Wednesday, October 24, 2012

2013 Security Strategy: Go On Offense | Bank Hackers Take A Holiday

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, October 24, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
Play Offense On Security In 2013: Gartner
By Michael Endler
Enterprises can't count on defensive security strategies any more, Gartner execs tell IT leaders at Symposium/ITxpo conference.

MUST READ
U.S. Bank Hackers Promise DDoS Pause
In the sixth week since the launch of "Operation Ababil" attacks against Wall Street banks, online post says hacktivists are taking time off for a Muslim holiday.

Cyber Crooks Target Healthcare For Financial Data
Identity thieves looking for a quick buck often don't even know they are attacking healthcare organizations, Verizon investigation finds.

Russian Service Rents Access To Hacked Corporate PCs
Service provides stolen remote desktop protocol credentials, letting buyers remotely log in to corporate servers and PCs, bypassing numerous security defenses.

Who Is Hacking U.S. Banks? 8 Facts
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?

Popular Android Apps Vulnerable
Security study finds flawed SSL implementations in more than 1,000 Android apps.

Microsoft Revises Privacy Rules, Users Shrug
Why hasn't Microsoft faced a firestorm, as Google did, for consolidating user information across products and services?

ALSO IN THIS EDITION
Popular Android Apps Vulnerable
Microsoft Revises Privacy Rules, Users Shrug
Research: 2012 Application Security Survey
Global Threat Report: September 2012
Apple iPad Mini Vs. iPad 4: Which To Buy
Exposing the Money Behind Malware
InformationWeek Future Cities Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By MyW0r1d:
"Anonymous and similar groups may now focus on nuisance DDoS activity, but as there is a market for avoiding telephone usage fees (Magic Jack) there will be a market for solutions to reduce or eliminate energy and utilities consumption."
In reply to: "DOD: Hackers Breached U.S. Critical Infrastructure Control Systems"
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE
Most IT teams monitor website performance. It's time to extend that vigilance to all critical applications.

Also in the new, all-digital issue of InformationWeek: While Oracle and SAP wage a war of words, they're ignoring the wishes of customers like Procter & Gamble.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Research: 2012 Application Security Survey
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Global Threat Report: September 2012
Get the most up-to-date view of the IT security threat landscape from the experts. This monthly threat report is required reading for anyone involved with IT Security. Don't miss out.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Apple iPad Mini Vs. iPad 4: Which To Buy
Apple stunned by announcing a fourth-generation Retina Display iPad along with the iPad Mini. No mere refresh, the iPad 4 sports significantly improved specs.

Samsung Chromebook: Hands-On Review
Samsung's latest Chromebook benefits from rapid improvements in Google's Chrome OS. Is this cloud computing vehicle right for you?

Apple Reveals iPad Mini, New Macs
Apple shows off a rash of new hardware products ranging from iMacs and MacBooks to the long-awaited smaller tablet, the iPad Mini.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

Who Is Hacking U.S. Banks? 8 Facts
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?
 

WEBCASTS:

Exposing the Money Behind Malware
Today's cybercriminals are driven by one thing: money. Join Chet Wisniewski, Senior Security Advisor at Sophos to learn about latest threats and how these criminals are making money by compromising your computer and data. It happens Tuesday, October 23, 2012
More Information & Registration

MORE WEBCASTS
 

RESOURCES AND EVENTS:
InformationWeek Future Cities Survey
Today's urban areas must evolve into "Future Cities" with infrastructure, services, and IT systems capable of supporting millions of residents efficiently. We are conducting a survey to identify the challenges and opportunities this megatrend poses to business and technology managers involved in municipal operations. One lucky participant will win a 16GB Google Nexus 7 tablet.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment