Tuesday, November 26, 2013

Twitter tightens security against NSA snooping

Twitter tightens security against NSA snooping | CryptoLocker gang casts tentacles into botnet crime world

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of 'Perl One-Liners: 130 Programs That Get Things Done'
We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! Read More


WHITE PAPER: Citrix Online

10 Reasons to Strengthen Info Security with Virtualization
New ways of working call for new ways of managing risk. Mobility, flexwork, BYOD and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth. Learn More

WEBCAST: Dyn Inc.

Three Best Practices To Protect Your Company
DDoS attacks are estimated to have increased by over 50 percent in one year. Check out this informative webcast for a deep look at the threat landscape and decisive best practices to mitigate your risk. Learn More.

Twitter tightens security against NSA snooping
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead. Read More

CryptoLocker gang casts tentacles into botnet crime world
The cyber-gang running the CryptoLocker extortion racket is sharing a big cut of any payments they squeeze out of their victims with criminal botnet owners working closely with them, says Symantec, which has been monitoring this underworld activity online. Read More

NSA reportedly compromised more than 50,000 networks worldwide
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points. Read More


WHITE PAPER: Trusteer

The Rising Threat of Corporate Cybercrime
This white paper discusses the cybercriminal motives and methods, and presents the need for Enterprises to recognize this growing danger and implement technologies that effectively prevent malware. Learn More

Privacy groups call on UN to condemn surveillance
A coalition of five privacy and digital rights groups is pushing the United Nations to take a stand against international surveillance programs deployed by the U.S. government and some allies. Read More

Survey: Most Europeans fear cybercrime but fewer take security measures
According to a Eurobarometer survey published on Friday, only 48 percent of Internet users have changed any of their online passwords during the past year. Read More

Pirate Bay co-founder will be extradited to Denmark
Pirate Bay co-founder Gottfrid Svartholm Warg will be extradited to Denmark on Wednesday, a Swedish public prosecutor confirmed Friday. Read More

Privacy groups urge UN to adopt digital surveillance resolution
Five human rights groups urged the United Nations (UN) General Assembly to adopt a new resolution against indiscriminate mass surveillance. Read More


BOOK GIVEAWAY:

Enter today! The drawings end November 30.

Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code, 3rd Edition
You Will Learn Python! Follow Zed Shaw's system and you will succeed -- just like the hundreds of thousands of beginners Zed has taught to date!

Perl One-Liners: 130 Programs That Get Things Done
These small and awesome Perl programs are sure to save you time and sharpen your sleight of hand.

DON'T MISS...

11 technologies that didn't survive into the sci-fi future

A little meter that shows the big differences in charging plugs and cables

How to get files from your phone onto your laptop (without Wi-Fi)

How cops and robbers are using Google Earth

Arg! The 9 hardest things programmers have to do


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.