Tuesday, August 12, 2014

US court rules in favor of providing officials access to entire email account

OpenSSL, critical encryption component, gets nine software fixes | US court rules in favor of providing officials access to entire email account

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Mobile chips face lockdown to prevent hacks
Chip makers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones. Read More


WEBCAST: VMware | IBM

3 Virtual Desktop Must-haves
Employees today expect to take their work anywhere and on any device. This BYOD mindset poses a dilemma for organizations that want to create a flexible workplace while ensuring security, control, and lower costs. IBM and VMware collaboratively provide a dynamic VDI solution. View Now

In this Issue


WEBCAST: IBM Corporation

Desktop virtualization market trends
You've probably heard about desktop virtualization -- and some of its benefits – things like tighter security, streamlined management and lower costs. But would desktop virtualization be right for your company? Could you expect to reap all those benefits? And how quickly would you gain a return on investment? View Now

OpenSSL, critical encryption component, gets nine software fixes
Nine software fixes were released Wednesday for OpenSSL, a critical encryption component for exchanging data on the web, although none of the problems are as severe as the "Heartbleed" issue found in April. Read More

US court rules in favor of providing officials access to entire email account
The court in Washington, D.C., had earlier ruled that such a warrant would provide too much information to law enforcement. Read More

China's Xiaomi faces privacy hurdles ahead of international expansion
China's Xiaomi has apologized for causing privacy concerns, after the fledgling smartphone maker faced scrutiny over whether it can be trusted with users' personal data. Read More

IBM focuses on identity management with Lighthouse buy
IBM has purchased Lighthouse Security Group and plans to combine it with another recent acquisition to build a set of identity management software and services. Read More

CryptoLocker decrypted: Researchers reveal website that frees your files from ransomware
CryptoLocker is a nasty bit of ransomware that encrypts all your files unless you pay, but Fox-IT and FireEye can help you for free. Read More

Google lowers search ranking of websites that don't use encryption
Read More


: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...
Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >>

IE plays security catch-up, will block outdated Java plug-ins
An update to IE 8 through IE 11 next week will introduce a new warning when users try to run an outmoded Java ActiveX control. Read More

Cybersecurity should be professionalized
The time is ripe for professionalizing cybersecurity, according to Salve Regina University's Pell Center for International Relations and Public Policy. Read More

Oracle issues a virtual strongbox for enterprise encryption keys
Managing the keys of all your valuable resources, be they in the real world or the virtual, can be a hassle. Managing all the encryption keys for an entire enterprise is a harder challenge still. Read More

Carriers' remote control software continues to put some mobile devices at risk
Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come. Read More

PCI Security Council moves to boost service providers' credit card security
The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data. Read More

Seven ways DARPA is trying to kill the password
A seemingly constant stream of data breaches and this week's news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn't it time we dumped the user name and password? Read More


BOOK GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.