| Prominent cryptographer victim of malware attack related to Belgacom breach | Hackers use a trick to deliver Zeus banking malware | |||||||||
| ITworld Security Strategies | |||||||||
| German federal prosecutor considers formal NSA investigation RESOURCE COMPLIMENTS OF: Prolexic OVUM White Paper - Delivering effective DDoS protection In new white paper, OVUM Principal Analyst, Security, Andrew Kellett states that not all DDoS mitigation solutions are capable of providing the required level of protection for an organization. Learn how to evaluate mitigation providers against 10 enterprise criteria. Download OVUM White Paper: "Delivering effective DDoS protection" In this Issue
RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference Register now: CSO Magazine's CSO40 Security Confab On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference CSO40 Security Confab + Awards, being held March 31 April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/ Prominent cryptographer victim of malware attack related to Belgacom breach Hackers use a trick to deliver Zeus banking malware WHITE PAPER: Citrix The 10 "Must-Haves" for Secure Enterprise Mobility. While enterprise mobility brings opportunity for your users and organization, it also invites risk. Users should view this whitepaper as a mobile security framework for their enterprises and a checklist for evaluating enterprise mobility vendors. Download the whitepaper. Read now! Unix: Tracking down ghost accounts Mobile users at risk from lack of HTTPS use by mobile ad libraries, security researchers say The top 5 security threats to watch for in 2014 | |||||||||
FEBRUARY BOOK GIVEAWAY: Wheee! New books! We've got 5 copies of each of these new titles to give to some lucky ITworld readers. Enter today for your chance to win. DON'T MISS... Your new PC needs these 22 free programs 12 privacy-destroying technologies that should scare you Sher-locked: 12 famous passwords used through the ages Valuable blasts from the past: The 7 items most prized by computer collectors Revenge is a dish best served electronically: 12 cautionary tales | |||||||||
| Get more peer perspective online You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact ITworld, please send an e-mail to online@itworld.com. Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701. ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com. | |||||||||
E Tech News Today is technology news site founded in June 2013 reporting on all the latest news and information for the new Generation.
Tuesday, February 4, 2014
Prominent cryptographer victim of malware attack related to Belgacom breach
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.