IoT botnet: 25,513 CCTV cameras used in crushing DDoS attacks

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 30, 2016
Featured Image

11 ways to fight off ransomware

These tips will help keep your PC safe from malware. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IoT botnet: 25,513 CCTV cameras used in crushing DDoS attacks
Dangerous keyboard app has more than 50 million downloads
Terrorism database of 2.2 million people leaked
Read Arista’s CEO customer letter on Cisco patent infringement verdict
Cisco reinforces cloud security technology with $293M CloudLock buy
NASA’s hot Juno Jupiter mission
Wormable flaws in Symantec products expose millions of computers to hacking
This malware pretends to be WhatsApp, Uber and Google Play
Mobile ransomware use jumps, blocking access to phones

White Paper: Sophos Inc

Best Practices for AWS Cloud Security

Hacker technology continues to improve and cyber attacks increase year over year. In 2015 alone there was a 45% increase in cyber attacks on the public cloud. The fight to protect data becomes increasingly important if you're going to keep your business and data safe. Read More

Thumbnail Image

IoT botnet: 25,513 CCTV cameras used in crushing DDoS attacks

Researchers discovered over 25,000 hacked internet-connected CCTV cameras being used in DDoS attacks to hammer websites. Read More

Thumbnail Image

Dangerous keyboard app has more than 50 million downloads

The Flash Keyboard app has been downloaded more than 50 million times -- but is capable of some extremely dangerous behaviors. Read More

Thumbnail Image

Terrorism database of 2.2 million people leaked

A security researcher discovered an unsecured copy of Thomson Reuters World-Check database. The 'terrorism blacklist' is used by government agencies, banks and law firms to screen for hidden risk. Read More

Thumbnail Image

Read Arista’s CEO customer letter on Cisco patent infringement verdict

Arista’s President & CEO Jayshree Ullal issued a letter to customers who may have been worried over the impact of last week’s US International Trade Commission ruling that the company had infringed on three Cisco patents. The ITC on June 23rd issued a limited exclusion order and cease and desist order that will forbid Arista from importing products (with these specific infringed features) into the U.S., Ullal wrote. Read More

Thumbnail Image

Cisco reinforces cloud security technology with $293M CloudLock buy

Cisco today said it would make its fifth acquisition of the year by acquiring cyber security provider CloudLock for $293 million. Read More

Thumbnail Image

NASA’s hot Juno Jupiter mission

NASA’s Juno spacecraft, once described as a flying armored tank, has almost reached its destination: Jupiter. Check out the images from the mission. Read More

Thumbnail Image

Wormable flaws in Symantec products expose millions of computers to hacking

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Read More

Thumbnail Image

This malware pretends to be WhatsApp, Uber and Google Play

Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play. Read More

Thumbnail Image

Mobile ransomware use jumps, blocking access to phones

Mobile ransomware is on the rise, with the infection rate skyrocketing, according to new research. Read More

White Paper: Proofpoint Inc

CXO Guide to Security and Archiving Challenges with Office 365

Microsoft Office 365 is a robust set of email and collaboration tools that is offered in a number of configurations with varying levels of features and functions. Office 365 represents Microsoft's latest - and arguably, most successful - venture into the cloud services space in the 13+ years that the company has offered hosted services. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

The 10 most powerful supercomputers in the world

20 highest paid tech CEOs Read More

Most-Read Stories

1. Why one Cisco shop is willing to give WiFi startup Mist a shot
2. 30 days in a terminal: Day 8 — The slow descent into madness
3. 19 free cloud storage options
4. Microsoft pays $10,000 for forced Windows 10 upgrade
5. Windows 10’s biggest controversies
6. Cisco reinforces cloud security technology with $293M CloudLock buy
7. IoT botnet: 25,513 CCTV cameras used in crushing DDoS attacks
8. Why Brexit could cause data privacy headaches for US companies
9. 7 free tools every network needs
10. Top 5 storage vendors shows massive shift to the cloud
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.