Solution to JIT-ROP cyber attacks: Scramble code quickly

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 05, 2016
Featured Image

How Windows 10 data collection trades privacy for security

Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Solution to JIT-ROP cyber attacks: Scramble code quickly
20 years ago: Hot sci/tech images from 1996
Trump cybersecurity dos and don’ts
IBM warns of rising VoIP cyber-attacks
Juniper boosts cloud analytics, machine learning tech with AppFormix buy
Remote management app exposes millions of Android users to hacking
‘Distributed guessing’ attack lets hackers verify Visa card details
10 most useful Slack bots
DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Solution to JIT-ROP cyber attacks: Scramble code quickly

Shuffling software code around can stop hackers’ exploits. And better, faster versions of the scrambling are the future of computer defense, a research team says. Read More

Thumbnail Image

20 years ago: Hot sci/tech images from 1996

As we wind down 2016, we thought it would be fascinating to take a look at what some of the hot topics were 20 years ago. What we found are monkeys in space; a heaping helping of interesting computer news from the old Comdex trade show; Bill Gates in full form and Al Gore with the ENIAC. Take a look back at what was hot in 1996. Read More

Trump cybersecurity dos and don’ts

President-elect Trump could make strong progress on cybersecurity while adhering to his campaign promises. Read More

Thumbnail Image

IBM warns of rising VoIP cyber-attacks

IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets. Read More

Thumbnail Image

Juniper boosts cloud analytics, machine learning tech with AppFormix buy

Looking to bolster its cloud analytics and machine learning technologies, Juniper today announced its intention to buy startup AppFormix for an undisclosed amount. AppFormix brings streaming analytics and machine learning technologies to Juniper that are tailored for managing operations of large OpenStack and Kubernetes-based Hybrid clouds and Network Function Virtualization (NFV)/Telco clouds, wrote Ankur Singla, Juniper’s Vice President, Office of the CTO in a blog about the acquisition Read More

Thumbnail Image

Remote management app exposes millions of Android users to hacking

Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks. Read More

Thumbnail Image

‘Distributed guessing’ attack lets hackers verify Visa card details

Add credit card fraud to the list of things that distributed processing can speed up. Read More

Thumbnail Image
INSIDER

10 most useful Slack bots

We experimented and tinkered with numerous bots that are available for Slack, the cloud messaging service meant mainly for business. (You can still use Slack for non-work reasons, particularly under the service’s free option.) Here are 10 that could be most helpful working alongside your Slack team. Read More

Thumbnail Image

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated. Read More

White Paper: SureID

PIV-I and Multifactor Authentication: The Best Defense for Federal Government Contractors

In response to an unprecedented level of espionage and cyber attacks aimed at compromising critical government IT infrastructure-from networks to applications-the federal government last year announced new standards. Regulations have been enacted in 2016 to apply these standards to federal contractors and their subcontractors. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best open source management tools

Network managers should be checking their list twice Read More

Most-Read Stories

1. Clickbait and the Avaya feeding frenzy
2. All you need to know about machine learning in 12 minutes, 45 seconds
3. 20 years ago: Hot sci/tech images from 1996
4. IBM warns of rising VoIP cyber-attacks
5. Windows Phone users give Microsoft CEO an earful
6. Joe Belfiore returns to Microsoft to put more ads in Windows 10
7. 19 free cloud storage options
8. Firefox recovers from near-death experience
9. 2016’s notable deaths in technology, science & inventions
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.