| Office 2003's Burial Will Resurrect Hacker Activity | 'New York Times' Site Hack Shifts Attention to Registry Locks | |||||||||
| CIO Security | |||||||||
| Confidential Data Is Leaving on Workers' Mobile Devices WHITE PAPER: Webroot Software Phishing 2.0: Why phishing is back as the No. 1 web threat This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. Learn More In this Issue
WHITE PAPER: Kony Solutions Mobile in 2013: A Digital Digest Resources and tactics for a successful mobile strategy no matter what stage of the process your organization is in. Learn More Now! Office 2003's Burial Will Resurrect Hacker Activity 'New York Times' Site Hack Shifts Attention to Registry Locks 3 Types of DNS Attacks and How to Deal with Them Facebook Report on Government Data Requests a Reminder There is No Privacy WEBCAST: Dell Wyse and VMware Capitalizing on Desktop Virtualization As more than half of those surveyed by IDG move to virtual desktop infrastructure, mastering its complexities has never been more important. With the right best practices and trusted partners, you can do just that--thus accelerating time to value, simplifying deployment and management, and creating organizational agility. View Now Social Engineering: Study Finds Americans Willingly Open Malicious Emails Developers Hack Dropbox, Show How to Access to User Data Half of Organizations Targets of Cyberattack in Last Year Cisco Fixes Critical Remote Command Execution Vulnerability in Secure Access Control Server FAQs About Hacks: Everything You Need to Know About the Syrian Electronic Army | |||||||||
Hot Picks for the Week 1. 10 Things BlackBerry Z10 Does That iPhone Can't 2. The 20 Best iPhone/iPad Games of 2013 So Far 3. Half of Companies Will Require BYOD By 2017 4. Top 10 Programming Skills That Will Get You Hired 5. 25 Crazy and Scary Things the TSA has Found on Travelers | |||||||||
| Get more CIO peer perspective online You are currently subscribed to cio_security as buzzhairs.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact CIO.com, please send an e-mail to online@cxo.com. Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. ** | |||||||||
Friday, 30 August 2013
Confidential Data Is Leaving on Workers' Mobile Devices
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment