Thursday, July 3, 2014

ISPs sue UK spooks over network spying

  ISPs sue UK spooks over network spying | Microsoft to resume email-based security notifications

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


10 security start-ups to watch
Squeezing more out of log management and SIEM; beating botnets; detecting stealthy attacks. Read More
 


WEBCAST: CA Technologies
 
The End of Data Protection As We Know It.
A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

In this Issue


WHITE PAPER: Dell Boomi

How Master Data Management Supercharges Fast-Moving
Everyone in business knows that inconsistent and inaccurate data costs money. Workarounds and make-do solutions have kept a lid on the problem, but as more and more systems get connected up, the cost of inaction is escalating. Read now

ISPs sue UK spooks over network spying
A coalition of ISPs and communication providers from around the world filed a legal complaint against the U.K. Government Communications Headquarters (GCHQ), calling for an end to its alleged attacking and exploitation of network infrastructure to gain access to potentially millions of people's private communications. Read More
 

Microsoft to resume email-based security notifications
Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month. Read More
 

US privacy board finds no illegitimate activity in overseas surveillance program
A U.S. government privacy oversight board has found that the National Security Agency and other agencies have not misused the provisions of the country's overseas surveillance program, but cautioned that certain aspects of the program, such as the incidental collection of communications of U.S. persons, raises privacy concerns. Read More
 

Microsoft legal action cramping other hacking campaigns, Kaspersky says
Microsoft's seizure of domains from a DNS service provider has also disrupted some state-sponsored cyberespionage campaigns, according to security vendor Kaspersky Lab. Read More
 

10 disturbing attacks at Black Hat USA 2014
Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more. Read More
 

Inside the changing role of the CISO
Compared to just a few years ago, CISOs now face a wide array of risks and responsibilities that have significantly increased the complexity of their role. Read More
 

Are digital retailers focusing their security in the wrong place?
Digital retailers spend the lion's share of their IT security budget on networks, but experts say they'd be better off focusing elsewhere. Read More
 


WEBCAST: VMware

Introducing Cloud-Based Disaster Recovery From VMware
VMware is excited to introduce vCloud Hybrid Service – Disaster Recovery, a recovery-as-a-service (RaaS) offering built on VMware vSphere. The service offers a simple, automated process for replicating and recovering critical applications and data in a warm standby environment. Learn more

Bugcrowd adds 'flex' pricing model to bug-bounty programs
  Idea is to get security researchers to vie to find unknown vulnerabilities in software. Read More
 

OpenSSL Project publishes roadmap to counter criticism
The OpenSSL Project is planning a number of changes to ensure its security component, used across millions of computers across the Internet, is in tip-top shape. Read More
 

Microsoft admits technical error in IP takeover, but No-IP still down
Microsoft admitted Tuesday it made a technical error after it commandeered part of an Internet service's network in order to shut down a botnet, but the Nevada-based company says its services are still down. Read More
 

EFF sues the NSA to disclose use of software security flaws
The Electronic Frontier Foundation, a prominent digital privacy rights group, has filed a lawsuit against the U.S. National Security Agency to get it to specify the extent to which it might exploit software security flaws. Read More
 

FBI, CIA can query US communications collected by NSA
The FBI and CIA can also query the content of U.S. residents' electronic communications that the National Security Agency inadvertently collects when targeting foreign terrorism suspects, an intelligence official said. Read More
 

New malware program hooks into networking APIs to steal banking data
There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information. Read More
 

Gartner to IT security pros: Get ready for 'digital business'
  Gartner analyst explains why 'car crash' would be handled as a 'digital business'. Read More
 

 

GIVEAWAYS:

July's giveaways are here. Enter now for your chance to win!
 
App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter now!

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL
The clearest, simplest tutorial on writing effective SQL queries. Five will win. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04
 

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.