Tuesday, March 3, 2015

NSA authorization to collect bulk phone data extended to June 1

  NSA authorization to collect bulk phone data extended to June 1 | D-Link remote access vulnerabilities remain unpatched

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Finnish companies join forces to build secure OS for smartphones and tablets
A new version of Jolla's Sailfish OS is getting locked down with the help of SSH Read More
 


WHITE PAPER: HP

Collaborative Defense
Hackers are no longer lone wolves. They specialize in the narrow abilities needed to mount a cyber attack, and they collaborate in a cyber crime ecosystem that co-ordinates their activities to penetrate defenses and find and steal information. So we must also collaborate to defend our businesses. Learn more >>

WHITE PAPER: HP

Quantifying the Business
This whitepaper applies the experience of real HP TippingPoint customers to quantify these saving and demonstrate pay back in the first year. Learn: • The cost savings investigating and remediating cyber attacks • The saved cost of e-commerce web site downtime • How TippingPoint intrusion prevention system differs from other approaches Learn more >>

NSA authorization to collect bulk phone data extended to June 1
The approval will be the last before the relevant statute in the Patriot Act comes up for renewal Read More
 

D-Link remote access vulnerabilities remain unpatched
The worst one could allow a remote attacker to change DNS settings Read More
 

How a Blu-ray disc could install malware on your computer
A video will start playing, but something strange could be happening as well Read More
 

Hackers exploit router flaws in unusual pharming attack
  The attack changes the DNS settings of a router using default login credentials, Proofpoint said Read More
 


WHITE PAPER: HP

SANS Survey on Network Security Results
This study details a survey of 439 IT security and network professionals conducted by the SANS Institute. It explores use of IPS within respondents' organizations and their plans for future NGIPS. Read the results to understand how contemporaries are using IPS and how NGIPS is evolving to counter today's cyber threat. Learn More

Some Bitdefender products break HTTPS certificate revocation
This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic Read More
 

Mozilla scrubs Superfish certificate from Firefox
The hotfix detects whether Superfish has been removed, and if so, removes the Superfish root from Firefox. Read More
 

DoCoMo app shares SIM credentials with offline devices
  Smartphones with new Qualcomm chipsets could send SIM subscriber identities to multiple offline devices Read More
 

Personal data on 50,000 Uber drivers exposed in breach
  An investigation revealed a database had been accessed last May Read More
 

 

BECOME AN ITWORLD INSIDER

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- R programming beginner's guide
- IT Resume Makeover: Emphasize your 'X factor'
- 4 open source monitoring tools that deserve a look
- Free and cheap ways to learn about IT security
- PowerShell for beginners: Scripts and loops
- Six Ted talks that can change your career

What are you waiting for? Sign up today!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.