Wednesday, March 20, 2013

China Attacks: What To Do? | Google Preps For... Zombies?

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, March 20, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist South Korean Banks Lose Data In Malware Attack
By Mathew J. Schwartz
Computer networks at banks and television stations in South Korea froze after targeted malware deleted data from numerous PCs. Was North Korea involved?

MUST READ
Congress Weighs Online Privacy Law Update
Email access is one issue on the table in Electronic Communications Privacy Act revision.

Accenture's 7 Tech Trends Driving Digital Business
From customer relationships to cloud, and why mobile isn't one of them.

Cisco Password Fumble: Hardware Security At Risk
Password implementation error results in easy-to-crack Type 4 passwords in latest versions of IOS and IOS XE operating systems that run Cisco hardware.

British Government Bolsters Anti-Cybercrime Measures
Amidst a bewildering array of new teams and initiatives is a plan to more effectively fight cybercrime in the U.K.

Download our iPad App
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act
Interop Preview: Expert Advice On Building Private Cloud

Exclusive for IWK Readers:
Click here or use Priority Code MP_BTMNLIWKSEC to save $200 off the Early Bird pricing on ALL access and conference passes when you register before March 22nd!

see also...
Why You Should Attend Interop


Download our iPad App

  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF INFORMATIONWEEK GOVERNMENT
A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data.

ALSO: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Insecurity With Java
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe. Get our report today.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Five Critical Components of an Information Security Program
Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Samsung Galaxy S4 - Peak Smartphone?
It’s not about this smartphone or that. Most of the really inventive things we do with our devices come from software added either by the phone markers, users or by the value provided through network-based services.

Apple iPhone 5S: Best And Worst Rumors
What will Apple's next iPhone, or iPhones, look like? As the rumors fly, we separate the likely from the ludicrous for the iPhone 5S.

Google Releases Realtime API For Drive Apps
Developers creating apps that interact with Google Drive now have a simple way to integrate real-time collaboration.

9 More Cloud Computing Pioneers
These industry leaders helped propel cloud computing to the forefront of technology innovation.

10 Space Technologies That Help On Earth
NASA nurtured many innovations, from a portable communications system to an ultrasound machine for telemedicine, that have made the leap from space to Earth.


 

WEBCASTS:

Next-Gen Firewall Management
Are you ready to protect your enterprise with the next generation of firewalls and intrusion prevention? Join us Tuesday March 19 as we look at how next-gen firewalls can provide robust protection against complex attacks by integrating firewalls with intrusion-prevention systems (IPS).
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
It's Your Last Chance To Attend Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment