Thursday, June 12, 2014

Amazon AWS continues to use TrueCrypt despite project's demise

Amazon AWS continues to use TrueCrypt despite project's demise | 'Clandestine Fox' hackers win over energy employee in strategy change

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Zeus Trojan alternative created from scratch hits the underground market
A new Trojan program that can spy on victims, steal login credentials and interfere with browsing sessions is being sold on the underground market and might soon see wider distribution. Read More


WHITE PAPER: CDW

Comprehensive Guide to Cloud Data Security
The potential security risk of migrating sensitive data and applications to the cloud is still the top concern among security professionals. Even private clouds can open up vulnerabilities when sharing multiple data sets on the same physical server. View Now

WHITE PAPER: Imperva

IPS and NGFWs Leave Dangerous Gaps in Enterprise Security
Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders better protect Web applications in their organizations. Learn more!

Amazon AWS continues to use TrueCrypt despite project's demise
TrueCrypt remains the only option for securely importing and exporting data to and from the Amazon Simple Storage Service (S3) two weeks after the popular encryption software was abruptly discontinued by its creators, supposedly for security reasons. Read More

'Clandestine Fox' hackers win over energy employee in strategy change
A hard-to-tracking hacking group, known to use zero-day attacks, changed tack to use social media in an attempt to compromise an employee of an energy company, according to new research from FireEye. Read More

Food chain, PF Chang's, investigates possible card breach
A large batch of stolen credit card numbers for sale on an underground forum may have come from a breach at P.F. Chang's China Bistro, a restaurant chain that said on Tuesday it is investigating. Read More

Blackphones coming in three weeks, will ship in millions, backers say
The Blackphone security-focused smartphone will go on the market in three weeks and "a few thousand" have already been sold through pre-orders, executives from the device's makers say. Read More


WEBCAST: CA Technologies

The End of Data Protection As We Know It.
A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

Evernote hit by denial of service attack
Evernote was resuming operations early Wednesday following a denial of service attack. Read More

Microsoft Patch Tuesday brings a bounty of IE fixes
For this month's round of software patches, Microsoft has issued a record 59 fixes for its Internet Explorer (IE) browser, including one critical vulnerability that had remained unpatched since it was made public May 22. Read More

Check if your computer is infected with GameOver Zeus in one click
With more than a million computers infected with this malware, take just a few seconds to check Read More

Microsoft pushes out massive security update for Internet Explorer
Six down, six to go. Today is the Microsoft Patch Tuesday for June, and it comes with seven new security bulletins. The good news is that five of the seven are only rated as Important, but one of the two Critical security bulletins--the cumulative update for Internet Explorer--is huge. Read More


SURVEY

Take ITworld's cloud survey and you could win $500
ITworld is conducting a brief survey regarding cloud computing initiatives, and we value your input. The survey will take you about 10 minutes to complete. And there's a reward! Respondents who complete the survey will be entered in a sweepstakes to win a $500 cash prize. Take the survey now!

GIVEAWAYS:

Enter today for your chance to win!

The Rails 4 Way
Through detailed code examples, you'll dive deep into the Rails 4 code base, discover why Rails is designed as it is, and learn how to make it do exactly what you want. Enter now!

JavaScript Essentials LiveLessons (Video Training)
In 4 hours of video instruction, JavaScript Essentials LiveLessons provides a solid foundation on which to build skills, from the perspective of a web developer. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.