Phishing still fools people, but at least more are cautious

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Oct 07, 2016
Featured Image

Level 3 blames huge network outage on unspecified configuration error

Level 3 Communications has cited an unspecified "configuration error" as the root cause of its nationwide network outage on Tuesday. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Phishing still fools people, but at least more are cautious
IT moves to open workspaces, but not everyone is happy
New Dyn CEO previously led BTI, Arbor Networks
DDoS attacks using IoT devices follow The Manchurian Candidate model
A few cool tech startups I came across at Boston's HUBweek
The Windows weakness no one mentions: speech recognition
Named Data Networking team issues call for hacks
4 ways Cognizant customers can protect themselves amid corruption probe
It's (not) elementary: How Watson works

White Paper: IBM Corporation

6 Essentials of a Modern B2Bi Architecture

Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. Read More

Thumbnail Image

Phishing still fools people, but at least more are cautious

Two new IT security studies: One looks at phishing email detection and the other at security fatigue among computer users. Read More

Thumbnail Image
INSIDER

IT moves to open workspaces, but not everyone is happy

In an effort to boost collaboration and attract millennials, even old-school organizations are tearing down their cubicle walls. But is shared space the best environment for serious IT work? Read More

Thumbnail Image

New Dyn CEO previously led BTI, Arbor Networks

Dyn, the Manchester, N.H., internet performance management company, has named network industry veteran Colin Doherty as its new CEO. Read More

Thumbnail Image

DDoS attacks using IoT devices follow The Manchurian Candidate model

Follow these steps to prevent hackers from exploiting vulnerable IoT devices to launch DDoS attacks. Read More

Thumbnail Image

A few cool tech startups I came across at Boston's HUBweek

Startups spill forth from Babson, Harvard, MIT and other institutions during Boston's HUBweek Read More

Thumbnail Image

The Windows weakness no one mentions: speech recognition

Microsoft has buried dictation capabilities within Windows for a decade. Isn't it time that Microsoft put speech recognition front and center as a productivity assistant for Microsoft Office? Read More

Named Data Networking team issues call for hacks

The Named Data Networking (NDN) project team has issued a Call for Hacks to take place at its 3rd NDN Hackathon, to be held on Nov. 4-5 at Colorado State University in Fort Collins. Read More

Thumbnail Image

4 ways Cognizant customers can protect themselves amid corruption probe

Customer of offshore outsourcing provider Cognizant should be diligent in response to the abrupt departure of the company’s president and revelations of an ongoing corruption probe. Read More

Thumbnail Image

It's (not) elementary: How Watson works

What goes into making a computer understand the world through senses, learning and experience, as IBM says Watson does? First and foremost, tons and tons of data. Read More

Video/Webcast: IBM Corporation

Blue Shield of California Speeds Cloud Deployment with IBM PureApplication

With their newly robust customer portal, Blue Shield of California now has the ability to grow and shrink on demand, as well as deploy new environments in hours as opposed to days - which greatly improves customer service. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Sneak peek: 15 gadgets to put on your holiday wish list

Most dangerous cyber celebrities of 2016 Read More

Most-Read Stories

1. Level 3 blames huge network outage on unspecified configuration error
2. AT&T jumps into SD-WAN market; partners with IBM
3. Level 3 acknowledges network outage
4. 19 free cloud storage options
5. 7 free tools every network needs
6. Top U.S. colleges for computer science
7. 3 nightmare election hack scenarios
8. New Dynamic for CPE
9. High Security for Workers and Guests
10. 6 free network vulnerability scanners
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.