Tuesday, February 4, 2014

Prominent cryptographer victim of malware attack related to Belgacom breach

Prominent cryptographer victim of malware attack related to Belgacom breach | Hackers use a trick to deliver Zeus banking malware

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


German federal prosecutor considers formal NSA investigation
Germany's federal prosecutor is considering if there is enough evidence to warrant a formal, criminal investigation into the German government's alleged involvement in the U.S. National Security Agency (NSA) data collection program, a spokeswoman said Monday. Read More


RESOURCE COMPLIMENTS OF: Prolexic

OVUM White Paper - Delivering effective DDoS protection
In new white paper, OVUM Principal Analyst, Security, Andrew Kellett states that not all DDoS mitigation solutions are capable of providing the required level of protection for an organization. Learn how to evaluate mitigation providers against 10 enterprise criteria. Download OVUM White Paper: "Delivering effective DDoS protection"

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference – CSO40 Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/

Prominent cryptographer victim of malware attack related to Belgacom breach
Belgian cryptographer Jean-Jacques Quisquater had his personal computer infected with malware as the result of a targeted attack that's believed to be related to a security breach discovered last year at Belgian telecommunications group Belgacom. According to him, other cryptographers have also been targeted by the same attackers. Read More

Hackers use a trick to deliver Zeus banking malware
Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details. Read More


WHITE PAPER: Citrix

The 10 "Must-Haves" for Secure Enterprise Mobility.
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Users should view this whitepaper as a mobile security framework for their enterprises and a checklist for evaluating enterprise mobility vendors. Download the whitepaper. Read now!

Unix: Tracking down ghost accounts
Are you confident that all the accounts you manage are still required and still current? Or might some of them be ghost accounts that you should have blocked five years ago? Read More

Mobile users at risk from lack of HTTPS use by mobile ad libraries, security researchers say
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks resulting from those vulnerabilities would be significantly lower if those libraries would use HTTPS, security researchers said. Read More

The top 5 security threats to watch for in 2014
The year's barely started, and we've already had enough data breaches at major retailers to make a barter economy seem like a good idea. Unfortunately there are yet more security threats to look forward to in 2014. Here are the biggest ones we anticipate. Read More


FEBRUARY BOOK GIVEAWAY:

Wheee! New books! We've got 5 copies of each of these new titles to give to some lucky ITworld readers. Enter today for your chance to win.

A Practical Guide to Fedora and Red Hat Enterprise Linux
This comprehensive guide, written by Linux expert and best-selling author Mark Sobell, brings together all the knowledge and real-world insights you need to master and succeed with today's versions of Fedora or Red Hat Enterprise Linux.

Development with the Force.com Platform: Building Business Applications in the Cloud, 3rd Edition
With Salesforce.com's Force.com platform, you can build and deploy powerful cloud-based enterprise applications faster than ever before. Now, Jason Ouellette gives you all the practical, technical guidance you need to make the most of the newest Force.com releases in your own custom cloud applications.

DON'T MISS...

Your new PC needs these 22 free programs

12 privacy-destroying technologies that should scare you

Sher-locked: 12 famous passwords used through the ages

Valuable blasts from the past: The 7 items most prized by computer collectors

Revenge is a dish best served electronically: 12 cautionary tales


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.