|
White Paper: Verizon Learn from our data breach investigations. We investigate hundreds of data breaches every year. Take a look at our case files. Read More ▶ |
On the heels of massive IoT-enabled DDoS attack, security experts make their pitches to SIMposium 2016 attendees Read More ▶ |
|
Companies need help from the U.S. government if they’re going to face adversaries who are using nation-state cyber attack techniques. Read More ▶ |
|
|
When it comes to measuring the cost of a data breach, size matters. The more records lost, the higher the cost. Read More ▶ |
|
The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones. DARPA says it will offer $3 million for each phase 1 developer. Read More ▶ |
|
The recent DDoS attacks launched from IoT devices demonstrate that IoT spans all parts of IT. That was the message from ARM, the chip design company behind nearly every smartphone and a big chunk of IoT, at its annual TechCon event. Read More ▶ |
|
The FBI today said it had arrested a group of men in connection with the theft of 23,000 Apple iPhones from a cargo area at the Miami International Airport in April. Read More ▶ |
|
A user of Reddit’s section devoted to systems administration yesterday offered up for inspection an F-bomb-laden phishing email that had eluded his company’s spam filter despite the filter having been set to weed out such cursing. Read More ▶ |
|
The need for vigorous criminal enforcement of cybercrime laws will only become more important as networked computers and the criminals who target them grow. That was how the Department of Justice started a blog post this week that defined how it decides whether or not to prosecute a federal computer-related crime. Read More ▶ |
|
White Paper: Lookout Mobile Security Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Celebrating 12 years of Ubuntu Read More ▶ |
Most-Read Stories |