Tuesday, August 20, 2013

IPMI: The most dangerous protocol you've never heard of

Quiz: Name that hacker | Don't get 'catfished:' Tips for vetting a stranger's online identity

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


IPMI: The most dangerous protocol you've never heard of
Another week, another terrifying presentation about security holes in IPMI (Intelligent Platform Management Interface) -- a widely used technology for remote management of servers. Read More


WHITE PAPER: Zetta

Cloud-based enterprise-grade online backup
If you're searching for a cloud storage provider, you're not alone. According to IDC, worldwide spending on public IT cloud is expected to approach $100 billion by 2016. Read Now

WEBCAST: IBM Corporation

Make your business smarter with cloud-based analytics
Learn how sales, finance, investment, risk, marketing, and procurement leaders are using SaaS-based business analytics to become more agile, serve the customer better, and deliver business results. Learn More.

Quiz: Name that hacker
After breaking into networks for fun, profit, and to fulfill political agendas, some did prison time. Read More

Don't get 'catfished:' Tips for vetting a stranger's online identity
All you need is a little prowess and search knowhow to expose someone online. It's not creepy, it's for your own safety. Read More

Win $500? Survey says YES!
Take our short tech survey (just 10 minutes, we promise) and enter the drawing for a chance to win $500. Read More

NSA-dodging mail service explains why email can never truly be private and secure
Silent Circle explains the technicalities behind its decision to fall on its sword before the government came a-knockin'. Read More

Attackers use Ramnit malware to target Steam users
A new variant of the Ramnit financial malware is using local Web browser injections in order to steal log-in credentials for Steam accounts. Read More


WEBCAST: IBM

Live on 4/23! Happy Customers and a Lower TCO
This webinar provides real world insight into converged systems taken from Oracle production environments. Join us to learn which offerings have the Lowest TCO, Highest Customer Satisfaction and Fewest Security Breaches... and more. Learn More

XP Z: Microsoft scares Windows XP users straight with undead bug warning
Microsoft warned Windows XP customers that they face never-patched, never-dead "zero-day" vulnerabilities if they don't dump the 12-year-old operating system before its April 2014 retirement. Read More

Cybercriminals add new exploit for recently patched Java vulnerability to their arsenal
Newly released exploit for Java vulnerability patched in June was added to the Styx exploit toolkit. Read More

USENIX: Gamers use DDoS as a service to cheat -- a lot
Inexpensive DDoS-as-a-service can stress-test your network or attack someone else's. Read More

Why I'm turning over password management to Dashlane
This utility is so good, I'm even going to pay for the premium version. Read More

5 examples of zero-day attacks
Zero-day attacks can strike anywhere, anytime. Here are five example of recent zero-day exploits. Read More


DON'T MISS...

10 overhyped tech products that crashed and burned

Running Linux on a Windows PC: Your getting started guide

11 signs your IT project is doomed

Up all night: How the tech elite pushes a crazy workaholic culture

Top open-source PCs

BOOK GIVEAWAY

We've got a some great new books to give away this month. Enter now for your chance to win!

The U.S. Technology Skills Gap
Essential reading for those eager to see America remain a relevant global power in innovation and invention in the years ahead. Consider it your how-to-get involved guidebook.

Scrum Shortcuts without Cutting Corners
Scrum expert Ilan Goldstein helps you translate the Scrum framework into reality to meet the Scrum challenges your formal training never warned you about.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.