Tuesday, April 2, 2013

Ransomware leverages victims' browser histories for increased credibility

  My divorce from Google - One year later | Critical denial-of-service flaw in BIND software puts DNS servers at risk
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Ransomware leverages victims' browser histories for increased credibility
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Read More


WEBCAST: Oracle

10 Ways CIOs Can Enhance Innovation
Date: April 9th, 2013 Time: 2 PM EDT Most CIOs who say they want to pursue innovation won't permit their teams to use the tools that are most capable of delivering innovative gains. It's a huge disconnect in IT primarily driven by perceptions of security risks over cloud and mobility. Learn More

WEBCAST: Lexmark International

Faster Business Information. Better Business Collaboration
This webinar will teach you about smart process apps—a new category ofsoftware that makes collaborative processes more productive and flexible. Learn More

My divorce from Google - One year later
Google's Terms of Service and Privacy Statement motivated me to give up over 3,000 Google+ Friends, and to stop using the Google search engine and the rest of their products, attractive as they were. Finding alternatives is definitely do-able. Here's where I am, one year later. Read More

Critical denial-of-service flaw in BIND software puts DNS servers at risk
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines. Read More


WEBCAST: HP Intel VMware

Your IT Journey - Your Way
Faced with unrelenting pressure to do more with less, IT leaders are implementing virtualization, mobility and cloud computing in their enterprises. In this Knowledge Vault Exchange you'll find a plethora of valuable information, including videos, on-demand Webcasts, white papers and Twitter chats. View Now!

Hacking evolution: From good to evil to good
Video outlines the background of how hacking when from enthusiasts to criminals, and how good hackers are trying to take back the term. Read More

Bitcoin exchange faces DDoS, even as the digital currency surges
Bitcoin exchange Mt. Gox faced a distributed denial-of-service attack late Thursday, at a time the digital currency is seeing an upward swing. Read More

Forrester Research calls mobile-device management 'heavy-handed approach'
Forrester Research predicts that with the "bring your own device" (BYOD) trend expected to increasingly include laptops in addition to smartphones and tablets, the approach to managing those devices is in for some big changes. Read More

 

BOOK GIVEAWAY

April's books are here. Enter today for your chance to win!

The Java Tutorial: A Short Course on the Basics, 5th Edition

Google Drive & Docs In 30 Minutes

DON'T MISS...

7 hidden gems in Windows Blue

The worst IT addictions (and how to cure them)

10 geeky street signs: Finding your way to nerdvana

Killer open source admin tools

16 best free apps for your Google Nexus 7

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.