Tuesday, November 5, 2013

US intelligence officials: NSA reform bill is 'flawed'

CryptoLocker creators try to extort even more money from victims with new service | Security researcher says new malware can affect your BIOS; be transmitted via the air

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


US intelligence officials: NSA reform bill is 'flawed'
Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday. Read More


RESOURCE COMPLIMENTS OF: Prolexic Technologies

Safeguard Revenues from Q4 DDoS Attacks
Q4 is typically one of the most active quarters for DDoS attacks. And it's also a key quarter for online businesses. Learn how to ensure website availability and prepare your enterprise to minimize the impact of a DDoS attack. Download Prolexic's White Paper – Data Analytics and DDoS Mitigation: Lessons Learned

RESOURCE COMPLIMENTS OF: IT Roadmap 2013

NEW: IT Roadmap Washington, D.C. is all new for 2013!
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and FIVE FOCUSED PILLARS OF TECHNOLOGY learning that are the most critical for the year ahead. Register now. Attend on December 12th. It's free!

CryptoLocker creators try to extort even more money from victims with new service
The creators of CryptoLocker, a piece of malware that encrypts user data and holds it for ransom, are giving users who removed the malicious program from their computers a second chance to recover their files, but at a much higher cost. Read More

Security researcher says new malware can affect your BIOS; be transmitted via the air
Rip out your computer's microphone and webcam, turn off your Bluetooth, and put on your tinfoil hats, it's "super amazing crazy security storytime." Read More

Finland says government communications hacked
The Finnish government's computer networks have been breached by malware for years, and it is possible secure communications have been compromised, the Finnish Ministry for Foreign Affairs confirmed Friday. Read More


WEBCAST: Bit9, Inc

Malware Detection Comes of Age
The idea of detection is nothing new, but where and when it happens is changing. Anti-virus, firewalls and IPS/IDS products have been adopted to protect networks and endpoints for over a decade. Join us for this live webinar to learn the latest on advanced threat detection technologies. Register Now

Chrome browser will block malware downloads
Google has developed a security feature for Chrome that lets the browser detect and stop malware downloads. Read More

New malware variant suggests cybercriminals targeting SAP users
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future. Read More

Tech industry calls for 'oversight and accountability' of NSA surveillance
Internet companies in the U.S. are demanding that the surveillance practices of the U.S. should be reformed to enhance privacy protections and provide "appropriate oversight and accountability mechanisms." Read More

How to roll your own VPN
With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location. Read More


BOOK GIVEAWAY:

Thank you (and good luck) to everyone who entered October's drawings. We'll be contacting the winners soon.

In the meantime, why not enter November's giveaways for a chance to win one of 5 copies of each of these new books.

Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code, 3rd Edition
You Will Learn Python! Follow Zed Shaw's system and you will succeed -- just like the hundreds of thousands of beginners Zed has taught to date!

Perl One-Liners: 130 Programs That Get Things Done
These small and awesome Perl programs are sure to save you time and sharpen your sleight of hand.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.