Thursday, November 7, 2013

Want to protect your Android phone? Here's how to kill its crapware.

  Want to protect your Android phone? Here's how to kill its crapware. | Corporate interests dominate group working on EU data law

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Dutch civil society groups sue government over NSA data sharing
A coalition of defense lawyers, privacy advocates and journalists has sued the Dutch government over its collaboration and exchange of data with the U.S. National Security Agency and other foreign intelligence services. Read More
 


RESOURCE COMPLIMENTS OF: IT Roadmap 2013

NEW: IT Roadmap Washington, D.C. is all new for 2013!
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and FIVE FOCUSED PILLARS OF TECHNOLOGY learning that are the most critical for the year ahead. Register now. Attend on December 12th. It's free!

WHITE PAPER: Dell

Tech Brief: Exchange 2013 Data Loss Prevention
In this new white paper, learn about the new data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Download it today Read now!

Want to protect your Android phone? Here's how to kill its crapware.
The pre-installed crapware that fills many Android phones is more than just annoying -- it also frequently opens up big security holes. Here's how to kill the crapware and keep your phone safe and in tip-top shape. Read More
 

Corporate interests dominate group working on EU data law
The European Commission's Expert Groups, which play a vital role in shaping E.U. policies and legislation, are hugely dominated by corporate interests according to a new report released on Wednesday. Read More
 


WHITE PAPER: HP

Why Your Organization Needs a Next Generation Firewall
Learn why next-generation firewalls hold promise to combat the evolving threat landscape, how to make the business case for the technology, and how to select the solution that's right for your organization. Learn More

Tapping over typing: Knock unlocks Macs from two iPhone taps
If you work on a Mac and your iPhone never leaves your side, you should consider Knock-ing to unlock your computer. Read More
 

Microsoft waves more security pros into the pool for $100K bounties
Microsoft on Monday expanded its $100,000 bounty program, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows' anti-exploit technologies. Read More
 

Microsoft warns of Office zero-day, active hacker exploits
  Flaw unlikely to be patched in next week's security updates, says expert. Read More
 

 

BOOK GIVEAWAY:

Thank you (and good luck) to everyone who entered October's drawings. We'll be contacting the winners soon.

In the meantime, why not enter November's giveaways for a chance to win one of 5 copies of each of these new books.

Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code, 3rd Edition
You Will Learn Python! Follow Zed Shaw's system and you will succeed -- just like the hundreds of thousands of beginners Zed has taught to date!

Perl One-Liners: 130 Programs That Get Things Done
These small and awesome Perl programs are sure to save you time and sharpen your sleight of hand.
 

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology
 


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.