Wednesday, April 10, 2013

Windows 8 Security Software Falls Short

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, April 10, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Microsoft Windows 8 Security Software Lacks Teeth
By Mathew J. Schwartz
Microsoft's free corporate and consumer endpoint security software needs more malware-stopping power, finds independent German firm AV-Test.


MUST READ
North Korea Behind Bank Malware, South Korea Says
Evidence ties North Korean cyber-espionage unit to two waves of attacks on banks and broadcasters, South Korean officials say.

LulzSec Hackers Plead Guilty To CIA, Sony Attacks
Three men admit in London courtroom they launched distributed denial of service attacks and defacements that targeted a variety of websites.

South Korea Charges Alleged Hackers
South Korean government accuses two men of working with North Korean hackers to steal personal data relating to 140 million South Koreans.

Federal Cyber Workforce Is Getting Older
Aging cybersecurity cadres need more training, influx of younger professionals, government report says.

Download our iPad App
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act
Interop Preview: Expert Advice On Building Private Cloud

Exclusive for IWK Readers:
Attend Interop and help Build IT Innovation. Click here or use Priority Code MP_BTMNLIWKSEC to save an additional $200 off advanced pricing on All Access and Conference Passes. Join us for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology.

see also...
Why You Should Attend Interop

Download our iPad App

  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF INFORMATIONWEEK
When it comes to database deals, customers -- not vendors -- now have the advantage. Find out the results of our new Database Technology Survey.

Also in our new, all-digital issue: Oracle has refreshed its midrange and high-end Sparc servers, but that may not help its bottom line.

Log In Or Register To Download

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Eight Steps To Securing Small Databases
databases--that have a big stake in protecting their data but don't have big budgets or skilled, and dedicated, security staff.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
The Business Value of Hybrid Cloud -Based Compromise Intelligence Monitoring and Threat Mitigation
There are now millions of malware variations to defend against and hundreds of perpetrators of DDoS attacks. This Technology Spotlight examines these trends and the role that Neustar's Protect solutions and NeuSentry service plays in this strategic market.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

How To Bug Mitch McConnell's Office
"Bugging" in the context of politics raises images of burglars messing with telephones and clunky tape recorders in the Oval Office. Now you'd just use malware.

Android's A 'Trojan Horse,' Microsoft-Backed Group Charges
FairSearch.org says Google's decision to offer Android at no cost represents predatory pricing.

The Freedom From Information Act
The U.S. government needs to takes transparency more seriously.

10 Best And Worst Cellphones Of All Time
From clamshell to multitouch, these cellphones made their mark -- for better or worse.

How Netflix Is Ruining Cloud Computing
A laser focus on Amazon Web Services and seeming disregard for next-gen best practices could spell lock-in, and derail real IaaS competition.


 

WEBCASTS:

Choosing an Approach to Data Integration and Governance in a Big Data World
Join Gartner analyst Eric Thoo on Tuesday, April 23, as he describes four different approaches to data integration. Eric will map the different approaches to five key use cases to help you identify the capabilities you need and provide insights into evolving data integration challenges and the capabilities that are emerging to address them.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
InformationWeek 2013 Mobile Security Survey
InformationWeek is conducting a survey to determine the types of measures and policies IT is taking to ensure the security of the full range of mobile assets on cellular, Wi-Fi and other wireless technologies.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment