Thursday, October 10, 2013

Basic flaw in WhatsApp could allow attackers to decrypt messages

  NSA's Alexander asks telecom industry to trust him | D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: The Practice of Network Security Monitoring
We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! Read More
 


RESOURCE COMPLIMENTS OF: Neustar

Hoping DDoS will go away? Wish you had a strategy?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: Akamai Technologies, Inc.

Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need an effective DDoS Mitigation strategy. Download this Forrester Research report to learn how a two-phased approach to protecting your websites and applications can lower your risk. Learn More

NSA's Alexander asks telecom industry to trust him
The director of the U.S. National Security Agency wants you to trust his people. Read More
 

D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages
The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer. Read More
 


WHITE PAPER: Dell

Five Amazing Things in NetVault Backup
NetVault Backup is cross-platform backup and recovery software that safeguards your data and applications in both physical and virtual environments – from one intuitive console. This scalable enterprise solution supports dozens of server and application platforms. Find out what NetVault Backup can do for your organization. Read the White Paper >> Read now!

Facebook fan page creators escape German privacy law
German companies are not legally responsible for the way Facebook processes the personal data of people visiting the companies' Facebook fan pages, a German administrative court ruled on Wednesday, allowing the companies to keep using the pages without violating German data protection laws. Read More
 

Network Solutions investigating DNS hijack
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Read More
 

Tenth Anniversary Patch Tuesday brings crucial Microsoft Explorer fix
As anticipated, the latest round of Microsoft's Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Read More
 

 

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.
 

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.
 

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics
 


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.