Tuesday, July 8, 2014

Mobile phones and other electronic devices under higher scrutiny at airports

Mobile phones and other electronic devices under higher scrutiny at airports | Ruby on Rails gets patches for SQL injection vulnerabilities

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Android bug lets apps make rogue phone calls
A vulnerability present in most Android devices allows apps to initiate unauthorized phone calls, disrupt ongoing calls and execute special codes that can trigger other rogue actions. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Boston

IT Roadmap Boston – 7/17 Register Now!
IT Roadmap is the one day, cost free, professional-level conference and expo that's full of job-ready solutions you can put to work now. IT Roadmap Boston is the place where IT leaders come to explore high-priority IT issues -- and learn how to meet today's requirements for anytime, anywhere business interactions. Click to continue

WEBCAST: CA Technologies

The End of Data Protection As We Know It.
A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

Mobile phones and other electronic devices under higher scrutiny at airports
The U.S. Transportation Security Administration has said it may ask air travelers headed to the U.S. on direct flights to power up some electronic devices, including cell phones, as part of enhanced security measures at certain airports abroad. Read More

Ruby on Rails gets patches for SQL injection vulnerabilities
Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites. Read More

Big data security analytics mantra: Collect and analyze everything
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change. Read More

French police question three over bitcoin website
French police have questioned three people in connection with a Bitcoin exchange that, police say, handled 2,750 illicit transactions. Read More

Australian teen accepts police caution to avoid hacking charge
An Australian teenager has accepted a caution from police rather than face charges for discovering a vulnerability in the website of one of the country's public transport authorities late last year. Read More


WHITE PAPER: Gravitant, Inc.

Addressing Common Challenges of Cloud
Cloud promises dramatic cost savings and greater agility. But, like any new technology, cloud also brings new complexities. Learn how Gravitant cloudMatrix brokerage solution can help you manage the complexity and take a practical path to cloud. Learn More

Encrypted instant messaging project seeks to obscure metadata
Security researchers have a working prototype of an instant messaging application that aims to thoroughly obscure and scrub evidence that two parties have been chatting. Read More

Attack on Dailymotion redirected visitors to exploits
Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware. Read More

Secret code indicates NSA tracks users of privacy tools, report says
A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source. Read More

Dimension Data to expand Earthwave security services worldwide
Dimension Data plans to expand worldwide a managed security service offering it brought under its wing with the acquisition of Sydney-based Earthwave last year. Read More

Privacy group files FTC complaint over Facebook's 'emotional contagion' study
Facebook "purposefully messed with people's minds" in a "secretive and non-consensual" study on nearly 700,000 users whose emotions were intentionally manipulated when the company altered their news feeds for research purposes, a digital privacy rights group charges in a complaint filed with the U.S. Federal Trade Commission. Read More

How did Microsoft cause millions of No-IP.com domains to go down?
I know that Microsoft is a big company with lots of capabilities, but how did they take down all of No-IP.com's domains? From what I've read, that wasn't Microsoft's intention, and they were trying to combat Windows targeting malware, which is an admirable goal. Read More


GIVEAWAYS:

July's giveaways are here. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter now!

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL
The clearest, simplest tutorial on writing effective SQL queries. Five will win. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.