Friday, 16 August 2013

Windows XP's Retirement Will be Hacker Heaven

How Security Smart is Generation Y? | Rise in Data Breaches Drives Interest in Cyber Insurance

CIO Security

Forward this to a Friend >>>


Windows XP's Retirement Will be Hacker Heaven
Hackers will bank bugs until after Microsoft retires Windows XP in April 2014; expect attacks, say security experts. Read More


WHITE PAPER: Coverity

Development Testing for Competitive Advantage
Regardless of what industry they are in, more and more companies are finding themselves in the software business as they seek competitive advantage by developing and delivering increasingly complex applications to their customers. Read Now!

WHITE PAPER: KeyedIn Solutions

Navigating the Project Management Minefield
This white paper outlines the project pitfalls that cost companies invaluable time and money, and covers the project management roles that can be synergized to turn projects from an organizational drain to a competitive advantage. Learn More.

How Security Smart is Generation Y?
Some experts call Millennials the 'new threat vector.' But others say the weakest link in the enterprise is people of any age Read More

Rise in Data Breaches Drives Interest in Cyber Insurance
Growing awareness of cyber threats and reporting requirements by regulators are driving a newfound interest in insurance products covering data breaches and other computing risks. Read More

NSA Revelations a Mixed Bag for Private Clouds
Life in the cloud hasn't been the same since Edward Snowden began leaking secrets about government snooping on the Internet. Read More


WHITE PAPER: Ricoh Corporation

Improved document driven processes can impact growth
Document-driven processes—business processes that are governed and controlled by documents— are vital in organizations, governing a wide range of functions in the enterprise. Learn More

Start Isolating Critical XP Systems Now, Experts Say
Problem of no more updates after April 8, 2014 becomes complicated for companies, retailers running specialty software dependent on XP. Read More

Chinese Hacker Group Behind New York Times Attack Returns with Updated Tools
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from security vendor FireEye. Read More

Baby Monitor Hack Highlights Manufacturers' Security Shortfalls
In addition to lax passwords, manufacturer lacks a effective way to get its patches and updates out to customers. Read More

Researchers Propose Security That Adapts to Combat Malware That Morphs
Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with security software that detects the presence of attack code even if it has morphed and tracks down domains that infected client machines report to. Read More


Hot Picks for the Week

1. 15 Best iPad Apps for Newbies

2. Sign up for InCITE, the weekly CITEworld newsletter on consumerization

3. 7 Most Important Tech Trends Of 2012

4. Holiday Tech Gadget Gift Guide

5. 10 Must-Know Samsung Galaxy Note II Tips and Tricks


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment