The IoT of bricks: Someone is bricking insecure IoT devices

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Apr 11, 2017
Featured Image

DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

DARPA program wants to have hardware-anchored security become a standard feature of integrated circuit Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The IoT of bricks: Someone is bricking insecure IoT devices
Fight firewall sprawl with AlgoSec, Tufin, Skybox suites
How to deal with the bot crisis on Twitter
Predictive analytics can stop ransomware dead in its tracks
Anthem to data breach victims: Maybe the damages are your own darned fault
Cisco’s first big developers conference to zero in on IoT, cloud
Latest Shadow Brokers exploit dump poses little threat
Email-based attacks exploit unpatched vulnerability in Microsoft Word

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

The IoT of bricks: Someone is bricking insecure IoT devices

BrickerBot takes IoT security into its own hands. It finds vulnerable IoT devices and disables them, creating potentially dangerous situations. Read More

Thumbnail Image
INSIDER

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

These three security policy management toolsets deliver orchestration and automation. Read More

Thumbnail Image
INSIDER

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to a website, a problem that impacts both the site owner and the advertisers. Read More

Thumbnail Image

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down. Read More

Thumbnail Image

Anthem to data breach victims: Maybe the damages are your own darned fault

Insurance giant Anthem scares off possible data breach victims by asking to examine their personal computers for evidence that their own shoddy security was the problem. Read More

Thumbnail Image

Cisco’s first big developers conference to zero in on IoT, cloud

Cisco is readying for its DevNet Create, its first big dedicated conference for developers, with a focus on IoT and cloud computing. Read More

Thumbnail Image

Latest Shadow Brokers exploit dump poses little threat

None of the new alleged NSA exploits leaked by the Shadow Brokers hacking group poses an immediate threat to users. Read More

Thumbnail Image

Email-based attacks exploit unpatched vulnerability in Microsoft Word

Attackers have been exploiting an unpatched vulnerability in Microsoft Word for the past few months to compromise computers and infect them with malware. Read More

White Paper: Masergy Communications Inc.

How To Fight The High Cost of Security Salaries

As cyber attacks grow, skilled security professionals are demanding and getting higher and higher salaries. How bad is it? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 more killer Raspberry Pi projects (Collection 2)

10 things to worry about when your vendor divests Read More

Most-Read Stories

1. iPhone 8 price may be cheaper than you think
2. Raspberry Pi roundup: The unbearable Pi-NAS of being; Pi takes rook, and a litle teeny Mac
3. 18 free cloud storage options
4. Cisco targets digital business transformation with new certifications
5. Startup founded by FireEye alum goes after FireEye
6. Arista gets important win over Cisco in patent battle
7. Peeping into 73,000 unsecured security cameras thanks to default passwords
8. Flatbed scanners are latest cyberattack vector
9. 7 free tools every network needs
10. 10 more killer Raspberry Pi projects (Collection 2)
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.