If you have trouble viewing this email, read the online version. |
|
Wednesday, March 06, 2013 |
TOP STORY Bank Attackers Restart Operation Ababil DDoS Disruptions By Mathew J. Schwartz Some customers report difficulty accessing banking sites, but officials said DDoS defenses and service provider blocks may be partly to blame. MUST READ Java Emergency Patch Slaps McRAT Infections Oracle patches two more zero-day bugs in Java 6 and Java 7. But security researcher spots new vulnerabilities in Java 7. EU Fines Microsoft $732 Million In Browser Brawl Microsoft stopped offering browser-choice screen to European Windows consumers, in violation of 2009 agreement with antitrust regulators. Government Google Data Requests: Scope Unclear Google has begun disclosing limited information about U.S. government investigations that demand consumer data and, usually, silence from those cooperating. Evernote: We're Adding Two-Factor Authentication After data breach and wide password reset, Evernote accelerates plans to offer additional security to users. What Unlocked Phones Mean For Businesses U.S. lawmakers pledge to change regulations that make it illegal to unlock cell phones. Is there an upside for the enterprise? Kim Dotcom Plans Mega IPO MegaUpload founder, still sought for extradition by the U.S. government, hires CFO to help float his new cloud storage service. |
|
INSIDE THIS WEEK'S ISSUE OF DARK READING: Protect the most fragile part of your IT infrastructure -- the endpoints and the unpredictable users who control them. Also in this special issue: Some say the focus should be on education to deal with the endpoint security conundrum; some say technology. But it's not a binary choice. DOWNLOAD NOW FREE (Registration Required) |
| FEATURED WHITEPAPERS Five Critical Components of an Information Security Program Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements - regardless of industry, organization size or security skill set. DOWNLOAD NOW (REGISTRATION REQUIRED) MORE WHITEPAPERS |
MOST POPULAR STORIES
Office 2013: 10 Questions To Ask
Is Microsoft Office 2013 right for you? Here are the right questions for small and midsize businesses and enterprises to ask.
Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.
10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.
Collision Course: SDN And Server Virtualization
With every data center resource -- compute, storage and networks -- now virtualized, the push is on to consolidate operational control.
Office 2013: 10 Questions To Ask
Is Microsoft Office 2013 right for you? Here are the right questions for small and midsize businesses and enterprises to ask.
Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.
10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.
Collision Course: SDN And Server Virtualization
With every data center resource -- compute, storage and networks -- now virtualized, the push is on to consolidate operational control.
No comments:
Post a Comment