Thursday, January 8, 2015

Macro-based malware is making a comeback, researchers warn

  Google unveils Windows 8.1 vulnerability, releases sample code | 8 smart devices at risk

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Macro-based malware is making a comeback, researchers warn
Attackers bypass defenses aganst macros with social engineering to install malware Read More
 


RESOURCE COMPLIMENTS OF: CIO Perspectives Conference

CIO Perspectives Dallas 2015 - Dates Announced
Join us for rich content, superior networking and event excellence, all in one day. The agenda is being crafted with the expert guidance of our Dallas CIO Advisory Board members, which includes CIOs from: Atmos Energy, Freeman, Kimberly-Clark, Santander, PrimeLending and more. Click to continue

WHITE PAPER: Akamai

Improving DDoS Protection
A recent survey reveals a significant disconnect between companies' concerns and their preparedness when it comes to potential DDoS attacks. This survey looks at the high level of concern about the impacts of DDoS attacks and the "always-on" solution to help identify and mitigate attacks. Learn More

Google unveils Windows 8.1 vulnerability, releases sample code
Google security researchers were being criticized on Monday for releasing details of a Windows 8.1 vulnerability together with proof-of-concept code that can be used to exploit it. Read More
 

8 smart devices at risk
The explosion of "smart" devices is bringing unprecedented convenience to consumers. But, as is the case with anything connected to the Internet, it also brings risks. Read More
 

AOL halts malicious ads served by its advertising platform
The malicious ads had been served since late October, according to security company Cyphort Read More
 

Microsoft reports variant of banking malware that targets German speakers
Microsoft says the malware is contained in spam messages that purport to contain important information Read More
 

Sony and Chase: Don't blame the CISO
No chief information security officer has ability to stop all attacks all the time. Read More
 


WHITE PAPER: Dell Software
 
Why Threat Intelligence is Critical for Next Gen Firewalls
A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice. Learn more!

6 social engineering tricks that can be avoided if you're careful
From phishing to dumpster diving, there's nothing a social engineer won't do Read More
 

IBM: Retail attacks down, but when they hit cyber-attackers get more
In 2014 unauthorized access via Secure Shell Brute Force was most trendy attack; Shellshock as well as POS malware such as BlackPOS, Dexter, vSkimmer, Alina and Citadel were also prevalent. Read More
 

Hackers steal $5M in bitcoin currency during Bitstamp exchange attack
Around 19,000 bitcoins were looted during the weekend hack, which targeted hot wallets Read More
 

Moonpig jeopardizes data of millions of customers through insecure API
The company failed to fix a security flaw reported over a year ago, a developer said Read More
 

Gogo inspects secure Web traffic in attempt to limit in-flight video streaming
In-flight Internet provider Gogo replaces the HTTPS certificates on sites like YouTube with self-signed ones Read More
 

 

FOR INSIDERS ONLY

Get exclusive access to premium content from CIO magazine, Computerworld, InfoWorld, Network World, CSO, and ITworld -- the best publications in the business.

- 7 tips for landing a job at a coding competition (ITworld)

- 6 simple tricks for protecting your passwords (Network World)

- Free and cheap ways to learn about network administration (Computerworld)
 
- IT Resume Makeover: Top 11 tips from 2014 (CIO)

- How-to: Get started with Nginx (InfoWorld)

- Incident response survival guide (CSO)

What are you waiting for? Sign up today!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.