Thursday, July 25, 2013

12 of the worst data breaches of 2013 so far

  SIM card vulnerabilities easy to fix, researcher says | 12 of the worst data breaches of 2013 so far
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Cybercrime Costs U.S Economy $100 Billion and 500,000 Jobs
A new economic model developed by the Center for Strategic and International Studies, a prominent D.C. think tank, quantifies sizable economic impact from malicious cyber activity. Read More


WHITE PAPER: HP

Application Security eGuide
Enterprises around the world are facing what could be called the most aggressive threat environment in the history of information technology. Disruptive computing trends are emerging that offer increased employee productivity and business agility, but at the same time introduce a host of new risks and uncertainty. Learn more.

WHITE PAPER: EMC Corporation & WWT

Kicking Off the Data Center Cloud Transformation with VSPEX
In this Solution Guide, World Wide Technology (WWT) reveals its data center cloud model in-depth and presents solutions around cloud computing with a standardized product set and advancing to an integration stage Read Now

SIM card vulnerabilities easy to fix, researcher says
A pair of severe security problems in millions of SIM cards should be easy for operators to fix, according to the German security researcher who found the issues. Read More

12 of the worst data breaches of 2013 so far
It's early but it has been a bad year for personal data exposure already. Read More


WEBCAST: PC Connection

Launch into a New World of OS Efficiency
Take a deep dive into the new and innovative devices from Lenovo that feature the new Windows 8 pro operating system from Microsoft in this webinar. View now.

White House opposes amendment to curb NSA spying
The White House is opposed to an amendment to a defense spending bill that would limit spending on mass surveillance by the National Security Agency. Read More

Symantec spots two Android apps using 'master key' vulnerability
Hackers are now using a critical vulnerability in Android to modify legitimate smartphone applications, putting users at risk of being spied on. Read More

SEC charges Texas man with running Bitcoin Ponzi scheme
A Texas man was charged on Tuesday in U.S. federal court with allegedly running a Bitcoin Ponzi scheme, allegedly siphoning the virtual currency from victims to pay for rent, food and gambling. Read More

 

DON'T MISS...

16 best free apps for your Google Nexus 7

Bypass blocked webpages and paywalls with Google as your proxy server

25 crazy and scary things the TSA has found on travelers

To solve mystery of life on Mars, we should drill, baby, drill

13 fonts to make a programmer smile

BOOK GIVEAWAY

July's books are here! Enter today to win a copy of one of these new titles:

Arduino Workshop: A Hands-On Introduction with 65 Projects
Arduino Workshop takes you through 65 electronics projects that show the full range of cool stuff you can do with Arduino.

Drupal 7 Explained: Your Step-by-Step Guide
Master Drupal one easy step at a time, through a complete, real-world sample project.

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.