Free tool protects PCs from master boot record attacks

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 24, 2016
Featured Image
INSIDER

3 ways Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Free tool protects PCs from master boot record attacks
US intelligence targets advanced security management of virtual systems
7 steps to proactive security
Easy-to-exploit rooting flaw puts Linux computers at risk
Gartner Top 10 technology trends you should know for 2017
Your robot doctor overlords will see you now
Ex-NSA contractor hoarded two decades' worth of secrets
Intel asserts its trademark rights against John McAfee

White Paper: Rsam

Rsam Vendor Risk Management Solution Checklist

As enterprises continue to outsource more aspects of their operations to third parties, they expose themselves to more shared risk. It can be a staggering responsibility. Most organizations understand the need to automate vendor risk management activities to keep up with increasing scope and scrutiny. Yet they struggle to identify and prioritize the key features their VRM solution must provide so they can make a significant impact quickly. Read More

Thumbnail Image

Free tool protects PCs from master boot record attacks

A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks. Read More

Thumbnail Image

US intelligence targets advanced security management of virtual systems

The advanced research arm of the Office of the Director of National Intelligence rolled out the Virtuous User Environment (VirtUE) program which the agency says “is looking to use the federal government’s impending migration to commercial cloud-based IT infrastructures and the current explosion of new virtualization and operating system concepts to create and demonstrate a more secure interactive user computing environment than the government has had in the past or likely to have in the near future.” Read More

Thumbnail Image

7 steps to proactive security

The key to securing against data breaches lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water. Read More

Thumbnail Image

Easy-to-exploit rooting flaw puts Linux computers at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to Linux based servers, desktops and other devices. Read More

Thumbnail Image

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Read More

Thumbnail Image

Your robot doctor overlords will see you now

"There is significant evidence that the majority of primary healthcare visits are of little value to the patient, and represent a massive drain on trained physician time. Physician demand is outpacing supply, begging the need for alternatives," said Laura Craft, research director at Gartner. "Technology has advanced to the point where computers have become superior to the human mind; they are more accurate and consistent, and they are better at processing all the determinants of health and well-being than even the best of doctors." Read More

Thumbnail Image

Ex-NSA contractor hoarded two decades' worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials. Read More

Thumbnail Image

Intel asserts its trademark rights against John McAfee

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand. Read More

White Paper: Trend Micro Incorporated

Beyond Next-Gen: Defining Future-Ready Endpoint Security

The term "next-gen" is commonly cited by technology vendors to position a product as being innovative based on new and differentiated capabilities. Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google Graveyard: What Google has killed in 2016

7 Linux command line tools you didn’t know you need Read More

Most-Read Stories

1. What’s better: Amazon’s Availability Zones vs. Microsoft Azure’s regions
2. How switching to Macs is paying off for IBM
3. Microsoft is killing Project Spark, its ambitious cross-platform creation game
4. 19 free cloud storage options
5. Facebook's 100-gigabit switch design is out in the open
6. Gartner Top 10 technology trends you should know ... for 2017
7. Russian hacker group used phony Google login page to hack Clinton campaign
8. Celebrating 12 years of Ubuntu
9. 7 free tools every network needs
10. 10 PC programs Windows 10 renders obsolete
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.