|
Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ |
Ten years ago, there were no smartphones. It was the coffeeshop era of Wi-Fi, which meant that the Internet was just beginning to follow us out the door and into the world. Amazon first released EC2, to some confusion. Here’s a look ahead to 10 years in the future, and how the tech world may change. Read More ▶ |
|
Systems administrators should get ready to fix a critical vulnerability on April 12 that affects the Windows and Samba implementations of the Server Message Block (SMB) protocol. Read More ▶ |
|
Uber has announced its first reward program to hackers who can find flaws in its computer and communications systems. Read More ▶ |
|
|
The IRS faces an uphill battle in combatting identity theft, but that doesn’t mean it isn’t trying. In fiscal year 2015, the IRS said it started 776 identity theft related investigations, which resulted in 774 sentencings through its Criminal Investigation enforcement efforts. The courts continue to impose significant jail time with the average penalty in 2015 at 38 months in jail— the longest sentencing being over 27 years. Read More ▶ |
|
Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Read More ▶ |
|
The FBI this week warned carmakers and owners that they need to pay much closer attention to automotive cybersecurity. The National Highway Transportation Safety joined with the FBI in warning consumer that the increasing number of computers in the form of electronic control units (ECUs) that control numerous vehicle functions from steering, braking, and acceleration, to the lights and windshield wipers make them vulnerable to potential cybersecurity problems. Read More ▶ |
|
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs. Read More ▶ |
|
According to the FBI, the new cybercriminals Amad Umar Agha 22, known online as “The Pro,” and Firas Dardar, 27, known online as “The Shadow,” engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. Read More ▶ |
|
White Paper: SecureAuth SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS How to respond to ransomware threats Read More ▶ |
Most-Read Stories |