Friday, October 31, 2014

Vulnerabilities found in more command-line tools, wget and tnftp get patches

What you should know about Lenovo's Motorola acquisition

Microsoft releases stopgap POODLE protection for Internet Explorer

ITworld Today
October 31, 2014

Vulnerabilities found in more command-line tools, wget and tnftp get patches

Flaws identified in wget and tnftp allow malicious servers to execute rogue commands on users' systems.

READ MORE
 

Issue highlights

1. What you should know about Lenovo's Motorola acquisition

2. Microsoft releases stopgap POODLE protection for Internet Explorer

3. Facebook sets up shop on the Tor anonymity network

4. Major banks ready their own mobile payment apps

5. 2014's biggest cloud deals (so far)

6. How to find out if your cell phone company is using perma-cookies to track your web activity

7. Getting started with TestFlight for iOS 8 developers

8. LAST CHANCE: Enter to win a copy of "Introduction to Agile Methods"

White Paper: Brother International Corp.

How Secure are your Web Meetings?

OmniJoin offers a full suite of security features to give you the peace of mind that your web meetings are as secure as you need them to be. Learn More>>

What you should know about Lenovo's Motorola acquisition

No products are being discontinued and Motorola's Android strategy remains intact. READ MORE

Microsoft releases stopgap POODLE protection for Internet Explorer

Next Patch Tuesday is Nov. 11, but a Fixit tool disables SSL 3.0 in the meantime. READ MORE

Facebook sets up shop on the Tor anonymity network

Facebook is also working on a mobile Tor site. READ MORE

Major banks ready their own mobile payment apps

The apps could prove a major competitor for Apple Pay and competing products. READ MORE

White Paper: Onapsis Inc.

How to Identify SAP Security Weak Spots

Threats affecting the SAP application layer are frequently overlooked, leaving systems exposed to malicious attacks. This SAP Insider highlights the security blinds spots and explains how automated assessment and audit solutions enable organizations to monitor, detect, prioritize, and prevent threats to close security gaps and mitigate risks. Learn More

2014's biggest cloud deals (so far)

The most important cloud acquisitions this year have one thing in common: OpenStack. READ MORE

How to find out if your cell phone company is using perma-cookies to track your web activity

AT&T, Verizon, and other wireless carriers may be subtly tracking your browsing activities. READ MORE

Getting started with TestFlight for iOS 8 developers

Apple is making user testing a bit easier with a new tool for iOS 8 developers called TestFlight. Here's what you need to know to get started. READ MORE

LAST CHANCE: Enter to win a copy of "Introduction to Agile Methods"

We've got 5 copies to give to some lucky readers. But hurry! Today is the last day to enter. READ MORE

White Paper: NetBrain Technologies

A Fully Dynamic Network Mapping Solution

Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.