Thursday, May 29, 2014

Windows XP hack resurrects patches for retired OS

New security problems keep eBay on edge | Apple hints password reuse, not iCloud hack, at heart of locked iDevice ransom attacks

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Windows XP hack resurrects patches for retired OS
But security researcher who tried the hack isn't sure the fixes will actually keep exploits at bay. Read More


WHITE PAPER: Strategy Companion Corporation

The Benefits of Modern BI
This IDC white paper discusses the benefits of using BI tools that better address the needs of business users who perform analysis of data to inform decisions on a regular basis. The document compares modern offerings with traditional BI tools and discusses the benefits of self-service BI. Learn more

RESOURCE COMPLIMENTS OF: Network World Tech Tours

Wireless Infrastructure Seminar – Magnolia Hotel Houston
Attend and discover how your IT operations can take advantage of exciting new possibilities like cloud-based management, unified wired/wireless management, mobile unified communications, location and tracking services, and more. July 15, Magnolia Hotel Houston. Free seminar. Register Now.

New security problems keep eBay on edge
EBay's security team isn't going to get a break for a while. Read More

Apple hints password reuse, not iCloud hack, at heart of locked iDevice ransom attacks
A compromise of Apple's services is not to blame for the recent ransom lockouts via Find My iPhone, according to the company. Read More

New online banking Trojan program combines Zeus and Carberp features
The malware, dubbed Zberp, targets customers of 450 financial institutions, security researchers from Trusteer said. Read More

Cookies open Wordpress accounts to easy hijacking
If you use WordPress.com, don't log in to your account over an open Wi-Fi connection. You might regret it. Read More


WEBCAST: CA Technologies

The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

DARPA unveils hack-proof drone tech
In a claim reminiscent of Oracle Corp.'s 'unbreakable' marketing campaign of several years ago, the U.S. military has built what it calls a hack proof drone. Read More

Avast takes community forum offline after data breach
Prague-based antivirus company Avast said Monday it took its community forum offline after a data breach, but payment information was not compromised. Read More

Sophos adds file-level encryption to mobile security software
Sophos has added file-level encryption to its mobile security software so that users of Android or Apple iOS devices with Sophos Mobile Control 4.0 can share encrypted files. Read More

Spotify security breach hits just one user, but Android listeners encouraged to update app
Android users still have to download an update as a "precautionary measure." Read More

LAST CHANCE: Enter to win a copy of "Penetration Testing: A Hands-On Introduction to Hacking"
We have 5 copies to give some lucky ITworld readers. Enter today for your chance to win. The drawing ends May 31. Read More


SURVEY

Take ITworld's cloud survey and you could win $500
ITworld is conducting a brief survey regarding cloud computing initiatives, and we value your input. The survey will take you about 10 minutes to complete. And there's a reward! Respondents who complete the survey will be entered in a sweepstakes to win a $500 cash prize. Take the survey now!

BOOK GIVEAWAY:

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter today for your chance to win!

Penetration Testing: A Hands-On Introduction to Hacking
In "Penetration Testing," security researcher Georgia Weidman provides a survey of important skills that any aspiring pentester needs. Enter now!

jQuery and JavaScript Phrasebook
Get more done faster with jQuery and JavaScript! Brad Dayley's jQuery and JavaScript Phrasebook brings together 100+ instantly useful code snippets and idioms for performing a wide spectrum of common web application tasks. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.