Wednesday, February 20, 2013

Twitter Attack: 6 Facts | Oxford Blocks Google Docs

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, February 20, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Apple, Facebook Twitter Attacks: 6 Key Facts
By Mathew J. Schwartz
FBI investigates how hackers compromised an iOS developer website to exploit Java plug-in vulnerabilities and breach major social networking and technology companies.

MUST READ
Oxford University Briefly Blocks Google Docs
Increase in phishing attacks prompts Oxford University to take "temporary, extreme action."

Oracle, Apple Issue Java Security Patches
Oracle updates Java 7 and issues the final-ever public update for Java 6, while Apple releases its own Java 6 update for OS X users.

3 Tips From Burger King, Jeep Twitter Hacks
In about 24 hours, the Twitter accounts of Burger King, Jeep and other well-known companies were hacked. Follow these three strategies to avoid a similar fate.

Anonymous Takes On State Department, More Banks
Hacktivist group says it will release work email addresses for more than 170 U.S. State Department employees in fifth round of Operation Last Resort attacks.

Zombie Hackers Exploited Emergency Alert System Security Flaws
FCC has known about security gaps in networked alert systems equipment for more than 10 years. What if next hoax is serious?

FAA Promises Privacy Standards For Domestic Drones
As law enforcement and civilian use of unmanned aerial drones increases, surveillance fears mount.

  Digital Issue  
DOWNLOAD NETWORK COMPUTING'S DIGITAL ISSUE
In our new all-digital issue "Welcome to the Revolution":
Three technologies are vying to upend legacy data center networks. Which one will you back?

ALSO: Startups are bringing fine-grained I/O quality of service to solid-state arrays.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: 5 Top BYOD Threats for 2013
Mobility is here to stay, and smart IT departments aren't ignoring it -- they're taking proactive steps to address the security issues of the bring-your-own-device movement. Here are the biggest problem areas to watch for, and three smart steps you can take to protect your company's data.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Real Time Risk Management
Information security based on regulatory compliance stipulations cannot keep up with today's sophisticated and rapidly changing threat landscape. Find out why CISOs need to implement a new discipline that ESG calls, real-time risk management.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Windows 8: Microsoft's Progress Debated
Windows 8 is one of those good news-bad news Microsoft products. For every sign of success, unanswered questions or signs of flagging momentum appear.

HTC One Can Compete With Apple, Samsung
HTC One offers world-class hardware, slick software enhancements and a really cool camera.

Apple iWatch Vs. Smartwatches Past And Present
iWatch could change the mobile landscape, or it could end up as a redundant peripheral. Can Apple avoid the smartwatch flops of the past?

NASA Reports Space Station Communications Outage Fixed
Communications are back up between NASA and the International Space Station after a brief glitch happened shortly after a software upgrade.


 

WEBCASTS:

Secure Access: Next Steps In Identity Management
Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. In this interactive editorial webcast on Thursday, February 21, 2013, we will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Don't Miss Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment