Thursday, November 20, 2014

Long-running Android botnet evolves, could pose threat to corporate networks

Long-running Android botnet evolves, could pose threat to corporate networks | Smartphone encryption – What does it mean to you?

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security. Read More


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: Box

2014 Aragon Research Globe for Mobile Content Management
Mobile devices are changing the way content is accessed, shared and managed. Aragon Research introduces its first Globe for mobile content management and evaluates 19 major MCM providers. View now

Long-running Android botnet evolves, could pose threat to corporate networks
The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said. Read More

Smartphone encryption – What does it mean to you?
Why are legislators considering going to Congress for access to our cell phones? Read More

EFF, Mozilla back new certificate authority that will offer free SSL certificates
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet. Read More

PCI Council looks for ways to stem data breaches after bad year
The last year has been bad, but the technology is there to stop nearly all data breaches, experts said. Read More


WHITE PAPER: Kaseya

5 Ways to Reduce the Risk of Cybercrime to Your Business
Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more

TRUSTe deceived consumers about recertification program, FTC says
The agency and privacy certification provider reach a settlement on its recertification promises. Read More

10 security mistakes that will get you fired
From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick. Read More

BitTorrent dismisses security concerns raised about its Sync app
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said. Read More

Microsoft patches Kerberos vulnerability with emergency update
Microsoft released an out-of-band patch on Tuesday, addressing a vulnerability in Kerberos KBC, a component that handles authentication on local networks. The patch was supposed to have been released earlier this month, but Microsoft withheld it due to QA concerns. Read More

US Senate fails to move forward on NSA reform bill
The vote on the USA Freedom Act could mean NSA reform is dead until next year. Read More


NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 8 tech buzzwords that you need to know

- Free and cheap ways to learn about network administration

- IT resumes: Lies, half-truths and embellishments

SALARY SURVEY

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.