Wednesday, March 13, 2013

China Attacks: What To Do? | Google Preps For... Zombies?

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, March 13, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist China Hack Attacks: Play Offense Or Defense?
By Mathew J. Schwartz
The Chinese government has been blamed for launching cyber-espionage APT attacks against U.S. businesses.

MUST READ
Google Vs. Zombies -- And Worse
Take an inside look at how Google prepares for catastrophes, from flesh-eating zombies to earthquakes.

Microsoft Patches For USB Key Vulnerability
Driver bug would allow anyone with physical access to compromise a PC by using exploit code loaded onto a USB storage device.

Bromium Founders Detail Life After Xen
Xen hypervisor team regroups to craft what they claim is a unique take on the problem of IT security.

iPhone, iPad Configuration Files Security Hole Shown
Mobile configuration files used by carriers could be repurposed to steal data and remotely control an iPhone or iPad, security firm warns.

Budget Fight Threatens U.S. Cyber Command's Growth
Cyber Command commander Gen. Keith Alexander says sequestration will lead to furloughs; wider budget conflict will delay efforts to strengthen Cyber Command.

Hackers Appear To Target Michelle Obama, FBI Director
Michelle Obama is among several public figures whose personal information appeared to be published via a website with a Soviet Union registration.

Download our iPad App
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act
Interop Preview: Expert Advice On Building Private Cloud

Exclusive for IWK Readers:
Click here or use Priority Code MP_BTMNLIWKSEC to save $200 off the Early Bird pricing on ALL access and conference passes when you register before March 22nd!

see also...
Why You Should Attend Interop


Download our iPad App

JOIN THE CONVERSATION
Posted By Andrew Hornback:
"You can't play offense until you've got a strong defense. All of the latest and greatest security technology in the world can be defeated if the 'man in the loop' fails to act in a secure manner."
In reply to: China Hack Attacks: Play Offense Or Defense?
View Entire Response | Post Your Own Reply
 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Heading Off Advanced Social Engineering Attacks
Social engineering attacks are getting increasingly sophisticated, but there's only so much the law and technology can do to protect your organization. In this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals can do to prevent their users from being targets and victims.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Providing Security for Software Systems in the Cloud
his paper details risks to software deployed in the cloud. Some risks impact security in much the same way wherever and however the software is hosted, but many old risks take on new importance when software makes the jump to the cloud. In this paper, we discuss notable concerns in all of these areas and describe an approach for assessing a software system's readiness to be deployed in the cloud.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

12 Open Educational Resources: From Khan to MIT
Higher education can now tap into an explosion of educational resources that are free to view, download and modify. That's disruptive to commercial textbooks, media and assessments.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.

IE10 on Windows 7: 5 Essential Facts
Four months after debuting on Windows 8, Internet Explorer 10 has finally come to Windows 7. Here are the five essential facts users should know.

Android Tablets Pushing Aside iPad: IDC
Influx of low-cost Android-based devices will tip the tablet market in Google's favor this year, says IDC.
 

WEBCASTS:

Data Protection Management for Enterprises and Service Providers
In this Webcast (Tuesday, March 12, 2013) we will explore the many challenges associated with multi-platform data protection environments and discuss how enterprise IT and service providers can gain the visibility and insight needed to reduce operational expenses and improve protection confidence.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
It's Your Last Chance To Attend Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment