Microsoft posts PowerShell script that spawns pseudo security bulletins

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 15, 2017
Featured Image

HP rolls out patch to fix keylogging bug in certain laptops

Consumers with HP laptops that have been accidentally recording their keystrokes can easily address the problem with a patch from the PC maker. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft posts PowerShell script that spawns pseudo security bulletins
New ransomware Jaff demands $3,700 payments
VeloCloud launches an SD-WAN security ecosystem
Google will review web apps that want access to its users' data
A ransomware attack is spreading worldwide, using alleged NSA exploit
Q&A Citrix CSO: How to deal with security across multiple generations of employees
Fragmented, disorganized IT systems thwart feds ability to track visas

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Microsoft posts PowerShell script that spawns pseudo security bulletins

A Microsoft manager this week offered IT admins a way to replicate -- more or less -- the security bulletins the company discarded last month. Read More

Thumbnail Image

New ransomware Jaff demands $3,700 payments

Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700 Read More

VeloCloud launches an SD-WAN security ecosystem

The company's rich security ecosystem provides security on the network and in the cloud Read More

Thumbnail Image

Google will review web apps that want access to its users' data

In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data. Read More

Thumbnail Image

A ransomware attack is spreading worldwide, using alleged NSA exploit

A ransomware strain appears to be spreading worldwide, by leveraging a hacking tool that may have come from the U.S. National Security Agency. Read More

Thumbnail Image

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation. Read More

Thumbnail Image

Fragmented, disorganized IT systems thwart feds ability to track visas

DHS OIG says ineffective IT process has contributed to a backlog of more than 1.2 million visa overstay cases. Read More

Video/Webcast: Citrix

Improve User Productivity without Compromising Data Security and Compliance

Organizations are increasingly dealing with security issues on a day to day basis with data loss being a significant concern. Employees regularly share files with entities outside the organization, which has increased concern about losing sensitive corporate data. IT and Security teams are in a constant struggle to improve their security measures while not significantly impacting user productivity. However, keeping that balance is a challenge. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 geek-inspired gifts for Mother's Day

Cool ways to celebrate Star Wars Day Read More

Most-Read Stories

1. Some HP PCs are recording your keystrokes
2. You really should know what the Andrew File System is
3. 18 free cloud storage options
4. Trump pushes US government to the cloud with cybersecurity order
5. Cisco taps into AI, collaboration with $125M Mindmeld buy
6. Google I/O 2017: AI, IoT and VR/AR predictions
7. SIEM remains an enterprise security architecture requirement
8. 7 free tools every network needs
9. WiFi’s evolving role in IoT
10. Cisco patches critical IOS security fault found after CIA Wikileaks dump
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.