Wednesday, March 6, 2013

Bank Hacktivists At It Again | Java Patch Fends Off McRAT

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, March 06, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Bank Attackers Restart Operation Ababil DDoS Disruptions
By Mathew J. Schwartz
Some customers report difficulty accessing banking sites, but officials said DDoS defenses and service provider blocks may be partly to blame.

MUST READ
Java Emergency Patch Slaps McRAT Infections
Oracle patches two more zero-day bugs in Java 6 and Java 7. But security researcher spots new vulnerabilities in Java 7.

EU Fines Microsoft $732 Million In Browser Brawl
Microsoft stopped offering browser-choice screen to European Windows consumers, in violation of 2009 agreement with antitrust regulators.

Government Google Data Requests: Scope Unclear
Google has begun disclosing limited information about U.S. government investigations that demand consumer data and, usually, silence from those cooperating.

Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.

What Unlocked Phones Mean For Businesses
U.S. lawmakers pledge to change regulations that make it illegal to unlock cell phones. Is there an upside for the enterprise?

Kim Dotcom Plans Mega IPO
MegaUpload founder, still sought for extradition by the U.S. government, hires CFO to help float his new cloud storage service.

ALSO IN THIS EDITION
What Unlocked Phones Mean For Businesses
Kim Dotcom Plans Mega IPO
Strategy: Heading Off Advanced Social Engineering Attacks
Five Critical Components of an Information Security Program
Office 2013: 10 Questions To Ask
Data Protection Management for Enterprises and Service Providers
It's Your Last Chance To Attend Black Hat Europe

Download our iPad App

JOIN THE CONVERSATION
Posted By pcbackup:
"Email addresses are nearly as valuable as account passwords, since they enable future attack opportunities, so why not apply the same level of protection to email addresses as for the passwords themselves?"
In reply to: Evernote Breach: 7 Security Lessons
View Entire Response | Post Your Own Reply
  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF DARK READING:
Protect the most fragile part of your IT infrastructure -- the endpoints and the unpredictable users who control them.

Also in this special issue: Some say the focus should be on education to deal with the endpoint security conundrum; some say technology. But it's not a binary choice.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Heading Off Advanced Social Engineering Attacks
Social engineering attacks are getting increasingly sophisticated, but there's only so much the law and technology can do to protect your organization. In this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals can do to prevent their users from being targets and victims.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Five Critical Components of an Information Security Program
Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements - regardless of industry, organization size or security skill set.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Office 2013: 10 Questions To Ask
Is Microsoft Office 2013 right for you? Here are the right questions for small and midsize businesses and enterprises to ask.

Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.

10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Collision Course: SDN And Server Virtualization
With every data center resource -- compute, storage and networks -- now virtualized, the push is on to consolidate operational control.
 

WEBCASTS:

Data Protection Management for Enterprises and Service Providers
In this Webcast (Tuesday, March 12, 2013) we will explore the many challenges associated with multi-platform data protection environments and discuss how enterprise IT and service providers can gain the visibility and insight needed to reduce operational expenses and improve protection confidence.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
It's Your Last Chance To Attend Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment