2015년 2월 26일 목요일

DOJ offers $3 million reward for Gameover Zeus botnet suspect


ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter

Security pros: If you could go back in time... 
We asked some security experts about what they would change about how the Internet was built if they could go back to the early days of its development. Read More 
 

: Citrix Systems

Security Leadership Series: Security Strategies for Success 
Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more

RESOURCE COMPLIMENTS OF: ISC2

Get your skills certified by (ISC)2 to fight cyber threats 
As cyber threats continue to evolve and change, certified security and IT pros have never been more in demand. It takes a fully trained team to ensure that your organization is protected. Your knowledge and skills in security play a critical role in ensuring your organization is secure. Learn if CISSP or SSCP is the right certification for you, download the Snapshots today.
Europol and security vendors disrupt massive Ramnit botnet 
The operation seized command-and-control servers and Internet domains used by the Ramnit gang Read More 

Facebook fixed 61 high-severity flaws last year through its bug bounty program 
The company paid US$1.3 million to 321 outside security researchers in 2014 Read More 

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking 
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database Read More 


WHITE PAPER: Citrix Systems

10 Essential Elements for a Secure Enterprise Mobility 
This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more
DOJ offers $3 million reward for Gameover Zeus botnet suspect 
DOJ hopes the multi-million dollar reward will reinvigorate the hunt for the suspect Read More 

Anthem's latest breach estimate says 78.8 million were affected 
At least 14 million records are incomplete, but they probably don't belong to Anthem members Read More 

Google scraps annual Pwnium bug-hunting contest 
Google said the change will prevent researchers from holding onto dangerous bugs in order to claim a big prize Read More 

Gemalto says spies probably didn't steal mobile phone encryption keys from it after all 
After an internal investigation, Gemalto said hacks on its network didn't breach separate infrastructure protecting SIM card encryption keys Read More 
 
 
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기