Computer forensics follows the bread crumbs left by perpetrators

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 09, 2017
Featured Image

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Computer forensics follows the bread crumbs left by perpetrators
Patch to fix Intel-based PCs with enterprise bug rolls out next week
Supply chain attack hits Mac users of HandBrake video converter app
How to prevent your data from being searched at the US border
12 top tech fields of the future
Google Project Zero researchers find ‘crazy bad’ Windows RCE flaw

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime. Read More

Thumbnail Image

Patch to fix Intel-based PCs with enterprise bug rolls out next week

Starting next week, PC makers will roll out a patch that fixes a severe vulnerability found in certain Intel-based business systems making them easier to hack. Read More

Thumbnail Image

Supply chain attack hits Mac users of HandBrake video converter app

Hackers compromised a download server for HandBrake, a popular open-source program for converting video files, and used it to distribute a macOS version of the application that contained malware. Read More

Thumbnail Image

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared. Read More

Thumbnail Image

12 top tech fields of the future

Find out the areas where there is expected growth in technology job fields. Read More

Thumbnail Image

Google Project Zero researchers find ‘crazy bad’ Windows RCE flaw

Google Project Zero researchers discovered a "crazy bad" RCE flaw in Windows. The attack works against default Windows installations and is "wormable." Read More

White Paper: Cybereason

2017 Threat Hunting Survey Report

Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 geek-inspired gifts for Mother's Day

Cool ways to celebrate Star Wars Day Read More

Most-Read Stories

1. ‘Found a leaky ethernet port’
2. 10 super-user tricks to boost Windows 10 productivity
3. 18 free cloud storage options
4. Why teenage girl's smartphone battery breakthrough may never see daylight
5. Arista infringed on two original Cisco patents
6. Verizon.net email addresses are going away, here are 4 alternatives
7. Ultimate geek dream? NASA challenges you to jump on the Fortran bandwagon
8. Why Cisco needs SD-WAN vendor Viptela
9. Extreme offers glimpse of integrated Avaya, Brocade technology future
10. Cisco fires back at VMware decision to whack third-party virtual switches
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.