Wednesday, November 28, 2012

Facebook Gift Scams | White House Insider Threat Policy

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, November 28, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Facebook Gift Scams: How They Work
By Mathew J. Schwartz
Beware complex scams that promote Costco, Starbucks vouchers, while making it tough for authorities to track down perpetrators.

MUST READ
White House Issues Insider Threat Policy
Policy sets minimum standards to deter, detect and respond to insider threats in federal government.

Bank DDoS Strikes Could Presage Armageddon Attacks
DDoS attack traffic could overwhelm not just targeted websites, but also every intervening ISP, warns Arbor Networks.

IonGrid's iPhone Security Tools Stress Flexibility
Strong Microsoft Office document rendering features may help ionGrid stand out in the crowded enterprise mobile application management market.

Google Play Ends Anonymous App Reviews
Google links Google+ profiles to Google Play reviews, hopes to make comments more trustworthy.

Accused LulzSec Hacker Could Face Life Imprisonment
Judge calls alleged Stratfor data breach mastermind 'flight risk,' denies bail; defense attorney suggests FBI entrapment.

Malware Corrupts Iranian Financial Databases
Iran downplays threat of Narilam financial malware, saying it dates from 2009 to 2010, and doesn't bear comparisons to Stuxnet, Duqu or Flame.

ALSO IN THIS EDITION
Accused LulzSec Hacker Could Face Life Imprisonment
Malware Corrupts Iranian Financial Databases
6 Most Evil Phishing Scams of 2012
Gartner: Secure Web Gateway Malware Detection Techniques
10 Cloud Computing Pioneers
Why Big Data Doesn't Have to Mean Big Security Challenges
InformationWeek 2013 U.S. IT Salary Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By KBURG070:
"The financial crisis showed how interconnected/interdependent banks are financially. It's obviously not any different from a security standpoint. The challenge has been getting banks to work together to ID and fight these kinds of threats, which they have been reluctant to do (collaborate)."
In reply to: Bank DDoS Strikes Could Presage Armageddon Attacks
View Entire Response | Post Your Own Reply
 

REPORTS & WHITEPAPERS:
FEATURED REPORT
6 Most Evil Phishing Scams of 2012
As email-borne exploits grow increasingly sophisticated, all the time and money spent shoring up back-end network access channels could be for naught. Here's how to defend against attacks that prey on your end users. The first step: Know what you're up against.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Gartner: Secure Web Gateway Malware Detection Techniques
Enhanced security is the key functionality in secure Web gateways, yet few buyers understand the different techniques used and their limitations. Use this guide to understand the limitations of solutions, and to compare solutions using standard terminology. Also use it to understand the limitations of each type of malware detection, and to compare prospective vendors' capabilities.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

10 Cloud Computing Pioneers
Cloud computing has rewritten decades of technology rules. Take a closer look at 10 innovators who helped make it possible.

8 Cloud Tools For Road Warriors
Cloud services have become indispensable for doing business on the move. Check out these valuable tools.

10 Cities Raise Tech IQs In IBM Challenge
IBM's Smarter Cities Challenge helps 100 cities around the globe improve education, infrastructure, public safety and economic development. Look how 10 winning cities are tackling tough problems.

8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.
 

WEBCASTS:

Why Big Data Doesn't Have to Mean Big Security Challenges
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Join us as we discuss several requirements security and risk professionals must do to create an awareness and understanding of the associated responsibilities and risks at the highest levels of the organization. It happens Wednesday, December 12, 2012.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
InformationWeek 2013 U.S. IT Salary Survey
For the 16th consecutive year, InformationWeek is conducting its U.S. IT Salary Survey. To date, more than 200,000 IT professionals have participated in this survey. Take our survey now, and be eligible to win some great prizes.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment