Wednesday, May 15, 2013

Why Tech Support Scams Thrive | 3 Mistakes In Security Incident Response

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, May 15, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Microsoft Tech Support Scams: Why They Thrive
By Mathew J. Schwartz
Readers detail "frozen DNS Trojan" cold calls and "repairs" that lead to $882 in unauthorized wire transfers.

MUST READ
3 Big Mistakes In Security Incident Response
Avoid these common "tunnel vision" mistakes when investigating a breach or hack.

FBI Briefs Bank Executives On DDoS Attack Campaign
FBI expedited security clearances so it could share classified info on Operation Ababil, a distributed denial of service attack that continues to disrupt U.S. financial websites.

VMware Fights Android BYOD Headaches
VMware's BYOD ambitions kick into gear through its partnership with Verizon. But is the virtualization heavyweight making its mobile management play too late?

LulzSec Hacker 'Pirates' Face Sentencing
Four members of Anonymous spinoff faced sentencing Wednesday for leaking data and launching distributed denial of service attacks against Sony, the Pentagon and other major sites.

  Digital Issue  
INSIDE THE LATEST ISSUE OF INFORMATIONWEEK EDUCATION
The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders. Also in the new, all-digital issue of InformationWeek Education: Students can use technology to undermine the integrity of education.
Log In Or Register To Download

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Managing Mobile Security in Small and Midsize Businesses
When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes -- otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. We examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Google Glass Gets Smeared: 11 Improvement Ideas
Comedians and pundits are making a mockery of Google Glass. Here are 11 ways Google could get the last laugh.

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Apple, Samsung Chew Up Smartphone Profits
Samsung eats into Apple's profits in Q1, but the two smartphone giants' closest competitor took only 1% of the sector's profits.

FedEx Makes Strategic Shift
As part of a broader strategy to cut costs and modernize its IT, FedEx offered a voluntary buyout to IT and select other workers as it adjusts its talent mix by giving more work to service providers.
 

WEBCASTS:

Cloud Security: It's Not Just for IT Anymore
Attend this webinar to learn more about social cloud solutions with application security that meet the needs of both IT and Line-of-Business (LOB). It happens.
Wednesday, May 22, 2013

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment