Tuesday, November 25, 2014

Five security developments we can be thankful for in 2014

  Why is Microsoft updating Windows PCs for a security bug on the server? | Attackers trading malware for privilege

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Five security developments we can be thankful for in 2014
The end of the year usually brings with it the annual tradition of consulting the InfoSec "crystal ball" to create a list of prognostications of doom for the coming year. Let's start a new tradition of looking back at the things that brought improvements in the past year. Read More
 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

In this Issue


WHITE PAPER: Kaseya

5 Ways to Reduce the Risk of Cybercrime to Your Business
Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more

Why is Microsoft updating Windows PCs for a security bug on the server?
The Kerberos vulnerability is only in Windows Server, but Windows PCs are getting extra security fixes. Read More
 

Attackers trading malware for privilege
Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts. Read More
 

 

INSIDER
Apple Pay's security pros and cons
Taking credit card numbers out of transactions is a helpful step that could alleviate the risk of giant data breaches, but that doesn't mean the bad guys are going to give up and become accountants. Read More

 

Next year's DDOS attacks to come from Vietnam, India and Indonesia
Vietnam, India and Indonesia are viewed as potential botnet sources in 2015, according to a new report from Black Lotus Communications. Read More
 

Critical XSS flaws patched in WordPress and popular plug-in
The vulnerabilities could allow attackers to create administrator accounts and take control of websites. Read More
 

FTC gets federal court to shut down $120M tech support scam
FTC says scammers use bogus software and the deceptive telemarketing operations to roll over victims. Read More
 

How CSOs can help CIOs talk security to the board
CIOs aren't necessarily security experts, but that doesn't mean they can't speak intelligently to the company's board of directors. The key is getting a little coaching from the CSO about how and what to communicate. Read More
 


: WhiteHat Security, Inc.
 
Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

Citadel malware now targets password management applications
A new Citadel configuration steals the master keys for two password managers and a secure authentication program. Read More
 

Activists release Detekt tool that finds surveillance malware
The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists Read More
 

USB Armory is the Swiss army knife of security devices
  A USB-stick computer built around a processor with strong security capabilities. Read More
 

NSA chief says cyberattacks on industrial systems are his top concern
Nation states and groups are engaging in risky behavior in the absence of cyberspace rules. Read More
 

NotCompable sets new standards for mobile botnet sophistication
New variant uses P2P, reminiscent of Conficker. Read More
 

BOOK GIVEAWAY: Responsive Mobile Design: Designing for Every Device
Learn how to create Web designs that work on any device. We've got 5 copies to give to some lucky readers. Enter now for your chance to win! Read More
 

Traces of Regin malware may date back to 2006
Regin was known about for some time by the security industry, according to Symantec Read More
 

 

NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 8 tech buzzwords that you need to know
 

- Free and cheap ways to learn about network administration
 

- IT resumes: Lies, half-truths and embellishments

SALARY SURVEY

What's your earning power? How does it compare with your peers'?
 
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.