This tiny chip could revolutionize smartphone and IOT security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 01, 2017
Featured Image

Cisco tries to squash Smart Install security abuse

Cisco wrote in a blog this week that a “Smart Install network consists of one Smart Install director switch or router, also known as the integrated branch director (IBD), and one or more Smart Install client switches, also known as integrated branch clients (IBCs). Only Smart Install client switches are affected by the abuse. While there are no obvious indicators of an attacker abusing the Smart Install capabilities Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

This tiny chip could revolutionize smartphone and IOT security
821,000 user records exposed due to misconfigured MongoDB for smart stuffed toys
Border agents go all Monty Python on visa-holding software engineer
This tool can help you discover Cisco Smart Install protocol abuse
7 universal rules of threat intelligence
A new way to prevent cyberattacks on home devices
Trend Micro report: Ransomware booming
Space X to zoom two citizen astronauts to the moon

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices. Read More

Thumbnail Image

821,000 user records exposed due to misconfigured MongoDB for smart stuffed toys

The MongoDB for CloudPets was not protected with a password; it’s unknown how many hackers gobbled the data, but the database was deleted and replaced with ransom demands at least three times. Read More

Thumbnail Image

Border agents go all Monty Python on visa-holding software engineer

There have been more egregious episodes of U.S. border agents hassling and/or needlessly detaining valid visa-holders since the White House changed hands, but perhaps none has been more bizarre – or even darkly comical – than this one. Read More

Thumbnail Image

This tool can help you discover Cisco Smart Install protocol abuse

Cisco's Talos team has released a tool that allows network owners to discover switches on their networks that might be vulnerable to Cisco Smart Install (SMI) attacks. Read More

Thumbnail Image

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not. Read More

Thumbnail Image

A new way to prevent cyberattacks on home devices

Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo. Read More

Thumbnail Image

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers. Read More

Thumbnail Image

Space X to zoom two citizen astronauts to the moon

Space X today said two unnamed private citizens have paid the company a “significant deposit” to fly them to the moon and back to Earth. “We expect to conduct health and fitness tests, as well as begin initial training later this year. Other flight teams have also expressed strong interest and we expect more to follow. Read More

White Paper: Dyn Inc

Extending Global Load Balancing to the Cloud with Secondary DNS

The bar for exceptional digital experiences has been raised-and for those businesses that rely on the internet to drive revenue, turning to a cloud-based infrastructure and CDNs are necessary to achieve the global footprint needed to meet new customer demands. Read this white paper to learn how to get started and explore the benefits of combining existing global load balancing (GLB) services with a cloud-based secondary DNS solution. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. 8 ways to make Amazon’s Alexa even more awesome
2. Smart teddy bears involved in a contentious data breach
3. How Cisco wants to become the Switzerland of the cloud
4. Boat relying on an iPad for navigation crashes into ferry after Wi-Fi goes out
5. Microsoft's anti-malware program still isn't very good
6. REVIEW: Deep dive into Windows Server 2016
7. The latest ransomware threat: Doxware
8. Ransomware attacks targeted hundreds of MySQL databases
9. Verizon and Cisco team to bring 5G network pilot program to the masses
10. Four mindblowing Ted Talks for techies
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.