Thursday, June 5, 2014

Google has received over 41,000 requests to 'forget' personal information

Hackers distribute banking malware through Buffalo site in Japan | Palo Alto Networks report fingers UDP as major malware helper

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Google has received over 41,000 requests to 'forget' personal information
Google has already received around 41,000 requests to delete links to personal information from its search results in the three weeks since a key ruling by the European Court of Justice about the so-called right to be forgotten. Read More


WHITE PAPER: Strategy Companion Corporation

Why your organization can benefit from self-service BI
This IDC white paper discusses the benefits of using BI tools that better address the needs of business users who perform analysis of data to inform decisions on a regular basis. The document compares modern offerings with traditional BI tools and discusses the benefits of self-service BI. Learn more

WEBCAST: CA Technologies

The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

Hackers distribute banking malware through Buffalo site in Japan
Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan. Read More

Palo Alto Networks report fingers UDP as major malware helper
Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise networks almost always uses the User Datagram Protocol (UDP) to communicate, blending in with legitimate UDP-based applications such as video. Read More

ISPs should quarantine infected computers, researchers say
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers identified on their networks. Read More

Serious flaw in GnuTLS library endangers SSL clients and systems
A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library. Read More


WHITE PAPER: MoreDirect

EndPoint Interactive eGuide
In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends – BYOD and collaboration – and offer tips and advice on how best to manage them. Read on to learn how to make the most of endpoints in your enterprise. Read More

Google plans end-to-end encryption tool for additional email privacy
In an apparent response to ongoing concerns about electronic communications being collected and read by government agencies, Google released its estimates of how much email is being sent, unencrypted--as well as a tool to do something about it. Read More

California kills bill to require that retailers use EMV smartcards
State Senate misses voting deadline on bill to set deadlines for adoption of microchip-based credit and debit cards. Read More

CISOs look to hire white hat hackers to head off security breaches
The best defense is a good offense and savvy CISOs are searching for security professionals such as certified ethical hackers. However, the demand for these highly skilled workers is skyrocketing. Read More

Security Manager's Journal: We manage our threats, but what about our vendors?
We've all learned that we're no safer than our least safe partner on our networks. Read More


SURVEY

Take ITworld's cloud survey and you could win $500
ITworld is conducting a brief survey regarding cloud computing initiatives, and we value your input. The survey will take you about 10 minutes to complete. And there's a reward! Respondents who complete the survey will be entered in a sweepstakes to win a $500 cash prize. Take the survey now!

GIVEAWAYS:

Enter today for your chance to win!

The Rails 4 Way
Through detailed code examples, you'll dive deep into the Rails 4 code base, discover why Rails is designed as it is, and learn how to make it do exactly what you want. Enter now!

JavaScript Essentials LiveLessons (Video Training)
In 4 hours of video instruction, JavaScript Essentials LiveLessons provides a solid foundation on which to build skills, from the perspective of a web developer. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.