Tuesday, September 30, 2014

Two scenarios that would make OS X vulnerable to the Shellshock bug

The dangers of dark data and how to minimize your exposure | Two scenarios that would make OS X vulnerable to the Shellshock bug

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: Understanding Big Data Scalability (eBook)
Five will win. Enter the drawing today! Read More


: Red Hat

Red Hat Accelerated Mentoring: OpenStack Architecture
Red Hat Enterprise Linux OpenStack Platform permits heterogeneous environments supporting cloud deployments to integreate with the open standards based OpenStack Technology. Read this white paper to learn more. Learn more >>

WHITE PAPER: Polycom

The Role of the User Experience in Video Conferencing
While video conferencing can offer significant, measurable benefits to companies and their employees, all video conferencing solutions are not alike. To ensure adoption, a successful deployment and implementation--and to maximize (ROI)--managers must choose their video conferencing tools wisely, matching the right technology to the right use cases. Learn more >>

The dangers of dark data and how to minimize your exposure
Untapped and neglected, dark data can pose security risks should it fall into the wrong hands, or range outside its owner's control. Read More

Two scenarios that would make OS X vulnerable to the Shellshock bug
Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system. Read More

Next-generation video surveillance comes to Maricopa County Sheriff's Office
Video surveillance systems in its jails couldn't keep up with the growth -- or the times. Read More

What corporate security pros should do about Shellshock/Bash bug
Bottom line: Patch important affected machines as soon as possible. Read More

Virtualization, cloud complicate insider threats for federal CIOs
The expansion and blurring of the traditional government network environment require federal IT officials to rethink contracting processes and embrace real-time security monitoring. Read More


WHITE PAPER: Polycom

Remote Collaboration Challenges and Strategies to Overcome
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges--and discover the strategies they deploy to overcome them. Learn more >>

Fiberlink wipes one smartphone or tablet every three minutes
A study of devices managed by Fiberlink's MaaS360 showed that 450 mobile devices are wiped every day as part of a security policy. Read More

Malvertising campaign delivers digitally signed CryptoWall ransomware
The cybercriminals behind the CryptoWall ransomware threat have stepped up their game and are digitally signing new samples before using them in attacks in an attempt to bypass antivirus detection. Read More

Facebook's new ad sales plan raises hackles in Germany
As Facebook began rolling out a global advertising network on Monday that will capitalize on all it knows from tracking users across the web, German consumer organizations immediately raised their voices in protest. Read More

Apple says most Mac users are safe from 'Shellshock' Bash bug, promises quick fix
Yes, recent versions of Mac OS X are vulnerable to the critical "Shellshock" Bash bug revealed earlier this week, including OS X Mavericks--but don't sweat it unless you're doing ninja-level Unix tricks with shell commands already. Read More

Safe from Shellshock: How to protect your home computer from the Bash shell bug
The 'Shellshock' Bash shell bug is a big deal, but it's relatively easy to keep your home PC safe. Read More


DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Sams Teach Yourself JavaScript in 24 Hours (Learning Lab)
Quickly teach yourself to create dynamic, interactive Web pages with this interactive online course, featuring step-by-step lessons, expert video instruction, live code editing, and interactive quizzes. Enter now!

Understanding Big Data Scalability (eBook)
Two start-to-finish case studies walk through planning and implementation, offering practical, actionable insights for every technical professional who must scale a database tier for today's most common high-volume big data applications. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.