Hacker shows how easy it is to take over a city’s public Wi-Fi network

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Nov 11, 2016
Featured Image

40-plus eye-popping Black Friday 2016 tech deals

Walmart, Best Buy, Target and other big retailers are slashing prices left and right for Black Friday 2016 on electronics from Apple, Microsoft, Samsung and others. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hacker shows how easy it is to take over a city’s public Wi-Fi network
There’s a war on for cybersecurity talent
Recruiting and retaining female IT talent: 8 concrete steps
Los Angeles: Warm weather, movie stars -- and 100 million monthly cyber attacks
The scary state of the cybersecurity profession
HubSpot Inbound 2016: A tech conference disguised as a sales & marketing one
Yahoo investigating if insiders knew of hack
How to maintain data and document security with a mobile workforce
Visibility, security top concerns for cloud computing adoption

Video/Webcast: QuickBase

30 Days to Complete Business Process Visibility

You cant fix what you can't measure. That's why achieving total visibility into your company's processes -- both on their own and all together -- is the key to business growth.Join Steven Bonacorsi, President at the International Standard for Lean Six Sigma (ISLSS), along with Adam Hoover and Sean MacPherson of QuickBase, for this exclusive on-demand webinar. Read More

Thumbnail Image

Hacker shows how easy it is to take over a city’s public Wi-Fi network

An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city. Read More

Thumbnail Image

There’s a war on for cybersecurity talent

Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions. Read More

Thumbnail Image
INSIDER

Recruiting and retaining female IT talent: 8 concrete steps

While the push for women in IT begins at home and in the classroom, it should extend to the enterprise sector. Based on the findings from CompTIA’s study, here are eight ways companies can more effectively recruit and retain female tech talent. Read More

Thumbnail Image

Los Angeles: Warm weather, movie stars -- and 100 million monthly cyber attacks

A $1.8 million Integrated Security Operations Center, opened in late 2015, consolidates threat intelligence from what previously was carried out in four different locations. Read More

The scary state of the cybersecurity profession

Cybersecurity professionals are overworked and stressed out while their skills are languishing—a very troubling situation. Read More

Thumbnail Image

HubSpot Inbound 2016: A tech conference disguised as a sales & marketing one

HubSpot Inbound 2016 is one techie event for a sales & marketing confab -- CTO says chatbots will be huge thanks to artificial intelligence advances. Read More

Thumbnail Image

Yahoo investigating if insiders knew of hack

Yahoo said investigators were looking into the possibility that some people within the company knew at the time about the late 2014 theft of information of at least 500 million user accounts. Read More

Thumbnail Image

How to maintain data and document security with a mobile workforce

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy balance. Read More

Thumbnail Image

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG. Read More

White Paper: IBM Corporation

Aberdeen - Customer Centricity: Knowledge is Power in the Age of the Customer

Increasing shareholder value is a top priority for all businesses. However, financial results don't improve by themselves. Companies must first delight their most important stakeholder: customers. This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

11 cool high-tech aerial headquarters photos

Brace yourselves, commercial drones are coming Read More

Most-Read Stories

1. Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical
2. HP, Staples & Costco Black Friday 2016
3. Six big projects that went open-source
4. Apple's AirPods to launch much later than anticipated
5. Steve Ballmer explains why he and Bill Gates drifted apart
6. 19 free cloud storage options
7. 7 free tools every network needs
8. Carnegie Mellon researchers visualize way to fend off DDoS attacks
9. Review: Four ways to manage Macs in a Microsoft world
10. There’s a war on for cybersecurity talent
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.