RefBan

Referral Banners

Thursday, May 26, 2011

10 Biggest Data Breaches of the Year So Far; Microsoft Uncovers 400K Email Addresses on Rustock Hard Drives

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 26, 2011
10 Biggest Data Breaches of the Year So Far
Microsoft Uncovers 400K Email Addresses on Rustock Hard Drives
Insider Malice Suspected in Virus Attack on Dow Jones Network
Mobile Device Data Losses Pose Rising Security Risk
EU e-Privacy Cookie Rules Will Impact Non-European Companies
SPOTLIGHT
Teardown: Covert FBI GPS Auto-Tracker
iFixit cracked open a GPS device capable of constantly tracking location that FBI agents have installed underneath some vehicles.
READ MORE >>
BEST OF eWEEK
Hands-On with Samsung's Chromebook
Windows' Unbreakable Market Dominance
Top 10 Features Microsoft Project 2010
Smart Cable Adds On 3D-Like Depth
FEATURED VIDEO
From Virtualization to Cloud
We bring you tips and strategies to smoothly evolve existing virtualization.
WATCH NOW >>
MOST READ STORIES
Reasons to Adopt Adobe CS 5.5
Why Motorola Delayed the Droid Bionic
How to Recognize Phishing Attacks
Why iPad 3 Should Be Released This Year
IN THIS ISSUE
10 Biggest Data Breaches of the Year So Far
Sony's online entertainment services, email marketing provider Epsilon, Expedia's Trip Advisor. At one point, it seemed like there was at least one new security breach being reported every week. eWEEK analyzed a list pulled from PrivacyRights.org containing more than 150 events reported in 2011 to bring you the largest breaches reported so far this year.
READ MORE >>

Microsoft Uncovers 400K Email Addresses on Rustock Hard Drives
While digging through the hard drives seized as part of the Rustock takedown in March, Microsoft's forensic experts have uncovered thousands of compromised email addresses.
READ MORE >>

Sponsored by Symantec


Visit the new Security Solution Center on eWeek.com for the latest IT security news, reviews, videos, and resources.
Go to the Security Solution Center
ADVERTISEMENT
Insider Malice Suspected in Virus Attack on Dow Jones Network
The suspicion that a vengeful insider launched a virus attack on Dow Jones' corporate networks demonstrates how easily a disgruntled current or former employee can hold a network hostage.
READ MORE >>

Mobile Device Data Losses Pose Rising Security Risk
Organizations are increasingly becoming dependent on mobile devices, but they face big security challenges as lost or stolen devices compromise sensitive data.
READ MORE >>

EU e-Privacy Cookie Rules Will Impact Non-European Companies
Any company doing business in the European Union will be expected to comply with the EU's new cookie law, except it's unclear what that law is.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: