The most momentous tech events of the past 30 years

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 28, 2016
Featured Image

New ransomware abuses Windows PowerShell, Word document macros

A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including healthcare organizations, researchers from Carbon Black warn. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The most momentous tech events of the past 30 years
FBI grows “Cyber Most Wanted” list with Syrian Electronic Army members
Verizon's breach experts missed one right under their noses
Petya ransomware overwrites MBRs, locking users out of their computers
IRS: Top 10 2015 identity theft busts
NASA competition could net you $1.5M for next great airship
10 big announcements from Google’s Cloud Conference
Why IT can’t handle data breaches alone
People are (still) the biggest security risks

White Paper: CrowdStrike

5 Reasons Endpoint Security Must Move to the Cloud

Learn how the Cloud makes it possible to regain unprecedented control over endpoints while detecting, preventing, and responding to attacks in a way that far surpasses on-premise architectures. Read More

Thumbnail Image

The most momentous tech events of the past 30 years

History-making events from Cisco, IBM and Nortel to Facebook, Google and Apple. Read More

Thumbnail Image

FBI grows “Cyber Most Wanted” list with Syrian Electronic Army members

According to the FBI, the new cybercriminals Amad Umar Agha 22, known online as “The Pro,” and Firas Dardar, 27, known online as “The Shadow,” engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. Read More

Thumbnail Image

Verizon's breach experts missed one right under their noses

Verizon Enterprise, a bulwark against cyberattacks at many large organizations, has suffered a security breach itself. Read More

Thumbnail Image

Petya ransomware overwrites MBRs, locking users out of their computers

The new Petya ransomware overwrites the master boot record (MBR) of the affected PCs, leaving the OS in an unbootable state, researchers from antivirus firm Trend Micro said. Read More

Thumbnail Image

IRS: Top 10 2015 identity theft busts

The IRS faces an uphill battle in combatting identity theft, but that doesn’t mean it isn’t trying. In fiscal year 2015, the IRS said it started 776 identity theft related investigations, which resulted in 774 sentencings through its Criminal Investigation enforcement efforts. The courts continue to impose significant jail time with the average penalty in 2015 at 38 months in jail— the longest sentencing being over 27 years. Read More

Thumbnail Image

NASA competition could net you $1.5M for next great airship

NASA this week said it was considering a new Centennial Challenge: Build and airship capable of long duration flight for scientific missions. The agency issued a Request For information to see if there was enough industry interest in the challenge and to further develop rules for the competition. You may recall that NASA’s Centennial Challenges Program sets up challenging contests for the public, academia, and industry with an eye towards developing innovative technologies. Read More

Thumbnail Image

10 big announcements from Google’s Cloud Conference

At its big cloud user conference this week Google added some core features for enterprise customers and some fancy new machine learning tools too. Check out the top 10 announcements from Google Cloud Platform NEXT. Read More

Thumbnail Image
INSIDER

Why IT can’t handle data breaches alone

"The entire C-suite and board is on the hot seat for security these days," says Matthew Karlyn. And that makes data breaches everyone's business. Read More

Thumbnail Image

People are (still) the biggest security risks

Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately. Read More

White Paper: CompTIA

Cybersecurity for Everyone, Not Just the IT Department

It's the worst case scenario. You've just been notified that your company has experienced a data breach. How did this happen? It's a question that a growing list of CIOs have grappled with recently. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Comedians find Apple-FBI standoff a laughing matter (watch videos)

How to respond to ransomware threats Read More

Most-Read Stories

1. FAQ: 802.11ax Wi-Fi
2. iPhone SE reviews are glowing as device now available
3. 9 ways technology will change within the next 10 years
4. Windows 10 'Redstone' update to bring UI changes
5. 19 free cloud storage options
6. NASA competition could net you $1.5M for next great airship
7. Thumbing through issue No. 1 of NetworkWorld
8. The most momentous tech events of the past 30 years
9. 25 real-life ways people have been hurt using their phones
10. Networking then and now: 1986 vs 2016
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.