A Turkish hacker is giving out prizes for DDoS attacks

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Voices of Networking Alert

Dec 12, 2016
Featured Image

Serverless: The next step in cloud computing’s evolution

Expectations are high and steadily growing for how serverless computing can revolutionize the way organizations approach development and innovation. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A Turkish hacker is giving out prizes for DDoS attacks
US mulls rules for airlines that plan in-flight Wi-Fi voice calls
(From our archives) They said the iPhone would be a flop
Georgia says it's traced an attempted voter hack to DHS
7 hiring trends for 2017
(From our archives) High tech helps solve mystery of ancient calculator

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Thumbnail Image

A Turkish hacker is giving out prizes for DDoS attacks

A hacker in Turkey has been trying to encourage distributed denial-of-attacks by making it into a game, featuring points and prizes for attempting to shut down political websites. Read More

Thumbnail Image

US mulls rules for airlines that plan in-flight Wi-Fi voice calls

The U.S. Department of Transportation is considering making it mandatory for airlines to inform passengers before purchasing tickets if they will allow voice calls using mobile wireless devices on board their aircraft, thus hoping to placate customers who could object to having co-passengers talking away on their phones in an enclosed space. Read More

Thumbnail Image

(From our archives) They said the iPhone would be a flop

Pundits who got it wrong explain why ... or deny that they did Read More

Thumbnail Image

Georgia says it's traced an attempted voter hack to DHS

Georgia's secretary of state says the state was hit with an attempted hack of its voter registration system from an IP address linked to the federal Department of Homeland Security. Read More

Thumbnail Image

7 hiring trends for 2017

Hiring is a challenge for CIOs, and it won’t get much easier in the coming year, particularly for IT departments that are trying to fill key security and networking roles. Read More

(From our archives) High tech helps solve mystery of ancient calculator

Results of a high-tech research project to be released next week promise to finally unravel much of the remaining mystery of a 2,000-year-old astronomical calculator. Read More

Video/Webcast: Keeper Security

How to Protect Your SMB Against Cyber Attacks

Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. AT&T to cough up $88M for ‘cramming’ mobile customer bills
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
5. Cisco Talos: Zeus spawn “Floki bot” malware gaining use cyber underworld notoriety
6. 19 free cloud storage options
7. Just one autonomous car will use 4,000 GB of data/day
8. 10 reasons to divorce the cloud
9. 10 most useful Slack bots
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Voices of Networking Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.