Thieves steal Petya ransomware then use it for free

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 16, 2017
Featured Image

Microsoft fixes record number of flaws, some publicly known

Microsoft's batch of security patches for March is one of the largest ever and includes fixes for several vulnerabilities that are publicly known and actively exploited. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Thieves steal Petya ransomware then use it for free
Microsoft stays security bulletins' termination
Apple downplays importance of CIA's iPhone hacking capabilities
Hire a DDoS service to take down your enemies
PII of 33,698,126 Americans leaked online
Malicious uploads allowed hijacking of WhatsApp and Telegram accounts
Four charged, including Russian gov't agents, for massive Yahoo hack
DARPA fortifies early warning system for power-grid cyber assault

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Thieves steal Petya ransomware then use it for free

Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get. Read More

Thumbnail Image

Microsoft stays security bulletins' termination

Microsoft today postponed the retirement of the security bulletins it uses to describe in detail each month's slate of vulnerabilities and patches. Read More

Thumbnail Image

Apple downplays importance of CIA's iPhone hacking capabilities

Apple claims most of the CIA iPhone exploits referenced by the WikiLeaks data dump have been patched. Read More

Thumbnail Image

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems. Read More

Thumbnail Image

PII of 33,698,126 Americans leaked online

Highly personal identifying information for nearly 34 million Americans has been leaked online thanks to a NetProspex breach. Read More

Thumbnail Image

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos. Read More

Thumbnail Image

Four charged, including Russian gov't agents, for massive Yahoo hack

The U.S. Federal Bureau of Investigation has charged four people, including two Russian state intelligence agents, for their involvement in a massive hack of Yahoo that affected half a billion accounts. Read More

Thumbnail Image

DARPA fortifies early warning system for power-grid cyber assault

The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More

Video/Webcast: RES Software

Secure Access for the Workforce

A company's biggest assets are its people! But the people can't be productive if they don't have access to the apps, information and data needed to make decisions. Learn how you can ensure that all IT assets are protected and users have easy access to the apps and services they need to be productive. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Which Linux distros should newbies use?

6 cloud computing savings you may be missing out on Read More

Most-Read Stories

1. 28 facts about pi that you probably didn't know
2. Microsoft Teams takes on Slack with enterprise bots Office 365 tie-ins
3. Review: Slow Internet? Firebind can sniff out the problem
4. New iPads and iPhone SE may hit stores next week
5. Microsoft releases 18 security bulletins, 9 rated critical, many bugs disclosed exploited
6. 7 free tools every network needs
7. Levi's and Google Jacquard bring you a connected jacket you'll actually wear
8. DARPA fortifies early warning system for power-grid cyber assault
9. 19 free cloud storage options
10. Cloud price wars are back on
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.