Thursday, April 24, 2014

Search and rescue group sues FAA over drone use

  How secure is the fingerprint scanner on the Galaxy S5? | Search and rescue group sues FAA over drone use
 
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Coding error protects some Android apps from Heartbleed
Some Android apps thought to be vulnerable to the Heartbleed bug were spared because of a common coding error in the way they implemented their own native OpenSSL library. Read More
 


WHITE PAPER: Dell Software
 
30 Tips and Tricks for Toad for Oracle You Need to Know
For more than 10 years Toad for Oracle has been the number one productivity tool for Oracle developers. This white paper will step you through over 30 proven tips and tricks to get more out of Toad. Test your knowledge and see how many you know. Read now!

WEBCAST: CA Technologies
 
LIVE EVENT: 5/7, The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

How secure is the fingerprint scanner on the Galaxy S5?
  When the iPhone 5S came out, I remember reading about the fingerprint scanner being relatively easy to defeat. Does anyone know if the fingerprint scanner in the new Samsung Galaxy S5 is comparable to using a PIN, or is it more of "casual" security feature that is there mainly because Apple made one first? Read More
 

Search and rescue group sues FAA over drone use
Texas EquuSearch contends that FAA rules do not bar drones for 'humanitarian use'. Read More
 

Google reportedly wants to make email encryption easier, but don't hold your breath
Still responding to the National Security Agency surveillance revelations, Google is reportedly preparing to help users beef up Gmail security with end-to-end encryption. The search giant is working on a way to make Pretty Good Privacy (PGP) encryption easier to use for Gmail fans, according to a report by Venture Beat. Read More
 


WHITE PAPER: CA Technologies
 
Simplifying Data Protection, Reducing Risk of Data Loss
This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more!

Review: 1Password 4.5 brings a mature security app into the world of iOS 7
In the past couple years, apps that store secure data on a Mac or iOS device have become a pretty common sight; the need for some kind of "secure vault" where you can stash everything from passwords to credit card numbers has become so prevalent, in fact, that Apple even built the ability to do so right into OS X Mavericks with iCloud Keychain. Read More
 

Moving cybersecurity beyond compliance
The evolving nature of cyberattacks demands a more dynamic response, according to government CIOs making an effort to implement real-time, continuous monitoring and reporting for security issues. Read More
 

How to keep your smartphone (and its data) secure
These tips and tools can help you keep your smartphone close, and protect your data if it strays. Read More
 

 

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

8 books every IT leader should read this year
 

A method to the madness: How 13 programming languages got their names

IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.