Thursday, October 24, 2013

How Box.com allowed a complete stranger to delete all my files

Vulnerabilities in some Netgear router and NAS products open door to remote attacks | How Box.com allowed a complete stranger to delete all my files

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


5 IT security horror stories (and 5 solutions)
When it comes to security, your employees may be your weakest link. While policies and training can go a long way toward helping your employees keep devices and data safe, sometimes technology is the answer. Read More


RESOURCE COMPLIMENTS OF: Prolexic Technologies

DDoS Attackers Changed Tactics in Q3 2013
According to Prolexic's upcoming DDoS attack report, there was a significant increase in reflection attacks (DNS and CHARGEN) in Q3. Read what else changed and what new threats emerged. Click here to download a complimentary copy of Prolexic's latest Q3 Attack Report

WHITE PAPER: Lumension Security

Best Practice Guide to Addressing Web 2.0 Risks
With the rise of user-generated content, social networks and readily available information offered by the Web 2.0-enabled workplace, users are more connected to people and ideas than ever before. This new level of connectivity also introduces significant risk. Read now!

Vulnerabilities in some Netgear router and NAS products open door to remote attacks
Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that could result in their complete compromise, researchers warn. Read More

How Box.com allowed a complete stranger to delete all my files
Six months ago the cloud storage service gave control over my account to someone else, who then nuked it. Fortunately, my data survived. Read More

Obamacare exchange contractors had past security lapses
Hackers exposed data on 123,000 people at one, another put personal data of 6 million Medicare beneficiaries at risk. Read More


WHITE PAPER: CDW

Improving customer interactions with powerful technology
Social tools and strategies are now crucial to building a successful CRM strategy. Learn how to take advantage of social CRM to improve business processes and enhance customer loyalty without a complete "rip-and-replace" of traditional CRM tools. Read Now

EU leaders consider tougher taxation of online service providers
European Union leaders will meet to discuss the digital economy for the first time on Thursday. Read More

Yahoo to review redacted FISA papers before release
The U.S. Foreign Intelligence Surveillance Court has allowed Yahoo's counsel to review declassified documents from a 2008 dispute over data disclosure, after the company said the public release of documents redacted by the government could lead to its role being misunderstood. Read More

US court rules warrant required for GPS tracking of vehicles
A U.S. appeals court has ruled that police must obtain a warrant prior to using a GPS device to track a vehicle, deciding on an unaddressed issue in an earlier Supreme Court order. Read More

SAP bets on HTML5, open source for its mobile app platform
SAP is planning to rely heavily on HTML5 and open standards within its products for building mobile applications, and is embracing the concept of BYOT (bring your own tools) in order to draw interest from developers. Read More


BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.