Thursday, October 17, 2013

Oracle plugs severe security holes that put systems at hijack risk

  Oracle plugs severe security holes that put systems at hijack risk | Internet infrastructure groups move away from US gov't over spying

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: The Practice of Network Security Monitoring
We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! Read More
 


RESOURCE COMPLIMENTS OF: Neustar

Hoping DDoS will go away? Wish you had a strategy?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More

Oracle plugs severe security holes that put systems at hijack risk
Oracle fixed on Tuesday 127 security issues in Java, its database and other products, patching some flaws that could let attackers take over systems. Read More
 

Internet infrastructure groups move away from US gov't over spying
After recent revelations about the U.S. National Security Agency's widespread surveillance of Internet communications, the coordination of the Internet's technical infrastructure should move away from U.S. government oversight, said 10 groups involved in the Internet's technical governance. Read More
 

Security firm releases tool to audit SAP's HANA
A new tool from security vendor Onapsis aims to secure SAP's in-memory database HANA, the German company's fastest-growing data processing product. Read More
 


WEBCAST: Dyn Inc.

Three Best Practices To Protect Your Company
DDoS attacks are estimated to have increased by over 50 percent in one year. Check out this informative webcast for a deep look at the threat landscape and decisive best practices to mitigate your risk. Learn More.

How to enable Yahoo Mail's (soon to be default) SSL encryption today
The revamped Yahoo Mail sure is pretty, but from a security perspective the popular service has a pretty ugly security flaw: It doesn't encrypt your email sessions. But that will soon change. (Finally!) Yahoo plans to roll out default SSL connections to all email accounts beginning January 8, 2014, the company announced Monday. Read More
 

First Look: NetCitadel threat management platform in beta site
Fenwick & West director of IT Kevin Moore sees potential in it helping to speeding response to advanced malware threats. Read More
 

Lavabit briefly allowing users to recover their data
Former users of the Lavabit encrypted email service that was shut down in August are being temporarily allowed to change their passwords and download copies of their data. Read More
 

Managed security service providers face $40M liability exposures
Managed security service providers get paid by enterprise customers to stop malware or other kinds of cyberattacks, but if they fail, they face what's often a multi-million-dollar liability. Read More
 

 

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.
 

DON'T MISS...

5 ridiculous tech fees you're still paying

Obsolete! Careers that are being automated into oblivion

10 things every new Mac user should know

18 supercool objects made with 3D printers

Shudder! 10 killer tech exec Halloween costumes
 


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.