Thursday, May 2, 2013

EFF: Trust Twitter -- but not Apple or Verizon -- to protect your privacy

  EFF: Trust Twitter -- but not Apple or Verizon -- to protect your privacy | A10 airs Thunder line of ADCs, along with more DDoS protection
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Why changing your LivingSocial password won't save you
Changing your LivingSocial password is a good first step, but the attackers already have crucial information you can't change or undo. Read More


RESOURCE COMPLIMENTS OF: Sophos

Sophos Virus Removal Tool
Find and remove viruses, spyware, rootkits , fake antivirus and more. Scan now.

WEBCAST: Lexmark International

Faster Business Information. Better Business Collaboration
This webinar will teach you about smart process apps—a new category ofsoftware that makes collaborative processes more productive and flexible. Learn More

EFF: Trust Twitter -- but not Apple or Verizon -- to protect your privacy
Verizon and MySpace scored a zero out of a possible six stars in a test of how far 18 technology service providers will go to protect user data from government data demands. Read More

A10 airs Thunder line of ADCs, along with more DDoS protection
A10 Networks this morning announced a new line of application delivery controllers -- distinct from the existing AX series -- dubbed "Thunder," saying that the new units offer more capacity in a smaller footprint. Read More

5 reasons to build an enterprise mobile app store
IT departments can keep employees from using malware-infested mobile apps by creating an internal store of company-approved apps. The store can also collect feedback from users about their preferences. Read More


WEBCAST: HP Intel VMware

The Clear Case for Cloud
Join this Webcast to learn how the partnership between VMware and HP has resulted in some dramatic changes to putting VMs into production and enabling a software-defined data center. View Now!

Splunk adds statistical analysis to enterprise security app
Analysis of machine-generated data can play an important role in a sophisticated layered defense for your data and systems, but getting there can be challenging even with advanced intelligence platforms. Read More

Groups criticize FBI plan to require Internet backdoors for wiretaps
Privacy groups are denouncing a federal government move to force Internet companies like Facebook and Google to build backdoors that would let the FBI and other agencies snoop in on real time online communications. Read More

Aging networking protocols abused in DDoS attacks
Aging networking protocols still employed by nearly every Internet-connected device are being abused by hackers to conduct distributed denial-of-service (DDoS) attacks. Read More

Mozilla moves to stop spyware company from spoofing Firefox
Mozilla sent a cease-and-desist letter on Tuesday to a European company that created a piece of spyware masquerading itself as the Firefox browser. Read More

 

BOOK GIVEAWAY

New month, new books. Enter the drawings today!

Absolute OpenBSD, 2nd Edition

Practical Object-Oriented Design in Ruby: An Agile Primer

DON'T MISS...

2013 IT Salary Survey: How does your salary compare?

Salesforce, the pillow maker and the $125,000 AmEx bill

Greatest comebacks in tech history

What's your obsolete tech really worth on eBay?

Here's a master list of over 700 free online courses from top universities

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.