Tuesday, September 9, 2014

Hackers launch Apple ID phishing campaign playing on iCloud security worries

11 open source security tools catching fire on GitHub | Hackers launch Apple ID phishing campaign playing on iCloud security worries

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Just five gangs in Nigeria are behind most Craigslist buyer scams
Five Nigerian criminal gangs are behind most scams targeting sellers on Craigslist, and they've taken new measures to make their swindles appear legitimate, according to a new study. Read More


WHITE PAPER: Samsung

Secure Mobility Myth Buster
As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions. This document reviews the more common myths and misconceptions about secure mobility and EMM. Learn More

WHITE PAPER: Code 42

Five Must-Haves for Enterprise File Sync and Flexibility
Valuable enterprise data lives on endpoint devices, changes constantly and flows freely throughout organizations. But what happens when that data is inappropriately shared or breached because a business user adopts an unsafe consumer-based sync and share tool? Learn More

11 open source security tools catching fire on GitHub
Malware analysis, penetration testing, computer forensics -- GitHub hosts a number of compelling tools for securing computing environments of all sizes. Read More

Hackers launch Apple ID phishing campaign playing on iCloud security worries
The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign. Read More

After attacks, Kenya takes 100 government websites offline
After a month of embarrassing hacking attacks against government social media accounts and websites, the Kenya ICT Authority has taken about a hundred government sites offline for development and centralized hosting. Read More

NIST issues Best Practices on how to best use Secure Shell software
NIST's drafted recommendations warn sys admins of pitfalls in SSH use that give attackers the advantage. Read More

Three security practices that IoT will disrupt
I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by now. Read More


WHITE PAPER: Citrix

Deployment Best Practices to Deliver Any App to Mobile Users
Access to corporate applications allows mobile workers to be more productive, responsive and informed when serving customers or collaborating with peers, helping to achieve business goals such as improved customer satisfaction and faster time to market for new products and services. Learn more

Why giving mobile apps banking info isn't as risky as it seems
Big name apps like Uber and Venmo may be putting some users ill at ease by requiring payment card information in order to function, but experts say the risk is relatively low. Read More

HyTrust, Intel team to lock down VMware virtual machines
HyTrust, in a partnership with Intel, today said its cloud security software used with VMware-based virtual machines can now ensure those VMs will only run in designated trusted locations based on what's called new "boundary controls." Read More

Popular Android apps fail basic security tests, putting privacy at risk
Instagram, Grindr, OkCupid and many other Android applications fail to take basic precautions to protect their users' data, putting their privacy at risk, according to new study. Read More

The hacker 'skills gap' may be more of a strategy gap
It sure feels like the bad guys are winning. Read More

Cyberespionage group starts using new Mac OS X backdoor program
A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems. Read More

Profits, falling crimeware prices driving Chinese cybercrime
Falling prices on services and feature-rich toolkits is fueling thriving online marketplaces in China where criminals gather to buy the wares used in cyber-attacks against businesses and consumers. Read More


DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment