Wednesday, April 17, 2013

SMBs Becoming Bigger Targets | DDoS Attack Bandwidth Jumps

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, April 17, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist SMBs Become Bigger Targets In Cyberattacks
By Kelly Jackson Higgins
Businesses with fewer than 250 employees accounted for 31% of all cyberattacks last year, according to Symantec. Hackers use them as entry to bigger companies.

MUST READ
DDoS Attack Bandwidth Jumps 718%
Distributed denial-of-service study finds increase in attack quantity and severity, while most attacks continue to originate from China.

Oracle Preps Massive Java Bug Fix
Java updates set to fix 42 bugs -- 39 of them exploitable vulnerabilities -- and Java 7 gets interface changes to flag suspect Java apps.

Anonymous Takes Down North Korean Websites
Hacktivists knock five North Korean websites offline on the 101st anniversary of North Korea's founding.

Wireless Camera Flaws Allow Remote Exploitation
Foscam wireless IP cameras contain vulnerabilities that can be used to steal credentials or hack to launch further attacks, warn researchers from Qualys.

Download our iPad App
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act
Interop Preview: Expert Advice On Building Private Cloud

Exclusive for IWK Readers:
Attend Interop and help Build IT Innovation. Click here or use Priority Code MP_BTMNLIWKSEC to save an additional $200 off advanced pricing on All Access and Conference Passes. Join us for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology.

see also...
Why You Should Attend Interop

Download our iPad App

  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF DARK READING
People are your most vulnerable endpoint. Make sure your security strategy addresses that fact.

Also in the new, all-digital issue of Dark Reading: Effective security doesn't mean stopping all attackers.

Log In Or Register To Download

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Trends in Mobile Device Threats
With readily available information about the devices in use, and often few corporate safeguards in place, mobile devices are turning out to be a lucrative vector for attackers looking for an in to enterprise networks. In this Dark Reading report, we explain how the threat is growing, what attackers are targeting and why you need to be concerned.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Comfort and Security in the Cloud
Contact center operations are increasingly complex and place greater demands on IT to ensure stability, reliability and resiliency. Learn how cloud-based approaches can surpass premise-based solutions.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

BlackBerry Q10 - The Keyboard to Success?
In a few weeks the BlackBerry 10 with a physical keyboard will be available to buyers. People love the BlackBerry keyboard, but is the device obsolete anyway?

Smartphones With Physical Keyboards
Do you want a physical keyboard on your smartphone? The new BlackBerry with a hard keyboard will be here soon, but there are alternatives. Here we show you eight phones, including six not from BlackBerry.

10 Great Android Apps For Tablets
What Android apps really shine on tablets? Take a look at a few of our favorites.

IT Salary Survey 2013: 11 Career Insights
IT salaries begin to thaw, with median pay for staffers at $90,000 and managers at $120,000.

Google Nexus 7, Take Two: What To Expect
Google watchers expect a new version of the 7-inch Nexus tablet to debut soon. Here's what it might look like.


 

WEBCASTS:

Choosing an Approach to Data Integration and Governance in a Big Data World
Join Gartner analyst Eric Thoo on Tuesday, April 23, as he describes four different approaches to data integration. Eric will map the different approaches to five key use cases to help you identify the capabilities you need and provide insights into evolving data integration challenges and the capabilities that are emerging to address them.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
Take our Mobile Security Survey -- You Could Win A Tablet!
InformationWeek is conducting a survey to determine the types of measures and policies IT is taking to ensure the security of the full range of mobile assets on cellular, Wi-Fi and other wireless technologies. One lucky participant will win a 32GB Google Nexus 7 tablet!
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment