Tuesday, August 6, 2013

Researcher builds botnet-powered distributed file storage system using JavaScript

  Researcher builds botnet-powered distributed file storage system using JavaScript | Twitter introduces 'in-tweet' abuse button after complaints
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


SURVEY: Share your opinions & enter to win $500
Got 10 minutes? Take this brief survey about your involvement with and interest in various technology categories and enter for a chance to win $500. Read More


WEBCAST: IBM Corporation

Make your business smarter with cloud-based analytics
Learn how sales, finance, investment, risk, marketing, and procurement leaders are using SaaS-based business analytics to become more agile, serve the customer better, and deliver business results. Learn More.

WHITE PAPER: Zetta

Cloud-based enterprise-grade online backup
If you're searching for a cloud storage provider, you're not alone. According to IDC, worldwide spending on public IT cloud is expected to approach $100 billion by 2016. Read Now

Researcher builds botnet-powered distributed file storage system using JavaScript
The latest Web technologies can be used to build a secure and distributed file storage system by loading a piece of JavaScript code into users' Web browsers without them knowing, a researcher demonstrated Sunday at the Defcon security conference in Las Vegas. Read More

Twitter introduces 'in-tweet' abuse button after complaints
Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K. Read More

Android one-click Google authentication method puts users, businesses at risk
A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give attackers access to Google accounts, a security researcher showed Saturday at the Defcon security conference in Las Vegas. Read More


WEBCAST: IBM

Live on 4/23! Happy Customers and a Lower TCO
This webinar provides real world insight into converged systems taken from Oracle production environments. Join us to learn which offerings have the Lowest TCO, Highest Customer Satisfaction and Fewest Security Breaches... and more. Learn More

Researchers reveal methods behind car hack at Defcon
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other important functions. Read More

Black Hat 2013: Rise of the (Smart) Machines
Don't let all the light and heat over the NSA's PRISM program fool you. The big story at this year's annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks. Read More

Will Smith makes unexpected appearance at Defcon hacker conference
American actor Will Smith captured the attention of Defcon attendees when he showed up unexpectedly at the hacker conference on Sunday apparently to do research for an upcoming movie. Read More

 

DON'T MISS...

16 best free apps for your Google Nexus 7

Bypass blocked webpages and paywalls with Google as your proxy server

25 crazy and scary things the TSA has found on travelers

To solve mystery of life on Mars, we should drill, baby, drill

13 fonts to make a programmer smile

BOOK GIVEAWAY

New month, new books! We have 5 copies of each of these hot new titles to give away. Enter the drawings today.

The U.S. Technology Skills Gap
Essential reading for those eager to see America remain a relevant global power in innovation and invention in the years ahead. Consider it your how-to-get involved guidebook.

Scrum Shortcuts without Cutting Corners
Scrum expert Ilan Goldstein helps you translate the Scrum framework into reality to meet the Scrum challenges your formal training never warned you about.

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.