Tuesday, December 3, 2013

French lawmakers propose warrantless access to live user data from ISPs and hosting sites

Akamai to buy DDoS protection specialist Prolexic | Bitcointalk.org warns passwords in danger after DNS attack

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


French lawmakers propose warrantless access to live user data from ISPs and hosting sites
A wide variety of government officials could gain access to live data concerning users of ISPs and online services including content-hosting sites, without the approval of a judge, under a draft law approved by members of the French National Assembly on Friday. Read More


WHITE PAPER: Dell

Unifying Virtualized Backup Replication/Recovery
Dell AppAssure 5 builds on an impressive legacy of high-performance backup and recovery solutions, eliminating the need for vendor-specific hardware, giving IT administrators complete backup flexibility. Read the White Paper >> Read now!

WEBCAST: BMC Software

Be Ready for Big Data
Big Data Analytics has become synonymous with Hadoop. As with any new technology, there is many times a lack of expertise – and at a minimum a learning curve. Learn about the choices you have for implementing a Big Data environment. Metascale, a Big Data service provider, manages all of Sears Big Data processing along with other companies. View Now

Akamai to buy DDoS protection specialist Prolexic
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for US$370 million in cash. Read More

Bitcointalk.org warns passwords in danger after DNS attack
A popular Bitcoin discussion forum warned on Monday some user passwords may have been intercepted after the site's DNS (Domain Name System) registrar was breached. Read More


WHITE PAPER: HP

Why Your Organization Needs a Next Generation Firewall
Learn why next-generation firewalls hold promise to combat the evolving threat landscape, how to make the business case for the technology, and how to select the solution that's right for your organization. Learn More

Google Nexus phones vulnerable to denial-of-service attack via Flash SMS messages
Attackers could force phones from Google's Nexus line to reboot or fail to connect to the mobile Internet service by sending a large number of special SMS messages to them. Read More

New Windows privilege escalation flaw exploited in active attacks
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to. Read More

Google's privacy policy violates Dutch data protection law, Dutch DPA says
Google's practice of combining personal data from different Google services violates the Dutch data protection act, the Dutch data protection authority (DPA) said Thursday. But Google will not face any enforcement actions for now. Read More


BOOK GIVEAWAY:

Enter today! The drawings end November 30.

Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code, 3rd Edition
You Will Learn Python! Follow Zed Shaw's system and you will succeed -- just like the hundreds of thousands of beginners Zed has taught to date!

Perl One-Liners: 130 Programs That Get Things Done
These small and awesome Perl programs are sure to save you time and sharpen your sleight of hand.

DON'T MISS...

11 technologies that didn't survive into the sci-fi future

A little meter that shows the big differences in charging plugs and cables

How to get files from your phone onto your laptop (without Wi-Fi)

How cops and robbers are using Google Earth

Arg! The 9 hardest things programmers have to do


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.