Thursday, August 1, 2013

MIT report says it didn't seek federal charges against Aaron Swartz

  US appeals court upholds warrantless collection of phone location data | Bogus Chrome, Firefox extensions pilfer social media accounts
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


SURVEY: Share your opinions & enter to win $500
Got 10 minutes? Take this brief survey about your involvement with and interest in various technology categories and enter for a chance to win $500. Read More


WHITE PAPER: HP

Application Security eGuide
Enterprises around the world are facing what could be called the most aggressive threat environment in the history of information technology. Disruptive computing trends are emerging that offer increased employee productivity and business agility, but at the same time introduce a host of new risks and uncertainty. Learn more.

WEBCAST: LogiAnalytics (formerly LogiXML)

Create Competitive Advantage, Featuring Synchology
Join this Webcast to see how they transformed their client services with an analytics tool that enabled them to quickly build and deploy web-based dashboards, reports, interactive analytics and customize security – all at a fraction of the cost of traditional BI platforms. And see a demo of Logi Analytics in action. View Now!

US appeals court upholds warrantless collection of phone location data
Warrants are not required by the U.S. government to access historical cell site information, an appeals court ruled in an order. Read More

Bogus Chrome, Firefox extensions pilfer social media accounts
Trend Micro has found two malicious browser extensions that hijack Twitter, Facebook and Google+ accounts. Read More

Microsoft expands bug info-sharing program to larger crowd
Microsoft is expanding a program that shares information with select security firms, giving a new class of researchers access to threat data before the company patches its software. Read More


WHITE PAPER: Cisco Systems

The Expanding Role of Mobility in the Workplace
Momentum is growing for corporate mobility--64% of firms say that unleashing employee mobility is a priority. Forrester examines the trends, outlines deployment priorities, and highlights the business benefits of crafting a mobile strategy. Read Now

Shorter, higher-speed DDoS attacks on the rise, Arbor Networks says
Almost half of the distributed denial-of-service attacks monitored in a threat system set up by Arbor Networks now reach speeds of over 1Gbps. That's up 13.5% from last year, while the portion of DDoS attacks over 10Gbps increased about 41% in the same period, Arbor says. Read More

Some home automation systems are rife with holes, security experts say
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. Read More

Spoofed! Fake GPS signals lead yacht astray
Researchers in the U.S. have managed to spoof GPS (Global Positioning System) signals to send a yacht hundreds of meters off course, while fooling the crew into thinking the yacht was remaining perfectly on course. Read More

MIT report says it didn't seek federal charges against Aaron Swartz
The Massachusetts Institute of Technology never sought a federal prosecution of Aaron Swartz, the programming prodigy who was charged with stealing millions of academic papers from an online archive at MIT, according to a report by the institute. Read More

 

DON'T MISS...

16 best free apps for your Google Nexus 7

Bypass blocked webpages and paywalls with Google as your proxy server

25 crazy and scary things the TSA has found on travelers

To solve mystery of life on Mars, we should drill, baby, drill

13 fonts to make a programmer smile

BOOK GIVEAWAY

July's books are here! Enter today to win a copy of one of these new titles:

Arduino Workshop: A Hands-On Introduction with 65 Projects
Arduino Workshop takes you through 65 electronics projects that show the full range of cool stuff you can do with Arduino.

Drupal 7 Explained: Your Step-by-Step Guide
Master Drupal one easy step at a time, through a complete, real-world sample project.

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.