Thursday, May 1, 2014

Voice phishing campaign hits customers at dozens of banks

6 free network vulnerability scanners | 5 things you need to know about cybersecurity insurance

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: Penetration Testing: A Hands-On Introduction to Hacking
Five will win. Enter the drawing today! Read More


WEBCAST: CA Technologies

LIVE EVENT: 5/7, The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

WHITE PAPER: CA Technologies

Simplifying Data Protection, Reducing Risk of Data Loss
This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more!

6 free network vulnerability scanners
These tools help automate the detection and remediation of vulnerabilities. Read More

5 things you need to know about cybersecurity insurance
Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. Read More

VMware outlines 'vision' for unified mobile security and management
VMware today put forward its "vision" for unifying the mobile security and management technology it acquired in its $1.5 billion acquisition of AirWatch earlier this year with its traditional line of virtualization software. Read More

Facebook addresses privacy fears with anonymous log-in for apps
Ever looked at an app and decided not to try it because you didn't want to share your data? Facebook is trying to remove that stumbling block with a new service called anonymous log-ins that was announced Wednesday. Read More


WHITE PAPER: Oracle

Empowering Modern Finance
This report explores how modern CFOs and finance executives are adopting emerging technologies within their finance functions to enable the development of new capabilities and to transform the role of finance. Learn More

Google stops scanning Gmail messages for ads in Apps for Education
Google will no longer scan the email messages of students and other school staff who use its Google Apps for Education suite, exempting about 30 million users from the chronically controversial practice for Gmail advertising. Read More

4 strategies to help CIOs prepare for cyberattacks
Cyberattacks attacks are going to happen, no matter what you do. Here, then, are four strategies to help you deal with cyberattacks and the threats they pose. Read More

FCC targets costs, security and mobile communications with IT upgrade plans
The Federal Communications Commission's in-house IT infrastructure has to modernize, in order to save money and become more efficient, according to FCC CIO David Bray. Read More

Target's move to chip and pin seeks to assure consumers
Target is upgrading the security of its store-branded payment cards and making other network improvements as it seeks to restore confidence after one of the largest-ever data breaches last year. Read More

Voice phishing campaign hits customers at dozens of banks
Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls. Read More


SURVEY:

Take ITworld's mobile survey and you might win an iPad mini
Got 10 minutes? Tell us how you use your mobile device to view and share technology-related content and information. As our way of saying thank you, readers who participate will be entered in a drawing for a chance to win an iPad mini. Take the survey now!

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.