Tuesday, April 29, 2014

Here comes the black market for XP patches

Israeli start-up, working with GE, out to detect Stuxnet-like attacks | Here comes the black market for XP patches

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Win a copy of 'Quality Code: Software Testing Principles, Practices, and Patterns'
We've got 5 copies to give some lucky ITworld readers. Enter now for your chance to win! Read More


RESOURCE COMPLIMENTS OF: Sophos

Tackling Advanced Persistent Threats
Advanced persistent threats (APT) are sneaky and hard to detect. They stay on your network, waiting for the right moment to create havoc. Find out how these threats work and how a multi-faceted approach can keep you protected against APTs. Read our whitepaper and understand - The common characteristics of APTs - How they typically work - How layers of defense can reduce the risk of attacks

WHITE PAPER: Accellion

Enterprise Mobility Management: A Data Security Checklist
Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations. This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy. Read now!

Israeli start-up, working with GE, out to detect Stuxnet-like attacks
ThetaRay monitors critical infrastructure. Read More

Here comes the black market for XP patches
For most people, XP patches will be unobtainable through legitimate channels. Sounds like a market to me. Read More

CIOs face BYOD hard reality: Employees don't care
Firing a worker for not reporting a lost or stolen tablet or smartphone may seem extreme, but at some companies things have come to that. How can CIOs get workers to take BYOD policies seriously? Read More

Hacker claim about bug in fixed OpenSSL likely a scam
Security experts have expressed doubts about a hacker claim that there's a new vulnerability in the patched version of OpenSSL, the widely used cryptographic library repaired in early April. Read More

Hackers find first post-retirement Windows XP-related vulnerability
Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw. Read More


WEBCAST: CA Technologies

LIVE EVENT: 5/7, The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

Unruffled by surveillance language, US praises NETmundial conference
U.S. officials applauded the outcome of this week's NETmundial conference on Internet governance while downplaying its strong language on surveillance and disagreements on net neutrality. Read More

Google speeds up encrypted Web communications in Chrome on Android
Google has added support for a new TLS cipher suite in its Chrome browser for Android that the company claims will provide better security and performance for encrypted communications on mobile devices. Read More

Mozilla to strengthen SSL certificate verification in Firefox
Mozilla plans to more strictly enforce industry best practices for SSL certificates in future versions of Firefox with a new certificate verification system. Read More

California phone kill-switch bill fails vote in state senate
A bill that would mandate a kill-switch on all smartphones sold in California failed a key vote in the state's senate on Thursday. Read More

Cloud attacks are following enterprise workloads
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report. Read More


SURVEY:

Take ITworld's mobile survey and you might win an iPad mini
Got 10 minutes? Tell us how you use your mobile device to view and share technology-related content and information. As our way of saying thank you, readers who participate will be entered in a drawing for a chance to win an iPad mini. Take the survey now!

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.