Thursday, March 21, 2013

DARPA looking for way to spot attackers on wireless networks

  Cisco inadvertently weakens password encryption in its IOS operating system | Privacy protection for documents stored in the cloud gets DoJ nod
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


DARPA looking for way to spot attackers on wireless networks
The U.S. military relies heavily on distributed, wireless networks to communicate in combat zones. Now DARPA is looking for ideas on how to keep enemies off these networks. Read More


WHITE PAPER: NetApp

Virtualize without compromise.
Automate your business. Download the VMware® and NetApp® trial. Learn more www.netapp.com/dataontap

WEBCAST: HP Intel VMware

The Clear Case for Cloud
Join this Webcast to learn how the partnership between VMware and HP has resulted in some dramatic changes to putting VMs into production and enabling a software-defined data center. View Now!

Cisco inadvertently weakens password encryption in its IOS operating system
The password encryption algorithm used in some recent versions of the Cisco IOS operating system is weaker than the algorithm it was designed to replace, Cisco revealed earlier this week. Read More

Privacy protection for documents stored in the cloud gets DoJ nod
As House subcommittee weighs overhaul of 1986 statute to strengthen privacy in the cloud, senators introduce their own legislation to update Electronic Communications Privacy Act. Department of Justice affirms the Obama administration's support for an overhaul. Read More

How (and why) to set up a VPN today
Investing in a good VPN is one of the smartest steps you can take toward improving your online privacy. We'll show you how to do it right. Read More

South Korean TV and bank networks paralyzed, say reports
Computer networks of banks and some broadcasters in South Korea were hit Wednesday in what is suspected to be a cyberattack, according to news reports. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Microsoft: Hackers obtained high-profile Xbox Live accounts
Several high-profile Xbox Live accounts for former and current Microsoft employees were compromised by attackers using social engineering techniques, the company said late Tuesday. Read More

Google fully implements security feature on DNS lookups
Google has fully implemented a security feature that ensures a person looking up a website isn't inadvertently directed to a fake one. Read More

6 software and driver update utilities compared
If you dismissed update utilities as something only for home users (as I did until recently), now might be the time to take a second look. Read More

Click fraud botnet defrauds advertisers up to $6 million
An advertising analytics company said it has discovered a botnet that generates upwards of US$6 million per month by generating bogus clicks on display advertisements. Read More

 

BOOK GIVEAWAY

Enter now for your chance to win! We've got 5 copies of each book to give to some lucky winners.

jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples
This guide brings together more than one hundred self-contained, downloadable examples, each with an in-depth explanation of how the code works and how to adapt it for your own needs.

The Book of GIMP: A Complete Guide to Nearly Everything
Whether you're just getting started with this free Photoshop alternative or working to master GIMP's more complex features, you'll find the answers you're looking for in The Book of GIMP.

DON'T MISS...

20 historic tech sounds you may have forgotten

How to get your personal data removed from people search websites

25 crazy and scary things the TSA has found on travelers

10 geeky street signs: Finding your way to nerdvana

The best office apps for your iPad

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.