NASA’s IG tells space agency to bolster space network security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 18, 2016
Featured Image

VMware fixes XSS flaws in vRealize for Linux

The stored XSS vulnerabilities in vReader affected only some versions, but could result in code execution Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

NASA’s IG tells space agency to bolster space network security
TeslaCrypt ransomware now impossible to crack, researchers say
Steve Wozniak chimes in on the Apple/FBI debate
Attack campaign uses keylogger to hijack key business email accounts
Tim Cook to Time: 'I feel like I'm in this bad dream'
Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice
FTC warns app developers against using audio monitoring software

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image

NASA’s IG tells space agency to bolster space network security

The network NASA uses to deliver telemetry ground-based tracking, data and communications services to a wide range of current and future spacecraft needs a serious bump in security technology. That was the conclusion of the space agency’s Office of Inspector General which stated: “We found that NASA, [NASA’s Goddard Space Flight Center in Greenbelt, MD, which manages the network] failed to comply with fundamental elements of security risk management reflected in Federal and Agency policies. We believe that these deficiencies resulted from inadequate Agency oversight of the network and insufficient coordination between stakeholders. These deficiencies unnecessarily increase the network’s susceptibility to compromise.” Read More

Thumbnail Image

TeslaCrypt ransomware now impossible to crack, researchers say

The latest version of the TeslaCrypt ransomware has tidied up a weakness in previous versions that in some cases allowed victims to recover their files without paying a ransom. Read More

Thumbnail Image

Steve Wozniak chimes in on the Apple/FBI debate

In a recent Reddit AMA, Apple co-founder Steve Wozniak addressed Apple's ongoing legal battle with the FBI. Read More

Thumbnail Image

Attack campaign uses keylogger to hijack key business email accounts

A new email-based attack campaign is targeting key employees from companies in the US, Middle East and Asia with the goal of compromising their computers and email accounts. Read More

Thumbnail Image

Tim Cook to Time: 'I feel like I'm in this bad dream'

Before the Apple-FBI fight gets its first day in court, Tim Cook recaps the struggle in a new interview. Read More

Thumbnail Image

Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice

Security researchers exploited previously unknown vulnerabilities in Apple Safari, Google Chrome and Flash Player to compromise the latest versions of OS X and Windows during the first day of the annual Pwn2Own hacking contest. Read More

Thumbnail Image

FTC warns app developers against using audio monitoring software

The U.S. Federal Trade Commission has sent warning letters to 12 smartphone app developers for allegedly compromising users' privacy by packaging audio monitoring software into their products. Read More

Video/Webcast: Sophos Inc

Sophos Webcast Featuring Gartner: Synchronized Security - The Next Leap Forward

This on-demand webcast features Gartner Analyst Peter Firstbrook and Dan Schiappa, SVP and GM at Sophos, as they discuss how organizations can respond to these growing IT threats. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

11 highest paying tech jobs in America

7 VPN services for hotspot protection Read More

Most-Read Stories

1. DreamHost replaces VMware SDN with open source for big savings
2. 10 hard-core coding tips for faster Python
3. 19 free cloud storage options
4. Lenovo demands Microsoft extend Skylake Windows 7 support
5. How far have we come with HTTPS? Google turns on the spotlight
6. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
7. Steam Stealer malware provides a thriving business for cyber thugs
8. 7 free tools every network needs
9. 40 virtual reality predictions
10. ISPs aren't telling customers their router is a public hotspots
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.