EU plans $2B investment in cybersecurity research

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 07, 2016
Featured Image

Google fixes over 100 flaws in Android, many in chipset drivers

Google released a new batch of Android patches, fixing over 20 critical flaws in Android's own components and in chipset-specific drivers from different manufacturers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

EU plans $2B investment in cybersecurity research
Ex-Secret Service agent who investigated Silk Road may have stolen another $700,000
Lenovo ThinkPwn UEFI exploit also affects products from other vendors
New Tor-powered backdoor program targets Macs
11 signs your kid is hacking -- and what to do about it
The new internet domains are a wasteland
10 cutting-edge tools that take endpoint security to a new level
8 ingredients of an effective disaster recovery plan
CFAA anti-hacking law applies to using shared password, appeals court said

White Paper: Thycotic Software

Black Hat 2015 Hacker Survery Report

According to Thycotic's 2015 Black Hat Hacker Survey, hackers confirmed they continue to easily compromise privileged accounts - the 'keys to the kingdom' that help them unlock access to virtually any part of your network, including mission critical data. Read More

Thumbnail Image

EU plans $2B investment in cybersecurity research

The European Union is stumping up €450 million ($500 million) to fund research into cybersecurity -- and wants industry to contribute three times that. Read More

Thumbnail Image

Ex-Secret Service agent who investigated Silk Road may have stolen another $700,000

Former Secret Service Special Agent Shawn Bridges may have been involved in two more bitcoin thefts. Read More

Thumbnail Image

Lenovo ThinkPwn UEFI exploit also affects products from other vendors

A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors including HP and Gigabyte Technology. Read More

Thumbnail Image

New Tor-powered backdoor program targets Macs

Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network. Read More

Thumbnail Image

11 signs your kid is hacking -- and what to do about it

Here’s how to find out if your child is involved in malicious online activity -- before the authorities do Read More

Thumbnail Image

The new internet domains are a wasteland

The new DNS top-level domains have been taken over by spammers and malware attackers. Read More

Thumbnail Image

10 cutting-edge tools that take endpoint security to a new level

The 10 products we tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats. They evaluate these threats in a larger ecosystem, combining the best aspects from network intrusion detection and examining the individual process level on each computer. Read More

Thumbnail Image

8 ingredients of an effective disaster recovery plan

IT executives and disaster recovery experts share their advice on how businesses can create an effective DR plan. Read More

Thumbnail Image

CFAA anti-hacking law applies to using shared password, appeals court said

The Ninth Circuit Court of Appeals upheld a conviction that considered using a willingly shared password to be covered under the CFAA anti-hacking law. Read More

Case Study: Thycotic Software

Case Study: Protecting Privileged Accounts for a Global Manufacturer

This $2 billion manufacturer - with customers in the nuclear, defense, aerospace and power generation industries - chose Thycotic Secret Server to secure and manage their privileged account passwords across its global enterprise. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 Raspberry Pi programming tools bundled with Raspbian

When tech and fashion collide Read More

Most-Read Stories

1. The new internet domains are a wasteland
2. Raspberry Pi roundup: The Raspberry Baron takes to the skies; big talk about voice; thin client scuttlebutt
3. 11 signs your kid is hacking -- and what to do about it
4. 10 cutting-edge tools that take endpoint security to a new level
5. 13 top paying cities for software engineers
6. 8 noteworthy improvements in the Windows 10 Anniversary Update
7. Linux distros look to drop 32-bit support
8. 19 free cloud storage options
9. Fearing surveillance, man allegedly shot at Google and set self-driving car ablaze
10. Microsoft releases ‘service pack 2’ for Windows 7
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.