Wednesday, November 7, 2012

Windows 8 Security Caveats | Going Offense Against Breaches?

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, November 07, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Windows 8 Security Improvements Carry Caveats
By Mathew J. Schwartz
Many new Windows 8 security features were previously available standalone, or require businesses to buy in to Microsoft's server and cloud vision.

MUST READ
9 Facts: Play Offense Against Security Breaches
Striking back by hacking hackers is a legal and corporate no-no. But IT and security managers can shore up defenses and trick attackers into revealing their identities.

Sophos AV Teardown Reveals Critical Vulnerabilities
Antivirus vendor says it's patched all software flaws disclosed by researcher, some of which could be used to remotely control Windows, Mac, or Linux system.

Malware Tools Get Smarter To Nab Financial Data
New versions of the Gh0st RAT Trojan--believed to be used by China--as well as the Citadel cybercrime kit are advancing the malicious state of the art.

Automation Demands Tighter VM Security
Plan to let hypervisors spin up new virtual machines on their own? Then you'd better lock them down.

More VMware Source Code Leaks To Internet
Does the second release -- in less than a year -- of stolen VMware ESX source code put users at risk?

ALSO IN THIS EDITION
Automation Demands Tighter VM Security
More VMware Source Code Leaks To Internet
6 Most Evil Phishing Scams of 2012
The Cloud Checklist for SMBs: 7 Tips for Safer Cloud Computing
8 Cool Windows 8 Tablets
Data-Centric Security In A Mobile World
InformationWeek Unified Threat Management Vendor Evaluation Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By Titaninfosec:
"It's nice to say hackback is illegal, and for the most part it is, but this is the knee-jerk reaction that prevents companies from adequately defending themselves."
In reply to: 9 Facts: Play Offense Against Security Breaches
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD NETWORK COMPUTING'S LATEST DIGITAL ISSUE
From SDN to network overlays, emerging technologies promise to reshape the data center for the age of virtualization. Also in the new, all-digital issue of Network Computing: Open Compute rethinks server design.

DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
6 Most Evil Phishing Scams of 2012
As email-borne exploits grow increasingly sophisticated, all the time and money spent shoring up back-end network access channels could be for naught. Here's how to defend against attacks that prey on your end users. The first step: Know what you're up against.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
The Cloud Checklist for SMBs: 7 Tips for Safer Cloud Computing
The cloud is supposed to be a cure-all, but it also creates numerous new security issues for SMBs. Download this techbrief for 7 tips you must have before you commit to any service.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

10 Wearable Health Tech Devices To Watch
Wearable medical technology is becoming a hot commodity. As these devices come to market, they have the potential to help both patients and clinicians monitor vital signs and symptoms.

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.

Netflix Wants You To Adopt Chaos Monkey
Netflix has made its own automated disaster testing service, Chaos Monkey, available as a free public download. Should you turn it loose on your own systems?
 

WEBCASTS:

Data-Centric Security In A Mobile World
In this Webcast, consultant Michael Davis will discuss the results of our InformationWeek 2012 Mobile Security Survey and outline the steps necessary to protect data on mobile devices: a unified policy; enforcement of the rules through use of technology such as encryption of sensitive assets; and education of end users and IT pros. It happens Tuesday, November 13, 2012.
More Information & Registration

MORE WEBCASTS
 

RESOURCES AND EVENTS:
InformationWeek Unified Threat Management Vendor Evaluation Survey
We are conducting a survey to determine what's important to you when you're choosing unified threat management vendors as well as how the vendors are actually doing against those criteria. Take our survey now.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment