Thursday, 29 August 2013

Privacy campaigners want review of Irish Facebook, Prism decisions

Cybercrime service automates creation of fake scanned IDs, other identity verification documents | Privacy campaigners want review of Irish Facebook, Prism decisions

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: The U.S. Technology Skills Gap
We've got 5 signed copies to give to some lucky ITworld readers. Enter now for your chance to win! Read More


WHITE PAPER: F5 Networks

Secure Mobile Access without the challenge
Accommodating demand for mobile acces can be a challenge to IT organizations looking for an approach that does not compromise security or limit end-user device control. View Now

WHITE PAPER: F5 Networks

Gaining real-time protection with IP Perimter intelligance
Attack methodologies change. Threat vectors change. Once-powerful defenses become obsolete. View Now

Cybercrime service automates creation of fake scanned IDs, other identity verification documents
A new Web-based service for cybercriminals automates the creation of fake scanned documents that can help fraudsters bypass the identity verification processes used by some banks, e-commerce businesses and other online services providers, according to researchers from Russian cybercrime investigations firm Group-IB. Read More

Privacy campaigners want review of Irish Facebook, Prism decisions
The privacy campaign group Europe-v-Facebook said Wednesday it will ask the Irish High Court to review decisions made by the Irish Data Protection Commissioner not to investigate Facebook and the U.S. government surveillance program Prism. Read More

Pirate Bay co-founder's appeal of fraud conviction relies on 'remote control' argument
Pirate Bay co-founder Gottfrid Svartholm Warg's appeal of his conviction on charges of data intrusion, attempted aggravated fraud and aggravated fraud started on Wednesday, with arguments centering on the contention that other parties used the defendant's computer by remote control. Read More

Spear phishing led to DNS attack against the New York Times, others
The cyberattack that resulted in nytimes.com and some other high-profile websites being inaccessible to a large number of users Tuesday started with a targeted phishing attack against a reseller for Melbourne IT, an Australian domain registrar and IT services company. Read More


WHITE PAPER: F5 Networks

Methods addressing Bank's top 5 IT needs
With the number of cyber-attacks on banks rising, the financial services industry is under growing pressure to improve security that protects customer accounts and information, while also ensuring the availability of external-facing web applications services. View Now

Bookmaker handicaps Microsoft CEO race
Adding insult to injury after Wall Street boosted Microsoft's stock price when CEO Steve Ballmer announced he would retire, now a U.K. bookmaker is taking bets on Ballmer's replacement. Read More

US man pleads guilty to hacking Department of Energy, other sites
A Pennsylvania man who was allegedly a member of the computer hacking group the Underground Intelligence Agency has pleaded guilty to one count of conspiracy and two counts of computer intrusion, the U.S. Department of Justice announced. Read More

Tesla's Model S vulnerable to hackers, kind of
It's the curse of the connected car – once it's linked to the Internet, it's, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner's knowledge. Read More

Secure email is dead
Recent revelations about wide ranging and warrantless government surveillance don't mean that e-mail is dead – just that you can't ever trust it again! Read More


DON'T MISS...

10 overhyped tech products that crashed and burned

Running Linux on a Windows PC: Your getting started guide

11 signs your IT project is doomed

Up all night: How the tech elite pushes a crazy workaholic culture

Top open-source PCs

BOOK GIVEAWAY

We've got a some great new books to give away this month. Enter now for your chance to win!

The U.S. Technology Skills Gap
Essential reading for those eager to see America remain a relevant global power in innovation and invention in the years ahead. Consider it your how-to-get involved guidebook.

Scrum Shortcuts without Cutting Corners
Scrum expert Ilan Goldstein helps you translate the Scrum framework into reality to meet the Scrum challenges your formal training never warned you about.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment