Wednesday, January 23, 2013

Closing BYOD's Security Hole | Hacker: Flaws In Java 7 Update

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, January 23, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Close The BYOD Security Hole
By Richard Hoffman
A bring-your-own-device policy it a low-cost way to use Apple devices without spending a lot of money, but don’t forget security.

MUST READ
Java Hacker Uncovers Two Flaws In Latest Update
Expert Java bug hunter says Oracle's latest Java 7 update, released last week, has two sandbox-bypass bugs.

'Mega' Insecure: Kim Dotcom Defends Rebooted Megaupload Security
Proof-of-concept attack against site's encryption leads to questions over its actual security and privacy protections.

RIM Launches BlackBerry Enterprise Service 10
RIM's new mobility management platform will help companies manage BlackBerry 10 devices, as well as those powered by iOS and Android, in an effort to regain relevance in the BYOD market.

Virut Malware Botnet Torpedoed By Security Researchers
Spamhaus group scuttles command and control systems for Russian botnet controlling an estimated 300,000 zombie PCs per day.

4 Steps For Proactive Cybersecurity
Tired of having malware punch you in the face? The time's not right to hit back, but here are moves to make now.

Offensive Cybersecurity: Theory And Reality
Can you -- and should you -- strike back at attackers? It's a complex question with ethical, legal, technical and practical considerations.

ALSO IN THIS EDITION
4 Steps For Proactive Cybersecurity
Offensive Cybersecurity: Theory And Reality
Strategy: Cybersecurity on the Offense
11 Tips For Protecting Your Data When You Travel
Java Hacker Uncovers Two Flaws In Latest Update
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

JOIN THE CONVERSATION
Posted By Andrew Hornback:
"Most attackers are lazy and will go for whatever low hanging fruit is available - but once they start on the tree (i.e. your infrastructure), they'll try to pick it clean and work their way to the top."
In reply to: 4 Steps For Proactive Cybersecurity
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE
Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead.

Also in our new, all-digital issue: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Cybersecurity on the Offense
Can you -- and should you -- strike back at attackers? It's a complex question with deep ethical, legal and practical considerations. While governments have drawn lines in the sand, for the private sector it's still early days in the offensive cyber security era. You can, however, be proactive. Here's how.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
11 Tips For Protecting Your Data When You Travel
Your hotel's internet service is a great convenience, right? Maybe not. The FBI/IC3 have warned travelers about insecure hotel ISPs. This tech brief gives you all the details on how to stay safe.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Java Hacker Uncovers Two Flaws In Latest Update
Expert Java bug hunter says Oracle's latest Java 7 update, released last week, has two sandbox-bypass bugs.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

DARPA Takes Aim At Space Junk
Defense research agency seeks partners to help it repair and reuse retired satellites.

SoftRAM in 95 - Memory Optimizer in 2013
A new Windows 8 program claims to "optimize memory," implying a performance boost, but what it actually does - flushing the disk cache - is likely to degrade performance significantly. It evokes the memory of the greatest Windows utility scam of all time.

Mozilla Reveals Firefox OS Developer Preview Phone
Developers invited to hacking events later this month to encourage app creation for open source mobile OS.
 

WEBCASTS:

Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment