Thursday, February 27, 2014

IE zero-day exploit being used in widespread attacks

IE zero-day exploit being used in widespread attacks | 360 million account credentials found in the wild, says security firm

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of 'A Practical Guide to Fedora and Red Hat Enterprise Linux'
February's book giveaway ends tomorrow. Five will win. Enter now! Read More


RESOURCE COMPLIMENTS OF: Prolexic

DDoS Attacks used to Influence Stock Price and Limit Trading
White paper: DDoS Attacks Against Global Markets – PLXsert provides an in-depth review of 10 DDoS attack campaigns and explains how they were used to try to influence share prices, disrupt trading and interfere with exchange platforms. Download Prolexic's free white paper to learn more.

WHITE PAPER: Citrix Systems

InfoWorld Exclusive: Mobile Device Management Deep Dive
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. View more

IE zero-day exploit being used in widespread attacks
The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people. Read More

360 million account credentials found in the wild, says security firm
A cybersecurity company said Tuesday it has obtained a list of 360 million account credentials for Web services, likely collected through multiple data breaches. Read More

Android malware using TOR anonymity network makes a debut
Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows. Read More


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who's often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

Check Point unveils security architecture for threat-intelligence sharing
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention. Read More

OS X 10.9.2 arrives to fix SSL vulnerability, Mail problems, and more
What do fixes for critical security vulnerabilities, improvements to mail delivery, and new FaceTime features have in common? Well, they're all in OS X 10.9.2, which arrived on Tuesday. It's available in the Updates tab of the Mac App Store, and even if you're among those who usually take a wait-and-see approach to system updates, this particular release is worth an expedient installation. Read More

7 hidden dangers of wearable computers
Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices. Read More


BOOK GIVEAWAY:

Enter today for your chance to win. The drawings end February 28.

A Practical Guide to Fedora and Red Hat Enterprise Linux
This comprehensive guide, written by Linux expert and best-selling author Mark Sobell, brings together all the knowledge and real-world insights you need to master and succeed with today's versions of Fedora or Red Hat Enterprise Linux.

Development with the Force.com Platform: Building Business Applications in the Cloud, 3rd Edition
With Salesforce.com's Force.com platform, you can build and deploy powerful cloud-based enterprise applications faster than ever before. Now, Jason Ouellette gives you all the practical, technical guidance you need to make the most of the newest Force.com releases in your own custom cloud applications.

DON'T MISS...

20 tech brand names you're saying wrong

10 Eclipse projects that have made waves in IT

Your new PC needs these 22 free programs

10 Chrome tab tricks

The clock in the mountain: 10 curious side projects of tech's rich and famous


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.