Wednesday, February 13, 2013

Obama Cybersecurity Order, Explained | Adobe Reader, Acrobat Under Attack

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, February 13, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Adobe Reader, Acrobat Under Attack
By Mathew J. Schwartz
Cue the security fatigue: Zero-day attacks target Adobe Reader and Acrobat, Adobe pushes second Flash patch, Microsoft fixes 57 flaws.

MUST READ
White House Cybersecurity Executive Order: What It Means
The White House late Tuesday issued a long-awaited executive order to bolster the nation's cyber defenses. But that order leaves some questions unanswered.

Cybercrime 2.0: It's All About The Money
Malware creator and hacker "business model" has shifted from high volume toward high yield, Websense study finds. IT must educate users accordingly.

Facebook Graph Search: One Group's Early Lessons
Farm Sanctuary shares lessons learned during its first steps with Facebook's new search engine, including privacy considerations.

Xerox Targets Cloud Document Security Worries
Xerox, working with Cisco and McAfee, launches printers and apps designed to securely route documents to Dropbox, Google Apps and other cloud services.

Besieged By Hackers, OpenX Will Close Open Ad Platform
Self-service ad platform proves indefensible when hackers come knocking.

ALSO IN THIS EDITION
Xerox Targets Cloud Document Security Worries
Besieged By Hackers, OpenX Will Close Open Ad Platform
Research: Security Staffing Survey
Solving Substantiation with SAML
Tim Cook: Cheaper iPhone? Maybe...
Secure Access: Next Steps In Identity Management
Don't Miss Black Hat Europe

Download our iPad App

JOIN THE CONVERSATION
Posted By Deirdre Blake:
"While I think the executive order is a step in the right direction, it remains to be seen whether this effort will culminate in another civil liberties grab like the Patriot Act, so often invoked to prosecute U.S. citizens rather than to protect them."
In reply to: White House Cybersecurity Executive Order: What It Means
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD INFORMATIONWEEK'S LATEST DIGITAL ISSUE
Terabytes are growing into petabytes: The era of big data has arrived in government. Make sure you have a plan to keep up and the skills to make it work.

ALSO: Federal gun control won't succeed without an IT overhaul.


DOWNLOAD NOW FREE (Registration Required)
 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Research: Security Staffing Survey
Hiring the wrong security pro can be a costly mistake that could set your company back years in terms of risk reduction. But finding the right person isn't easy. But don't despair. We'll walk you through the steps you need to take to find the best security professionals.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Tim Cook: Cheaper iPhone? Maybe...
Is a cheaper iPhone 5 necessary when the iPhone 4 is free on a contract? Is an entirely new product on the horizon, and it's not an iPhone? When Apple wants to introduce a more affordable product, it's not always exactly what we expect.

Microsoft Surface Pro: Right For You?
Microsoft's business-friendly Windows 8 tablet-laptop hybrid isn't perfect. From battery life to weight considerations, we break down whether Surface Pro will suit your needs.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Nexus Devices Getting Android 4.2.2, Google Now Widget
Android 4.2.2 update hits some Nexus devices, as details leak about a new widget that could make Google Now more powerful.

Zombie Alert Hoax: Emergency Broadcast System Hacked
Bodies of the dead are rising from their graves, warns CBS affiliate. News at 10.
 

WEBCASTS:

Secure Access: Next Steps In Identity Management
Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. In this interactive editorial webcast on Thursday, February 21, 2013, we will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Don't Miss Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment