Wednesday, January 16, 2013

Another Java Zero-Day Vulnerability Hits Black Market

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, January 16, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Another Java Zero-Day Vulnerability Hits Black Market
By Mathew J. Schwartz
Just 24 hours after Oracle patched two critical flaws in Java, online vulnerability vendor starts selling never-seen Java bug.

MUST READ
DARPA Considers Deploying Technology On Ocean Floor
New research program aims to develop deep sea containers for 'just-in-time' requirements.

Meet Facebook's Graph Search Tool
Facebook downplays Google as competitor as it launches "internal" search tool that helps you find people, photos, places and interests inside Facebook using established privacy settings.

10 Facts: Secure Java For Business Use
Businesses that rely on Java must now take additional steps to keep employees safe. Here's where to start.

Swartz Suicide Puts JSTOR Academic Database In Spotlight
Death of internet activist Aaron Swartz renews push for online content and copyright debate.

Anonymous Hacks MIT In Aaron Swartz Tribute
Hacktivist group leaves defaced Web page calling for reform of computer crime and intellectual property laws.

ALSO IN THIS EDITION
Swartz Suicide Puts JSTOR Academic Database In Spotlight
Anonymous Hacks MIT In Aaron Swartz Tribute
Research: Mobile Security's Missing Link
Rule-Driven Profiling: A New Approach to Vulnerability Discovery
Meet Facebook's Graph Search Tool
Is Your Network Ready for BYOD?
InformationWeek 2013 U.S. IT Salary Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By safetysw:
"Just another reason to never use Java for anything that needs to be safe and/or secure. Not enough thought and care is taken when designing code in any language!"
In reply to: Another Java Zero-Day Vulnerability Hits Black Market
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE
Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.

Also: A new initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Research: Mobile Security's Missing Link
We hear a lot about controlling devices and data. But there's a third consideration that's just as critical -- and a lot less high profile. Don't let an intense focus on employee mobile devices leave you exposed via insecure apps.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Rule-Driven Profiling: A New Approach to Vulnerability Discovery
Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the focal point for most enterprise vulnerability management programs. Download this report to assess risks or prioritize vulnerabilities for remediation.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Meet Facebook's Graph Search Tool
Facebook downplays Google as competitor as it launches "internal" search tool that helps you find people, photos, places and interests inside Facebook using established privacy settings.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

CES 2013: 7 Standout Technologies
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.

LG: What Nexus 4 Supply Problems?
LG claims there is no supply problem with the Nexus 4, despite its lack of availability more than two months after launch.

10 Facts: Secure Java For Business Use
Businesses that rely on Java must now take additional steps to keep employees safe. Here's where to start.
 

WEBCASTS:

Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
InformationWeek 2013 U.S. IT Salary Survey
For the 16th consecutive year, InformationWeek is conducting its U.S. IT Salary Survey. To date, more than 200,000 IT professionals have participated in this survey. Take our survey now, and be eligible to win some great prizes.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment