Tuesday, August 5, 2014

Is your Dropcam live feed being watched by someone else?

Is your Dropcam live feed being watched by someone else? | Mozilla warns of leaky developer network database

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Internet of things devices contain high number of vulnerabilities, study finds
A security audit of 10 popular Internet-connected devices -- components of the so-called "Internet of things" -- identified an alarmingly high number of vulnerabilities. Read More


RESOURCE COMPLIMENTS OF: CSO Perspective

Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September 16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and focused on "Defending Against the Pervasive Attacker," you'll have the opportunity to connect with an extensive network of visionary CSOs, CIOs and business experts. Register now.

WEBCAST: VMware | IBM

3 Virtual Desktop Must-haves
Employees today expect to take their work anywhere and on any device. This BYOD mindset poses a dilemma for organizations that want to create a flexible workplace while ensuring security, control, and lower costs. IBM and VMware collaboratively provide a dynamic VDI solution. View Now

Is your Dropcam live feed being watched by someone else?
Dropcam, the popular video monitoring camera, bills itself as "super simple security." But a pair of researchers plan to show at the Defcon hacking conference later this week how having a Dropcam could get a lot more complicated. Read More

Mozilla warns of leaky developer network database
Mozilla's website for developers leaked email addresses and encrypted passwords of registered users for about a month due to a database error, the organization said Friday. Read More

Cisco patches traffic snooping flaw in operating systems used by its networking gear
Cisco Systems said attackers could disrupt or intercept traffic in many of its networking products unless a new security update is applied to the software they run. Read More

5 great free VPNs for Chrome, Firefox, mobile, and beyond
If you're worried about your privacy online, check out these five great free VPNs. They'll keep you safe from prying eyes and are a cinch to use. Read More


WEBCAST: IBM Corporation

Desktop virtualization market trends
You've probably heard about desktop virtualization -- and some of its benefits – things like tighter security, streamlined management and lower costs. But would desktop virtualization be right for your company? Could you expect to reap all those benefits? And how quickly would you gain a return on investment? View Now

CISOs still struggle for respect from peers
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows. Read More

IBM buys access control and identity management firm CrossIdeas
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday. Read More

Hexadite's Automated Incident Response Solution narrows the gap between detection and response
Many organizations are in desperate need of a way to respond to at least some of their alerts in an automated way in order to free up their highly skilled people to address the most serious and complex incidents. This is a role that the new cyber security company Hexadite wants to fill. Read More

Security Manager's Journal: A ransomware flop, thanks to security awareness
Sometimes when they do the wrong thing, you can't really blame them. And sometimes you get evidence that employees are really paying attention when you tell them not to do things that are likely to lead to trouble. Read More


SURVEY:

Got 10 minutes? Tell us about your tech interests and you could win an iPad mini
ITworld is conducting its annual survey about your involvement with and interest in various technology categories, and invites you to participate. Survey participants will have the opportunity to win an iPad mini and sign up to receive a report outlining survey highlights. Take the survey now!

GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.