Tuesday, October 21, 2014

Apple's iCloud targeted in man-in-the-middle attack in China

Apple's iCloud targeted in man-in-the-middle attack in China | Browser makers spell out anti-POODLE plans

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Hordes of cable modems, Web cams, printers can become DDoS launch platforms
Advisory: Millions of badly configured, maintained devices are ripe for the picking. Read More


WHITE PAPER: SevenTablets

Mitigating Your Biggest Mobile Strategy Risk: User Rejection
Did you know eight out of ten apps are downloaded, used once, and deleted? User rejection is the greatest risk to your mobile strategy. This white paper outlines how to mitigate this risk by planning a user-friendly experience that balances responsiveness, intuitiveness, and functionality. Learn More

WEBCAST: Sourcefire, now part of Cisco

Threat Intelligence In Incident Response/Management
In this webinar, hear from two experts on how you can empower your security team to quickly recover from and proactively defend against attacks while increasing the value of your existing security investment. Learn more >>

Apple's iCloud targeted in man-in-the-middle attack in China
Yahoo has also been facing a similar attack in China. Read More

Browser makers spell out anti-POODLE plans
Mozilla to disable SSL 3.0 in Firefox 34, but Google and Microsoft haven't set timelines for Chrome or IE. Read More

Dropbox used for convincing phishing attack
Dropbox was quick to remove the bogus login page, Symantec said, Read More

Tor-based anonymizing router gets pulled from Kickstarter for rules violations
Kickstarter alleges that the Anonabox project's creator misled contributors, thus breaking the crowdfunding service's rules. Read More

Obama orders chip-and-PIN in government credit cards
The move could push retailers and banks to better secure their own cards and systems. Read More

Why you really shouldn't worry about in-store beacons
Beacons don't automatically track your location or movement, but they do communicate with apps that could collect sensitive data. Read More


WEBCAST: IBM Corporation

Reinventing the analytics experience on the cloud
IBM Watson Analytics brings advanced analytical capabilities to business analysts who can conduct the kind of analysis that has been limited to highly skilled practitioners such as statisticians, data miners, and data scientists. Learn More

Researcher creates proof-of-concept worm for network-attached storage devices
Infecting NAS devices with malware can be very valuable for attackers, a researcher said. Read More

FBI warns of cyberattacks linked to China
The FBI and security companies have observed 'recent intrusions'. Read More

Intel preps new technology to secure credit card transactions
Intel's Data Protection Technology for Transactions works with Apple Pay. Read More

15 of the scariest things hacked
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister. Read More

Once the FBI has a backdoor into your smartphone, everyone does
FBI director James Comey believes tech companies should be forced to insert back doors to bypass encryption on smartphones. But experts say once that happen,s security is moot and anyone can breach your privacy. Read More

INSIDER
New tech transforms transparency into privacy
Preserving privacy by keeping information secret isn't working. MIT researchers have another solution. Read More

All-in-one printers can be used to control infected air-gapped systems from far away
Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner. Read More


ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.