Tuesday, July 29, 2014

11 signs you've been hacked -- and how to fight back

  11 signs you've been hacked -- and how to fight back | New SSL server rules go into effect Nov. 1

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter the drawing today! Read More
 


WHITE PAPER: Accellion

Best Practices for Securing Your Mobile Workforce
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Read this whitepaper to learn the steps to reduce the risk of mobile data breaches while keeping mobile workers productive. Learn more>>

RESOURCE COMPLIMENTS OF: CSO Perspective

Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September 16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and focused on "Defending Against the Pervasive Attacker," you'll have the opportunity to connect with an extensive network of visionary CSOs, CIOs and business experts. Register now.

11 signs you've been hacked -- and how to fight back
Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been owned. Read More
 

New SSL server rules go into effect Nov. 1
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks. Read More
 

Until the Tails privacy tool is patched, here's how to stay safe
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions. Read More
 

Microsoft researchers: Use simple passwords for most of your accounts
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services. Read More
 

Juniper jettisons mobile security biz
Juniper Networks has divested its mobile security product line, selling the assets to a private equity firm for $250 million. Read More
 


: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...
Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >>

Apple "inadvertently admitted" to iOS backdoor: forensics expert
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a post by a forensics scientist, iOS author and ex-hacker. Read More
 

Until the Tails privacy tool is patched, here's how to stay safe
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions. Read More
 

Why you shouldn't blur sensitive information in photos
  Spoiler: blurred images may not really hide the information you're trying to protect Read More
 

Real-time analytics helps Virginia credit union prevent fraud
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens. Read More
 

Do your employees use Facebook? You might have a problem
  We seem to be ignoring the risks that social networks represent. Perhaps it's time to revisit them. Read More
 

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers. Read More
 

 

SURVEY:

Got 10 minutes? Tell us about your tech interests and you could win an iPad mini
ITworld is conducting its annual survey about your involvement with and interest in various technology categories, and invites you to participate. Survey participants will have the opportunity to win an iPad mini and sign up to receive a report outlining survey highlights. Take the survey now!

GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL

DON'T MISS...

Enterprise mobility management: Tools to create a secure and scalable mobile experience
Your goal is to choose a solution that addresses increasingly powerful mobile devices, demanding users and complex security challenges. To get you started, take a look at the key players in the market, the important differentiators of each solution and the top questions to ask. Go now!

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04
 

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.