Thursday, February 21, 2013

Adobe releases emergency patches for Reader and Acrobat

  Adobe releases emergency patches for Reader and Acrobat | Petition asks Obama to legalize unlocking of mobile phones
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


EU Parliament makes more than 900 changes to data privacy law
The European Parliament's industry committee approved more than 900 amendments to proposed new data protection laws. Read More


WHITE PAPER: Attachmate

New Ponemon Survey Reveals All Organizations Have Risk
Hacks, accidental disclosures and breaches appear in the news every week. This new survey shows the next victim could easily be you. Understand your risk—get this essential information now. The Ponemon survey on The Risk of Insider Fraud is provided by Attachmate Luminet. Learn More!

WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Adobe releases emergency patches for Reader and Acrobat
Adobe released emergency patches for Adobe Reader and Acrobat 11, 10 and 9 on Wednesday that address two critical vulnerabilities being actively exploited by attackers. Read More

Petition asks Obama to legalize unlocking of mobile phones
More than 85,000 people have signed a Whitehouse.gov petition asking U.S. President Barack Obama to reverse a decision by the Library of Congress making the unlocking of mobile phones illegal under the Digital Millennium Copyright Act (DMCA). Read More

China biggest, but not the only country engaged in cyberespionage
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week. Read More

Citrix releases XenMobile MDM for Apple iOS, Android devices
Citrix has announced its mobile device management platform, XenMobile, which will offer companies a secure way for employees to access native Citrix apps in the cloud as well as third-party software, such as Windows, SAP or even Salesforce.com. Read More


WHITE PAPER: Infoblox

Defeating Advanced Persistent Threat Malware
Malware is everywhere. Existing approaches to neutralizing viruses, worms, and Trojan horse viruses -- anti-virus software, web filters, etc., are not effective against sophisticated Advanced Persistent Threat (APT) Malware that exploits DNS for stealthy communications and data transfer. Read Now

Oxford University blocks Google Docs as phishing attacks soar
Oxford University has taken the radical step of temporarily blocking access to Google Docs after a dramatic increase in phishing attacks trying to harvest academic email credentials using bogus forms hosted on the service. Read More

Startup spins up identity and access-control cloud service
Startup Stormpath makes its debut today with an identity and access-control cloud-based service primarily intended for use by software development teams that are building web applications. Read More

Apple confirms cyber attack, releases Java update and malware removal tool
The words "Apple" and "security breach" don't often appear together, but on Tuesday the company said that some computers belonging to its employees had been targeted by hackers originating from China--the same group, reportedly, that last week infiltrated computers belonging to Facebook employees. The story was first reported by Reuters. Read More

Oracle releases new Java fixes, speeds up patching cycle
Oracle released new Java security updates on Tuesday and announced plans to accelerate the release of future Java patches following recent attacks that have infected computers with malware by exploiting zero-day vulnerabilities in Java browser plug-ins. Read More

 

BOOK GIVEAWAY

Enter now for your chance to win! We've got 5 copies of each book to give to some lucky winners.

Ubuntu Unleashed 2013 Edition

Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript

MOST POPULAR

COBOL will outlive us all

7 frustrating things about being a programmer

The CIA knows when you're hitting the gym

7 days with the Amazon Kindle Fire HD: Revealing its inner power-tablet

The 9 most endangered species in IT

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.