Tuesday, December 23, 2014

6 aging protocols that could cripple the Internet

6 aging protocols that could cripple the Internet | After FBI blames North Korea for Sony attack, now what?

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of "Ubuntu Unleashed 2015 Edition"
We've got 5 copies to give to some lucky readers. Enter the drawing now! Read More


WHITE PAPER: BMC Software

Intelligent Compliance: Trust in the Data Center
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center. Learn More

In this Issue


: Samsung

Security? Leave it to Me! Samsung KNOX
Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more. Learn More

6 aging protocols that could cripple the Internet
From BGP to SSL, several Internet protocols are no match for today's malicious hackers -- and should be replaced. Read More

After FBI blames North Korea for Sony attack, now what?
Expect copy-cat attacks and threats, say security experts Read More

New ransomware avoids hitting the same victim twice
A new strain of ransomware, OphionLocker, generates a unique hardware identifier for each new infected machine so that it can avoid hitting the same victim twice, according to new research from KnowBe4, a Florida-based security awareness training firm."This we have not seen before," said KnowBe4 CEO Stu Sjouwerman, who suggested that the crooks have a brand reputation to maintain.If the ransomware attacked the same machine twice, re-encrypting already encrypted files, they might not be able to recover the data."The ransomware people are very focused on their customer service," he said. "It's in their best interest that word get out that if you pay, you will get your files back."To read this article in full or to leave a comment, please click here Read More

New England security group shares threat intelligence, strives to bolster region as cybersecurity mecca
Core members of the Advanced Cyber Security Center meet twice monthly to discuss the latest threats. Read More

This Linux grinch could put a hole in your security stocking
A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.Named after the proverbially grumpy Dr. Seuss character, the grinch vulnerability could affect all Linux systems, potentially providing attackers with unfettered root access, according to security service provider Alert Logic, which introduced grinch to the world Tuesday via a blog post.Grinch could be as severe as the Shellshock Linux shell flaw that roiled the Internet in September, the company warned.To read this article in full or to leave a comment, please click here Read More

Support for security tech tops iSoc's Africa plan for 2015
It also will continue to help develop traffic exchange and DNS programs Read More

The four Mac security options everyone should know
By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so. Topher Kessler explains. Read More


WHITE PAPER: SafeNet Inc.

The Challenges of Cloud Information Governance
The purpose of this research is to focus on how organizations are putting confidential information at risk in the cloud because of the lack of appropriate governance policies and security practices. Learn More

Organized criminals targeting individual iPhone, Android users
A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies. Read More

Worst security breaches of the year 2014: Sony tops the list
The breach of Sony Pictures Entertainment is clearly the biggest data breach of 2014, but theft of credit card numbers from retailers dominated the biggest cyber thefts. Read More

Sony looking for ways to distribute 'The Interview' online
Theater owners were concerned about terror threats Read More

Staples says hack may have compromised 1 million-plus payment cards
The attack hit stores in 35 states from California to Connecticut Read More

North Korea wants joint probe into Sony hack, warns of consequences if not
The country denies FBI allegations that it was responsible for a hack into Sony Pictures Read More

US rejects North Korea offer to investigate Sony hack, reaches out to China
US stands firm in its allegations that North Korea was responsible for hack Read More

Sony hack was 'cyber vandalism,' not act of war, says Obama
Sony hack was cyber vandalism, says president Read More

Support for security tech tops iSoc's Africa plan for 2015
It also will continue to help develop traffic exchange and DNS programs Read More


BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.