Most dangerous cyber celebrities of 2016

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Mobile & Wireless Alert

Oct 03, 2016
Featured Image

FAQ: What is 802.11ad wireless technology?

Here are the broad strokes about 802.11ad, the wireless technology that’s just starting to hit the market. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Most dangerous cyber celebrities of 2016
Quiet rumblings but few fireworks at LTE-U gathering
Android malware that can infiltrate corporate networks is spreading
Ga-ga for goggles: Augmented & virtual reality bring the masses to Harvard
802.11ad is the fastest Wi-Fi that you might not ever use
Microsoft puts AI front and center with research overhaul
How to keep terrifying medical device hacks from becoming reality
You will be using mobile VR and AR in two years—even if you don’t believe it
Bounty for iOS jailbreak exploit jumps to $1.5 million

Video/Webcast: IBM Corporation

Protecting your Organization from Insider Threats

Whether inadvertent, or intentional, insider threats can do serious harm to your organization, your customers, and your bottom line. In many cases, however, they can be prevented or disrupted, before that harm occurs. Join this webinar to learn how management and technology can help prevent, identify and disrupt the insider threats that are already festering behind your security system. Read More

Thumbnail Image

Most dangerous cyber celebrities of 2016

Intel ranks celebrities by dangerousness if you search for them online. Read More

Thumbnail Image

Quiet rumblings but few fireworks at LTE-U gathering

A Washington, D.C. think tank on Wednesday hosted the first event to feature representatives from both sides of the LTE-U debate since a contentious agreed testing framework was created several weeks ago. Read More

Thumbnail Image

Android malware that can infiltrate corporate networks is spreading

An Android Trojan is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. Read More

Thumbnail Image

Ga-ga for goggles: Augmented & virtual reality bring the masses to Harvard

Hundreds descended upon Harvard Innovation Lab to try out the latest augmented and virtual reality gear, listen to Magic Leap's founder, and learn about this next visually-compelling phase of computing Read More

Thumbnail Image

802.11ad is the fastest Wi-Fi that you might not ever use

802.11ad offers the possibility of extremely fast wireless speeds over short distances – but experts differ sharply on its eventual role in the enterprise. The differences center on whether 802.11ad will be used in the same way as previous Wi-Fi standards. Read More

Thumbnail Image

Microsoft puts AI front and center with research overhaul

Microsoft has announced the formation of its AI and Research Group, which it says will help the company democratize artificial intelligence use across individuals and organizations. Read More

Thumbnail Image

How to keep terrifying medical device hacks from becoming reality

More medical devices are becoming connected ones, and that’s increasing the security threat surface, said panelists this week at the Security of Things Forum in Cambridge, Mass. Read More

Thumbnail Image

You will be using mobile VR and AR in two years—even if you don’t believe it

Mobile VR is set to explode when Google releases Daydream. In a few years, billions will use VR like they use GPS navigation, without a second thought. Read More

Thumbnail Image

Bounty for iOS jailbreak exploit jumps to $1.5 million

The value for zero-day exploits targeting Apple's iOS software is jumping. On Thursday, a company called Zerodium began offering as much as $1.5 million for them. Read More

Video/Webcast: dynatrace

A Tale of Two Pipelines: To DevOps or Not to DevOps

Trying to move to a DevOps methodology, or improve your current DevOps methods? Need to increase innovation and the speed of your software delivery pipeline? In this on-demand webcast, Brett Hofer, Global DevOps Practice Lead at Dynatrace, will show you how. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

The 12 best iPhone 7 features

Smart cities: The rise of new C-level executives Read More

Most-Read Stories

1. Microsoft is leaving the consumer mobile market
2. Creepy clowns cause sheriff to consult with FBI and Homeland Security
3. IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes
4. Which is cheaper: Containers or virtual machines?
5. 19 free cloud storage options
6. Nutanix CEO skewers box-based hyperconvergence rivals
7. LXLE: A Linux distro to give new life to old hardware
8. Security myths that can make you laugh… or cry
9. Largest DDoS attack ever delivered by botnet of hijacked IoT devices
10. Most dangerous cyber celebrities of 2016
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Mobile & Wireless Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.