Kamis, 28 Juli 2011

Stop pass-the-hash attacks before they begin

Phishing scam targets Google AdWords customers | Mac OS X Lion makes the security grade

InfoWorld's Security Central

Forward this to a Friend >>>


Stop pass-the-hash attacks before they begin
Oh how I long for the days of hackers simply cracking password hashes. These days, cracking password hashes is passé. Today's hackers are all about pass-the-hash attacks. Read More


WHITE PAPER: Websense, Inc.

DLP Solutions and Strategies Reviewed
According to the 2011 Verizon Data Breach Report, 96% of data compromises were avoidable and 86% were discovered by someone other than the victim. Preventing data leaks isn't impossible, but it requires vigilance combined with the latest technologies. Read More.

WHITE PAPER: Quantum

Backup 101 – A 2011 Update
Backup continues to be the IT chore that cannot be ignored. In this2011 update, backup expert Curtis Preston discusses the latest options in data deduplication, best practices for high-volume transaction systems that can't afford data loss, the need for email archiving, strategies for keeping the costs of backing up VMs under control, and more. Learn more

Phishing scam targets Google AdWords customers
Google AdWords users, beware: Cyber thieves are sending out bogus phishing emails in an effort to dupe you into surrendering your valuable Google user name and password -- credentials that can be used to get into any other Google service you happen to use, including Google Docs, Calender, Gmail, and Google+. Read More

Mac OS X Lion makes the security grade
For Mac OS X users worried about security, the latest upgrade to Apple's operating system should be enticing. Read More

Contextual mobile management: How real is the promise?
Thanks to their native security and management capabilities, as well as a wide selection of mobile device management tools, most businesses now let employees choose among several smartphones, in addition to iPads and emerging Android tablets. So mobile management is now a checkoff item, right? Buy a tool, set a policy, and you're done. Not quite. Read More

Anonymous, LulzSec vow to hack on
In a defiant statement addressed largely at FBI director Steve Chabinsky, members of the Anonymous and LulzSec hacktivist groups vowed to continue with their hacking campaigns and dared law enforcement to try and stop them. Read More

Drive-by attack shows mobile threat
As smartphones increasingly hold interesting data, attackers will target the devices using known vulnerabilities in common software packages. One security researcher plans to show off just such an attack at next week's Black Hat Security Briefings in Las Vegas. Read More



A D V E R T I S E M E N T
Learn Best Practices for Achieving Pervasive Performance Management

This paper describes how companies can move toward pervasive performance management to drive greater competitive advantage and bottom-line results.
Download now.>>


DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!


Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_sec_rpt as evoismilf.anime@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Tidak ada komentar:

Posting Komentar

Total Tayangan Halaman