Thursday, November 6, 2014

Facebook reports a 24 percent rise in government requests for user data

  Facebook reports a 24 percent rise in government requests for user data | Seeking security, American Express aims to swap card numbers with tokens

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


6 things we learned from this year's security breaches
2014 is well on its way to replace 2013 as the highest year on record for exposed records. Read More
 


WHITE PAPER: VeriSign

Turn to the Cloud for Website Availability & Protection
Domain name system (DNS) protection is a key component to a comprehensive security plan. One of the most efficient ways to bolster DNS security is to deploy a cloud-based DNS infrastructure. This DNS Security eGuide, will review top cyber threats to DNS and identify five top reasons, along with guidance, on selecting a managed DNS service provider. Learn More>>

: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

Facebook reports a 24 percent rise in government requests for user data
The majority of requests targeted users in the U.S. Read More
 

Seeking security, American Express aims to swap card numbers with tokens
The company's token service allows merchants and mobile payment providers to stop working with sensitive payment card numbers. Read More
 

Flaw in Visa cards could ring up a very large fraud
Visa's contactless payment cards will approve very large transactions in currencies other than the British pound due to a flaw in a protocol, U.K. researchers contend. They concluded it would be possible for criminals to turn a mobile phone into a point-of-sale terminal and pre-set a large amount of money to be transferred from a payment card even if it was in someone's pocket. The type of card, known as EMV after its developers Europay, MasterCard and Visa, uses a microchip to facilitate transactions rather than a magnetic stripe. EMV will soon be used widely across the U.S. Some types of EMV cards are configured for "contactless" payments, where a customer doesn't have to enter a PIN for smaller transactions that in the U.K. are limited to £20 (US$32).To read this article in full or to leave a comment, please click here Read More
 

Startup promises to secure data centers, clouds workload by workload
Illumio, a well-funded startup with an impressive list of customers, is wheeling out a data-center/cloud security platform that imposes individual security policies on every workload. Read More
 

Schools keep track of students' online behavior, but do parents even know?
While schools have always collected data on students, the digital era has expanded it to the point where privacy experts say it is now out of control - and many parents are not even aware of it. Read More
 


WHITE PAPER: Akamai

Beyond the Firewall: Protect and Performance
Threats to web and network resources are increasingly sophisticated and costly. Potential sources of threats have dramatically increased as cybercrime has evolved into big business. This white paper will look at escalating attack concerns, how to address the challenges as well as looking at building a cloud-based defense strategy. Learn More

Google releases tool to test apps, devices for SSL/TLS weaknesses
The tool simulates man-in-the-middle attacks to detect SSL/TLS vulnerabilities and implementation issues. Read More
 

BlackEnergy cyberespionage group targets Linux systems and Cisco routers
Kaspersky Lab researchers found BlackEnergy malware modules designed for ARM and MIPS systems running Linux. Read More
 

Computer scientists say meme research doesn't threaten free speech
Five of the nation's top computing research organizations defended a research grant to study how information goes viral, fending off claims that the government-funded effort could help create a 1984-type surveillance state. Read More
 

Apple security checks may miss iWorm malware
Gatekeeper and XProtect aren't entirely effective against iWorm, according to new research. Read More
 

Microsoft's top legal gun decries privacy "arms race"
Brad Smith is ready for arms-control talks as tech companies and law enforcement fight a running battle on privacy. Read More
 

 

NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

SALARY SURVEY

What's your earning power? How does it compare with your peers'?
 
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.