Search This Blog

Tuesday, August 05, 2014

How to steal security codes from home alarm systems

PayPal's two-factor authentication is easily beaten, researcher says

PF Chang's hack hit 33 restaurants for 8 months

ITworld Today
August 05, 2014
Share this email

Black Hat 2014: How to steal security codes from home alarm systems

For $50 attackers can build a radio device with off the shelf hardware that cracks home alarm systems and other common security devices.

READ MORE
 

Issue highlights

1. PayPal's two-factor authentication is easily beaten, researcher says

2. PF Chang's hack hit 33 restaurants for 8 months

3. BOOK GIVEAWAY: The Official Ubuntu Book, 8th Ed.

4. Web acceleration protocol nears completion

5. LinkedIn pays almost $6M for wage law violations

6. Samsung resumes business with Chinese supplier found hiring child labor

7. Symantec, Kaspersky deny government ban in China

8. Are you ready for some football? Microsoft and the NFL are teaming up this season.

9. Minilock, a simple but powerful file encryption app

Webcast: Box

Top Mobile Management Questions Answered

How can IT provide seamless and secure mobile communications and collaboration for all? Take a look at this on-demand Webcast where IDG asks an expert panel pressing questions surrounding mobile security and management. Prepare to have with your mobility questions answered! Learn more

PayPal's two-factor authentication is easily beaten, researcher says

A security feature offered by PayPal to help prevent accounts from being taken over by hackers can be easily circumvented, an Australian security researcher has found. READ MORE

PF Chang's hack hit 33 restaurants for 8 months

The hack of credit-card-processing terminals at PF Chang's hit 33 of the company's locations across the U.S. and continued for around eight months, the company said Monday. READ MORE

BOOK GIVEAWAY: The Official Ubuntu Book, 8th Ed.

Whether you're new to Ubuntu on on your way to power user status, "The Official Ubuntu Book" is your ideal one-stop knowledge source. Five will win. Enter the drawing today! READ MORE

Web acceleration protocol nears completion

When it comes to speeding up Web traffic over the Internet, sometimes too much of a good thing may not be such a good thing at all. READ MORE

Webcast: IBM

Data in Motion: Delivering Insight from Data Streams

Watch IBM and Datawatch to learn how your organization can achieve competitive advantage through the use of visualization and analysis of real-time data and event streams. This webcast will help organizations of all types and sizes learn about a technology and business strategy for tapping into the wealth of real-time data and analytics Learn More

LinkedIn pays almost $6M for wage law violations

Professional networking company LinkedIn agreed to pay close to $6 million in overtime back wages and damages to employees at its branches in California, Illinois, Nebraska and New York, the U.S. Department of Labor said Monday. READ MORE

Samsung resumes business with Chinese supplier found hiring child labor

Samsung Electronics is lifting its suspension of a Chinese supplier found using child labor, after local authorities determined that the factory had not intentionally hired the underage workers. READ MORE

Symantec, Kaspersky deny government ban in China

Symantec and Kaspersky Lab are both denying that China has banned their products, amid media reports that the country is shutting out foreign security vendors from selling to government agencies. READ MORE

Are you ready for some football? Microsoft and the NFL are teaming up this season.

Microsoft is helping the NFL on the sidelines, helping XBox One and Windows 8 fans enjoy watching the games, and putting together a football lover's Xbox One bundle. Are you ready for some football? Microsoft sure is. READ MORE

Minilock, a simple but powerful file encryption app

This Chrome app makes file encryption so easy you might actually do it. READ MORE

: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...

Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >>

SURVEY:

Got 10 minutes? Tell us about your tech interests and you could win an iPad mini
ITworld is conducting its annual survey about your involvement with and interest in various technology categories, and invites you to participate. Survey participants will have the opportunity to win an iPad mini and sign up to receive a report outlining survey highlights. Take the survey now!

GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: