Tuesday, July 2, 2013

Two malware programs help each other stay on computers

  Two malware programs help each other stay on computers | With BlackBerry reportedly hacked, is anything secure?
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Modified online children's privacy rules take effect in US
Some websites and mobile app developers are confused about how to comply with revised rules governing the online collection of personal information from children that took effect in the U.S. Monday, critics said. Read More


WEBCAST: Lexmark International

Faster Business Information. Better Business Collaboration
This webinar will teach you about smart process apps—a new category ofsoftware that makes collaborative processes more productive and flexible. Learn More

WHITE PAPER: Zetta

Cloud-based enterprise-grade online backup
If you're searching for a cloud storage provider, you're not alone. According to IDC, worldwide spending on public IT cloud is expected to approach $100 billion by 2016. Read Now

Two malware programs help each other stay on computers
Two malicious software programs that help each other stay on computers are proving difficult to remove. Read More

With BlackBerry reportedly hacked, is anything secure?
You have to wonder what level of encryption can withstand the brute-force computing power that is cheaply available today. Read More

All about Prism, Internet privacy and -- wait! -- squirrel!
Some people are deeply upset about the latest incursions into our privacy. But as a society, we don't seem to care all that much. Read More


WHITE PAPER: APC by Schneider Electric

Small Data Centers: Unique Challenges, Unique Opportunities
This whitepaper shares real-world trials and tribulations from data center managers in the trenches who deal with the unique challenges of running a data center in constrained space - as well as solutions. Vendor neutral. Learn More.

Encryption practices vary widely in the cloud, survey finds
A survey by Ponemon Institute of 4,205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the cloud, while taking various approaches to encrypting that data. Read More

Critical vulnerabilities found in single sign-on enterprise tool Atlassian Crowd
A critical vulnerability that could allow remote attackers to access sensitive enterprise log-in credentials and other data was fixed last week in Crowd, a single sign-on (SSO) and identity management tool used by large organizations to simplify access to their internal Web applications and services. Read More

Vulnerabilities found in code library used by encrypted phone call apps
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers from security firm Azimuth Security. Read More

 

DON'T MISS...

Buy Matthew Broderick's old movie computer and possibly impress Ally Sheedy

The technology of WarGames

The top technologies the CIA thinks are hot

MIT researchers can see through walls using 'Wi-Vi'

HTC One vs. Samsung Galaxy S4: 5 reasons to choose the One

BOOK GIVEAWAY

July's books are here! Enter today to win a copy of one of these new titles:

Arduino Workshop: A Hands-On Introduction with 65 Projects
Arduino Workshop takes you through 65 electronics projects that show the full range of cool stuff you can do with Arduino.

Drupal 7 Explained: Your Step-by-Step Guide
Master Drupal one easy step at a time, through a complete, real-world sample project.

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.