RefBan

Referral Banners

Tuesday, May 24, 2011

How to Recognize, Fight and Stop Phishing Attacks; Google Quietly Fixes Android Authentication Flaw

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 24, 2011
How to Recognize, Fight and Stop Phishing Attacks
Google Silently Patches Android Authentication Flaw
Sony Forced to Fix Another PSN Security Hole
Mistakes, Insider Threats Are Greatest Risks to Database Security
Virus Triggers Data Breach at Massachusetts Agency
SPOTLIGHT
Chromebooks Steal Show at Google I/O
Google introduced notebooks based on the Chrome OS, which is a bold bet against Microsoft Windows and Apple's Mac.
READ MORE >>
BEST OF eWEEK
Why Motorola Delayed the Droid Bionic
Google I/O Delivers 'Honeycomb' 3.1, More
Samsung Droid Charge Impresses
Tiny Atomic Clock on a Chip Debuts
FEATURED VIDEO
Keep Up with Compliance
How you can stay ahead of rapidly evolving laws to avoid fines and sanctions.
WATCH NOW >>
MOST READ STORIES
Teardown: Covert FBI GPS Auto-Tracker
Why iPad 3 Should Be Released This Year
10 Problems Plaguing iPad 2
iPhone 5 Uncertain, so Buy iPhone 4
IN THIS ISSUE
How to Recognize, Fight and Stop Phishing Attacks
Thanks to several high-profile data breaches and personal information thefts at Epsilon and Sony, the number of phishing attacks is bound to increase significantly during the next several months. However, there are a number of ways both individuals and IT security managers can recognize and ultimately fight against these types of phishing attacks. eWEEK offers some pointers and advice.
READ MORE >>

Google Silently Patches Android Authentication Flaw
Google is quietly fixing a security issue that could allow hackers to access the personal information of people who use smartphones based on the Android OS. The flaw only impacts Android applications that authenticate with Google services, such as Calendar and Contacts. The security flaw makes it possible for a cyber-crook to intercept the authentication token and then log on as the user.
READ MORE >>

Sponsored by Novell


Introducing Novell Vibe, a place where enterprise teams can work socially to achieve better results. Combining real-time social networking, online document co-editing and file sharing - all with enterprise-level security and control. It's 'Social Getworking.'
Get Novell Vibe for free, now.
ADVERTISEMENT
Sony Forced to Fix Another PSN Security Hole
Sony has been forced to plug another security hole that could have allowed hackers to gain control of accounts on the PlayStation Network and Qriocity music and video service. The latest security problem surfaced on the Web page that allows users to reset their passwords for their PSN and Qriocity accounts.
READ MORE >>

Mistakes, Insider Threats Are Greatest Risks to Database Security
Human mistakes and malicious insider threats are the biggest concerns that IT administrators are forced to confront when it comes to securing a company's database infrastructure, according to a new study. The rash of recent data breaches has put new focus on database security.
READ MORE >>

Virus Triggers Data Breach at Massachusetts Agency
The Massachusetts Departments of Unemployment Assistance and Career Services is investigating how its network became infected with a virus that steals personal information. The agency suspects that about 1,500 computers have been infected with the virus since April 20.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Meeting the New Demands for Management & Security with All-In-One PCs
May 23, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
vPro is also the key to manage the security issues in a far more rigorous and comprehensive fashion due to increasing governance and compliance demands as well as new and evolving threats. Lenovo adds to vPro with their own unique solutions.
REGISTER >>

Android Tablets in Education
May 24, 2011 at 3:00 p.m. Eastern / 12:00 p.m. Pacific (Duration 60 minutes)
Join us for a live, interactive eSeminar and gain valuable insights as industry experts and university officials outline the benefits and uses of Android tablets in higher education.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: