Friday, July 12, 2013

Wanted: More Bug Bounty Hunters | Microsoft Helps NSA Collect Customer Data

If you have trouble viewing this email, read the online version.

InformationWeek Daily
InformationWeek Daily  
  Friday, July 12, 2013
MUST READ
Mathew Schwartz Microsoft Helped NSA Siphon Hotmail, Skype User Data
Microsoft says it takes your privacy seriously, but legal compliance with court-ordered NSA surveillance programs -- including Prism -- is mandatory.

Bug Bounty Programs Beat Internal Researchers
Want to chase down vulnerabilities faster? Paying external security researchers delivers great bang for the buck, study says.

Feds Shared Chinese Hacker Data With Service Providers
FBI and Homeland Security temporarily slowed attacks by giving U.S. service providers info on Chinese hackers' command-and-control infrastructure.

Overcome The Microsoft Mindset: Patch Faster
Why can't vendors patch every critical bug like it was the Pwn2Own competition?

Windows Phone Scores More Key Apps
Path, Flipboard, Vine and other popular apps are on the way, but sorry, Instagram fans, still no Windows Phone app.

Dell, Lenovo See Silver Lining In Stormy PC Market
PC market's longest decline in history may be slowing, as the U.S. market shows a few signs of life.

DeepDB: General Purpose Database For Big Data Era
Startup's new database handles structured, semi-structured and unstructured data. But is it a hard sell in today's enterprise?


QUOTE OF THE DAY
"Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken." -- Frank Herbert


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • Why You Need An App Store

    As smartphones and tablets displace PCs as the client device of choice for more workers, software distribution and management strategies must adapt. It's a pull, not push world. Time to get an enterprise app store open for business.

  • Research: 2013 Strategic Security Survey

    Our 1,029 respondents are getting wise on awareness, with just 13% saying they're more vulnerable than last year. Still, 73% see mobility as a threat, and 75% admit they may be ignorant of a breach.

MORE REPORTS
spacer spacer spacer
  • There is No Security Silver Bullet, but What if...

    You know it: there is no silver bullet for today's IT security challenges. I mean no disrespect for industry security vendors. The security industry is working fast and furious to keep pace with a wild environment and ever-changing threat landscape. ...

  • Mission critical defense

    Read this white paper and learn how to respond to attacks and how to mitigate risks as efficiently and effectively as possible.

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

6 Skype Alternatives Worth Considering
Skype might be the de facto choice for video and voice calls over the Internet. But here are other options you should explore.

Smartphones With Physical Keyboards
Do you want a physical keyboard on your smartphone? The new BlackBerry with a hard keyboard will be here soon, but there are alternatives. Here we show you eight phones, including six not from BlackBerry.

How To Hack Facebook In 60 Seconds
Facebook rewards U.K. researcher with $20,000 for discovering a mobile device confirmation bug that could be used to take control of any Facebook account.

 

SLIDESHOWS
10 Facebook Features To Help You Get Ahead
Facebook may not be the core of your professional social network, but you should be doing these things on Facebook to get connected, get protected and get ahead.   View Now
10 Facebook Features To Help You Get Ahead

ALSO SEE
7 Ways To Create E-Portfolios
10 Best iPad Cases Cover Work, Play

MORE SLIDESHOWS
spacer spacer spacer
spacer
 
WEBCASTS
  • Building Confidence in Big Data with Information Integration and Governance

    Join guest speaker, Michele Goetz, Forrester research analyst, as she reviews the latest research findings on Information Integration and Governance in the era of big data and David Corrigan, Director, Product Marketing, InfoSphere for IBM who will discuss how information ...

  • Wireless Security: Beyond the Basics

    Register for this webinar to join Bill Prout, wireless and network security expert at Sophos, and learn the best practices that can help you go beyond the basics of wireless security to provide advanced security, manageability and accessibility.

 


This e-mail was sent to sojo.blo@gmail.com

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment