in five systems, local reports said Monday.More than 23,000 IP addresses in the People's Republic of China (PRC) show signs of inf.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Secure platforms as a service allow you to focus on function

Even though larger cloud providers offer security and implementation guidelines, companies still face significant risks and challenges when deploying secure applications to the cloud. A new class of security-focused cloud platforms promises to bri.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Shadow Brokers announce monthly data dump service

The Shadow Brokers are back once again, offering buyers not just exploits, but also “compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programs.”Seemingly capitalizing on the success of WannaCry ransomw.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Why WannaCry won’t change anything

The tally of damage from the WannaCry ransomware attack keeps growing, but it’s still not even close to bad enough to force real changes in cybersecurity. According to The New York Times, more than 200,000 machines in more than 150 countries aro.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

WannaCry makes me want to cry!

As I read about the WannaCry ransomware attack, my brain is racing with thoughts about the causes and effects of this global incident. Here are my two cents:1. Ransomware continues to be a growth business, and a bit of work can provide a serious r.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Shadow Brokers teases more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged U.S. National Security Agency exploits claims to have even more attack tools in its possession and plans to release them in a new subscription-based service.The group also has intelligence gathere.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

The CSO IoT security basics survival guide

The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business.IoT platforms are expected to.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Stopping ransomware starts with the security pros

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarmin.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

IDG Contributor Network: Self-propagating ransomware: What the WannaCry ransomworm means for you

The reports came swiftly on Friday morning, May 12—the first I saw were that dozens of hospitals in England were affected by ransomware, denying physicians access to patient medical records and causing surgery and other treatments to be delayed......»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News

Microsoft to NSA: WannaCry is your fault

Microsoft’s top lawyer has blamed the government’s stockpiling of hacking tools as part of the reason for the WannaCry attack, the worldwide ransomware that has hit hundreds of thousands of systems in recent days.Brad Smith, president and chie.....»»

Source:  NetworkworldCategory: SecurityMay 17th, 2017Related News