Wednesday, February 6, 2013

Next Gen Malware: Can We Stop It?

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, February 06, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
Malware: The Next Generation
By Ericka Chickowski
Zero-day and rapidly morphing malware is proliferating across the Web. Is your enterprise ready to stop it?

MUST READ
Hacking, Privacy Laws: Time To Reboot
Recent cases highlight serious flaws in current privacy and cyber abuse legislation, allowing prosecutors to wield a hammer when a stick will do.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

Department Of Energy Confirms Data Breach
Attackers targeted employees' personal data, rather than top secret energy or nuclear information, investigators say.

Twitter Pursues Two-Factor Authentication After Password Breach
Live attack compromised up to 250,000 accounts, leading Twitter to reset affected users' passwords.

Oracle Issues Emergency Java Security Update
Oracle's Java update addresses 50 bugs, including flaws that can be used to remotely compromise a desktop or server.

The Dreaded Captcha: Beginning Of The End?
Ticketmaster dumps reviled security technology that forces users to decipher distorted words. Will it spark a trend?

CEOs Voice Support For Cyber Legislation, With Caveats
Senate report indicates many Fortune 500 CEOs support comprehensive cybersecurity legislation that increases information sharing, but only if sharing is voluntary.

ALSO IN THIS EDITION
The Dreaded Captcha: Beginning Of The End?
CEOs Voice Support For Cyber Legislation, With Caveats
Strategy: Cybersecurity on the Offense
Database Activities You Should be Monitoring
Samsung Galaxy S IV: What To Expect
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

JOIN THE CONVERSATION
Posted By japura941:
"Not only can Carrier IQ be equivalent to a bot, but it can also be the worst of it's kind, a Chameleon app as it had been granted with the highest root privileges on the mobile device."
In reply to: Carrier IQ: Just A Little Evil?
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)
 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Cybersecurity on the Offense
Can you -- and should you -- strike back at attackers? It's a complex question with deep ethical, legal and practical considerations. While governments have drawn lines in the sand, for the private sector it's still early days in the offensive cyber security era. You can, however, be proactive. Here's how.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Database Activities You Should be Monitoring
As data stores grow in scope and importance, the need to monitor activities - especially in RDBMSs becomes essential for meeting legal and regulatory compliance requirements. Ask key questions including: Is the data safe? Who has access and what are they doing with that access?
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Dell Goes Private: What's Next?
Dell is going private with the help of $2 billion from Microsoft. Going forward, how much will Microsoft influence operations?

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.


 

WEBCASTS:

Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment