Wednesday, November 14, 2012

Google: Big Brother's Getting Bigger | Skype Exploit

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, November 14, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Google Says Government Surveillance Growing
By Thomas Claburn
Demands for Google user data and content takedowns are on the rise, some of which are not legitimate.

MUST READ
Skype Deals With Account Hijacking Exploit
Months after being notified of a vulnerability described as "child's play" to exploit, Skype has temporarily addressed the issue by disabling password resets.

Monster Chooses Splunk For Big Data Security
Popular job search website looks to Splunk, rising big data star, to meet its online security and compliance goals.

The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers protect content.

Inside Zenprise's Newest BYOD Tools
MobileManager 8, and Zensuite attempt to boost usability along with security.

Petraeus Fallout: 5 Gmail Security Facts
Where did the former CIA director and the woman with whom he was having an affair go wrong? Learn from his experience with Gmail.

McAfee Founder Says Belize Framing Him For Murder
Millionaire John McAfee, who founded the eponymous antivirus vendor -- since bought by Intel -- says he's being framed by Belizean authorities in a murder case and is now on the run.

ALSO IN THIS EDITION
Petraeus Fallout: 5 Gmail Security Facts
McAfee Founder Says Belize Framing Him For Murder
6 Most Evil Phishing Scams of 2012
Benefits of Unified Endpoint Data Management in Embracing BYOD
8 Cool Windows 8 Tablets
Why Big Data Doesn't Have to Mean Big Security Challenges
InformationWeek 2013 Outlook Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By Xira:
"Every email is read, every phone call is listened to. Maybe not by a human, but computers are better at it anyway. They don't get tired. They don't miss anything. They have no mercy for minor so-called 'crimes'."
In reply to: Petraeus Fallout: 5 Gmail Security Facts
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD DARK READING'S DIGITAL ISSUE
Recent breaches have tarnished digital certificates, the Web security technology. The new, all-digital 'Digital Certificates'issue of Dark Reading gives five reasons to keep it going.

DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
6 Most Evil Phishing Scams of 2012
As email-borne exploits grow increasingly sophisticated, all the time and money spent shoring up back-end network access channels could be for naught. Here's how to defend against attacks that prey on your end users. The first step: Know what you're up against.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Benefits of Unified Endpoint Data Management in Embracing BYOD
End users now access critical corporate data on personal devices and use consumer-grade web applications for work-related tasks, making it difficult for IT to fulfill one of their most important responsibilities: keep enterprise data secure. Download the IDC report to learn the impacts of this trend, as well as the benefits of unifying the often discreet IT functions of data protection, security, storage, and collaboration.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.

10 Wearable Health Tech Devices To Watch
Wearable medical technology is becoming a hot commodity. As these devices come to market, they have the potential to help both patients and clinicians monitor vital signs and symptoms.

Google Says Government Surveillance Growing
Demands for Google user data and content takedowns are on the rise, some of which are not legitimate.

Dell XPS 12 Windows 8 Tablet Vs. Hurricane Sandy
When I found myself without power for four days in Manhattan, Dell's Windows 8 tablet was my main link to the outside world. See how it fared.
 

WEBCASTS:

Why Big Data Doesn't Have to Mean Big Security Challenges
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Join us as we discuss several requirements security and risk professionals must do to create an awareness and understanding of the associated responsibilities and risks at the highest levels of the organization. It happens Wednesday, December 12, 2012.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
InformationWeek 2013 Outlook Survey
We are conducting our annual Outlook Survey to explore how IT leaders are planning their priorities and budgets for 2013. The results of the survey will appear in an upcoming issue as well as in an in-depth report. Take our survey now and enter to win one Samsung Series 5 Chromebook.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment