Cisco security researcher: Ransomware crowd big on customer service

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 24, 2017
Featured Image

FTC warns on “Can you hear me now” robocall: Hang up!

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco security researcher: Ransomware crowd big on customer service
Cisco: IOS security update includes denial of service and code execution warnings
Now WikiLeaks threatens to disclose software vulnerabilities
Newly leaked documents show low-level CIA Mac and iPhone hacks
Snowden's ex-boss offers tips on stopping insider threats
Leaked iCloud credentials obtained from third parties, Apple says
Senate votes to kill FCC's broadband privacy rules
If incident response automation is hot, threat detection automation is sizzling

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event Read More

Thumbnail Image

Cisco: IOS security update includes denial of service and code execution warnings

Cisco warns on IOS/IOS XE features: DHCP client (L2TP) Zero Touch Provisioning HTTP server and Web user interface Read More

Thumbnail Image

Now WikiLeaks threatens to disclose software vulnerabilities

One WikiLeaks disclosure condition is similar to Google’s: Companies must patch software vulnerabilities with in 90 days. Read More

Thumbnail Image

Newly leaked documents show low-level CIA Mac and iPhone hacks

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks. Read More

Thumbnail Image

Snowden's ex-boss offers tips on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency. Read More

Thumbnail Image

Leaked iCloud credentials obtained from third parties, Apple says

The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services. Read More

Thumbnail Image

Senate votes to kill FCC's broadband privacy rules

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without permission. Read More

Thumbnail Image

If incident response automation is hot, threat detection automation is sizzling

Automation at the TD stage has a greater impact on downstream results and directly impacts IR automation Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

New products of the week 3.20.17

6 cloud computing savings you may be missing out on Read More

Most-Read Stories

1. Windows 10 Creators Update: Microsoft removes, depreciates features specific to IT professionals
2. Double Agent attack can turn antivirus into malware
3. 4 possible outcomes for Avaya
4. LastPass fixes serious password leak vulnerabilities
5. Stop using password manager browser extensions
6. Cisco: IOS security update includes denial of service and code execution warnings
7. 10 reasons to look for a new job
8. Tapping the brakes on 802.11ac wave 2
9. 7 free tools every network needs
10. Microsoft hit with second cloud disruption in two weeks
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.