Tuesday, February 3, 2015

BMW cars found vulnerable in Connected Drive hack

BMW cars found vulnerable in Connected Drive hack | Top password managers compared

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


INSIDER
Breaches are a personal nightmare for corporate security pros
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards. Read More


WHITE PAPER: Solutionary

The MSSP Advantage
Read this Whitepaper that reveals an IDG study that shows how leading edge organizations are turning increasingly to managed security service providers (MSSPs) to keep both hackers and malware at bay. Learn More

WHITE PAPER: Level 3 Communications

Secure Data Services: Breaking Down the Enterprise IT Silo
This paper explores how NSPs can truly help their customers break down their silo mentality with an alternative approach to bundled services that is aligned to the core business interests of their customers. The benefits of this approach – to both NSP and customer – are also explored. Learn More

BMW cars found vulnerable in Connected Drive hack
An attacker could mimic a BMW server and remotely unlock a car. Read More

Top password managers compared
There's a password manager out there for you -- whatever your level of paranoia. Read More

Flash Player plagued by third zero-day flaw in a month, updates coming
Users are being targeted via mass malvertising attacks again, researchers warn Read More

9 common security awareness mistakes (and how to fix them)
Most of the security mistakes that workers make fall into the "careless or clueless" category. Better security awareness could cut the risk to most organizations by 45% to 70%. But that takes effective, regular training. Read More

DDOS attack size up 50-fold over past decade
The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication.The largest reported attack last year was 400 gigabits per second, compared to just 8 Gbps in 2004 -- and 100 Gpbs in 2010."The growth is not straight line," said Gary Sockrider, solutions architect at Burlington, Mass.-based Arbor Networks, Inc. and the author of the report. "It's more of a hockey stick."By comparison, the total bandwidth of the entire Internet grew 42-fold over the same period, according to data from Cisco, from an average of 570 Gbps in 2004 to 24,000 Gbps in 2014.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Akamai

Overcoming the Big Disconnect in Web Security
According to a new CSO survey, companies know hackers are targeting them, but too few have plans in place for fighting back. Here are the steps you need to take to eliminate the disconnect. Learn More

LightCyber rolls out new features for endpoint malware detection platform
LightCyber, another security startup with the roots in the Israeli military, has opened its doors in the U.S. and is announcing new products and features to make its mark in the crowded field of endpoint detection and remediation.The company's Magna Breach Detection Platform monitors and analyzes network traffic as well as activity on Windows endpoints in search of anomalous behavior that they can identify as malware.So far it's having pretty good success in North America, with about 40 customers signed up for its appliances, software and services. It opened shop in Los Altos, Calif., last year, augmenting its headquarters that was already established in Ramat Gan, Israel, according to the company's chief marketing officer Jason Matlof.To read this article in full or to leave a comment, please click here Read More

Security concerns cloud federal data center overhaul
Government CIOs are in the midst of an ambitious effort to modernize their data centers, but consolidation, virtualization and the cloud bring fresh security challenges. Read More

Google will motivate bug hunters to keep probing its products with research grants
The company seeks new ways to incentivize researchers as bugs become harder to find Read More

Hackers tapped into Syrian opposition's battle plans
Victims were tricked into a photo swap on Skype, which planted malware on computers, said FireEye Read More

The Pirate Bay comes back from the dead after two-month outage
The infamous torrent site returns after being offline for two months. Read More

BOOK GIVEAWAY: Enter to win a copy of 'Security in Computing, 5th Edition'
We've got 5 copies to give to some lucky readers. Enter for your chance to win! Read More


FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.