Tuesday, May 28, 2013

US weapons system designs were reportedly viewed by Chinese hackers

  PayPal denies teenager reward for finding website bug | Commission wants to turn tables on IP thieves by crippling PCs with extortion-style lock-outs
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


US weapons system designs were reportedly viewed by Chinese hackers
The designs for over two dozen advanced U.S. weapon systems, including missile defenses, combat aircraft and ships, were reportedly accessed by Chinese hackers. Read More


RESOURCE COMPLIMENTS OF: Uptime Software

Free Trial: Unified Monitoring - Servers, VMs, Apps, Network
"up.time" is unified multi-platform/environment server monitoring, application monitoring, network monitoring and capacity management. Get dashboards and deep dive tools for comprehensive monitoring, alerting and reporting on IT performance, availability and capacity. One unified view. One Comprehensive Product. One Scalable IT Monitoring Solution. Free 30-Day Trial: Download Here

WHITE PAPER: HP

Application Security eGuide
Enterprises around the world are facing what could be called the most aggressive threat environment in the history of information technology. Disruptive computing trends are emerging that offer increased employee productivity and business agility, but at the same time introduce a host of new risks and uncertainty. Learn more.

PayPal denies teenager reward for finding website bug
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Read More

Commission wants to turn tables on IP thieves by crippling PCs with extortion-style lock-outs
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims. Read More

Twitter's two-factor authentication implementation can be abused, researchers say
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure. Read More

Western Australia police silent on charges for 17-year-old hacker
Western Australian police have charged a Perth teenager with several computer-related offenses but are not releasing the details. Read More


WEBCAST: BlackBerry

BlackBerry 10 Security - What IT Needs To Know
Discover how BlackBerry® Security covers the full range of security needs cross-platform. Plus, find out about our security roadmap and our advanced security services for the locked-down needs of government and regulated industries. View Now

Schnucks wants federal court to handle data breach lawsuit
St. Louis-based grocery chain Schnuck Markets has claimed that a potential class action lawsuit filed against it in an Illinois state court over a recent data breach really belongs in federal court because of the case's scope and damages involved Read More

Proposed law would make reprogramming cellphone IDs a crime
Reprogramming the identification number of a cellphone could be punishable with a prison sentence of up to five years under the terms of a proposed law announced Friday. Read More

U.S. losing a Sputnik moment
In October, 2010, China built the world's fastest supercomputer, and three months later President Barack Obama, in his State of the Union speech, said that America was facing a Sputnik moment. Read More

Chromium browser gets new reset options for easier recovery from malware
A future version of Google Chrome may make it a cinch to clean up messy settings cast into chaos by malware (or your own misguided hands). Read More

 

BOOK GIVEAWAY

The drawings end May 31. Enter today!

Absolute OpenBSD, 2nd Edition

Practical Object-Oriented Design in Ruby: An Agile Primer

DON'T MISS...

All hail sloth: Apps for the hopelessly lazy

16 best free apps for your Google Nexus 7

MacGyver IT: 20 tools for hero hacks

7 open source projects to cut your teeth on (and the ones to avoid)

12 ways Windows 8 dominates the OS competition

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.