Wednesday, May 1, 2013

10 Top Password Managers | Labor Dept. Website Hacked, Serves Malware

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, May 1, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

MUST READ
U.S. Labor Dept. Website Hacked, Serves Malware
Attack bears strong similarities to previous campaigns executed by Chinese APT attack group "DeepPanda," reports security expert.

FBI Seeks Real-Time Facebook, Google Wiretaps
Government proposal would expand wiretap laws to cover not just service providers, but also the likes of Facebook and Google.

D-Link Camera Security Flaw: Upgrade Now
16 vulnerable D-Link IP camera models have password issue that provides a back door, so attackers could intercept live video feed.

Can You Hack This Smartphone App For £10,000?
Redact says its peer-to-peer iPhone messaging app is invulnerable to third-party eavesdropping, and invites you to prove it wrong.

IBM Makes Enterprise Mobile Security Move
IBM partners with mobile security vendor Arxan Technologies to secure apps created with its Worklight platform against malware and other attacks.

British Police Haven't Solved Tech Problems
Police languish with old BlackBerrys and no easy way to coordinate tech efforts while the government's promised central crime-fighting idea?

  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF INFORMATIONWEEK
Uncle Sam's taken the lead on secure use of cloud services. Here's how FedRAMP can change your experience, too.

ALSO: Candid career advice for women in IT includes calling work-life balance a myth.

Log In Or Register To Download

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Trends in Mobile Device Threats
With readily available information about the devices in use, and often few corporate safeguards in place, mobile devices are turning out to be a lucrative vector for attackers looking for an in to enterprise networks. In this Dark Reading report, we explain how the threat is growing, what attackers are targeting and why you need to be concerned.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Hope is Not a Security Strategy
When DDoS attacks hit, companies go into crisis mode. It's all hands on deck until the danger passes. Find out how IT professionals across North America are managing the crisis and measuring its bottom-line impact.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

10 Breakthrough DARPA Technologies
From next-generation aircraft to smarter missiles, projects launched by DARPA's Tactical Technology Office push new limits. Take a closer look.

Original iPhone Nears Obsolete Status
As iOS 7 takes shape, Apple prepares to relegate original iPhone to "obsolete" status, which will mean the end of service by AppleCare and retail stores.

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

5 Apple iPad 5 Wishes
Will Apple's 5th-generation iPad be a bore or have innovations galore? We'd like to see five rumors come true.

BlackBerry CEO: Tablets Have No Future
Thorsten Heins says he doesn't think anyone will still be using tablets five years from now.


 

WEBCASTS:

DDoS Attacks: 2013 Industry Report On Attacks Released
Join us for this live webcast on Thursday, May 2, 2013 and we will review the protections tips and findings from Neustar's recent industry survey on DDoS attacks and impact.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment