Friday, 30 August 2013

Confidential Data Is Leaving on Workers' Mobile Devices

Office 2003's Burial Will Resurrect Hacker Activity | 'New York Times' Site Hack Shifts Attention to Registry Locks

CIO Security

Forward this to a Friend >>>


Confidential Data Is Leaving on Workers' Mobile Devices
Are confidential corporate documents finding their way onto employees' personal phones, laptops and tablets? You bet. Even worse, the next-generation workforce doesn't care. Read More


WHITE PAPER: Webroot Software

Phishing 2.0: Why phishing is back as the No. 1 web threat
This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. Learn More

WHITE PAPER: Kony Solutions

Mobile in 2013: A Digital Digest
Resources and tactics for a successful mobile strategy no matter what stage of the process your organization is in. Learn More Now!

Office 2003's Burial Will Resurrect Hacker Activity
The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts. Read More

'New York Times' Site Hack Shifts Attention to Registry Locks
One way that owners of major websites can mitigate the risk of their domains being hijacked like The New York Times' site was on Tuesday is to apply what is known as a registry lock on the domain, security researchers say. Read More

3 Types of DNS Attacks and How to Deal with Them
The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. The changes forced one site offline and caused problems for the others. Here are three ways such attacks happen, and how they can be mitigated. Read More

Facebook Report on Government Data Requests a Reminder There is No Privacy
In releasing its first report on government requests for user information, Facebook is reminding businesses and consumers that use of the Internet today requires self-censorship. Read More


WEBCAST: Dell Wyse and VMware

Capitalizing on Desktop Virtualization
As more than half of those surveyed by IDG move to virtual desktop infrastructure, mastering its complexities has never been more important. With the right best practices and trusted partners, you can do just that--thus accelerating time to value, simplifying deployment and management, and creating organizational agility. View Now

Social Engineering: Study Finds Americans Willingly Open Malicious Emails
In a study conducted by TNS Global for Halon, an email security service, 30 percent of those surveyed admitted they would open an email, even if they were aware that it contained a virus or was otherwise suspicious. To be fair, the study only included 1,000 adults within the U.S., so this isn't a national index by any means. Read More

Developers Hack Dropbox, Show How to Access to User Data
Developers who were able to bypass Dropbox's security by reverse-engineering Python applications -- the language used by the cloud storage provider -- described their technique in a published paper. Read More

Half of Organizations Targets of Cyberattack in Last Year
More 'shocking' is that 10% of organizations polled did not know if they'd been targeted or not. Read More

Cisco Fixes Critical Remote Command Execution Vulnerability in Secure Access Control Server
The vulnerability could allow remote, unauthenticated attackers to take control of the underlying operating system, the company said Read More

FAQs About Hacks: Everything You Need to Know About the Syrian Electronic Army
What is the Syrian Electronic Army? What are they after? Should you be scared? Read on for the answers. Read More


Hot Picks for the Week

1. 10 Things BlackBerry Z10 Does That iPhone Can't

2. The 20 Best iPhone/iPad Games of 2013 So Far

3. Half of Companies Will Require BYOD By 2017

4. Top 10 Programming Skills That Will Get You Hired

5. 25 Crazy and Scary Things the TSA has Found on Travelers


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment