RefBan

Referral Banners

Tuesday, June 14, 2011

Arrest of 'Anonymous' Hacker Group Members Claimed; Oracle's Java Update Fixes 17 Remote Execution Vulnerabilities

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 14, 2011
Arrest of 'Anonymous' Hacker Group Members Claimed
Oracle's Java Update Fixes 17 Remote Execution Vulnerabilities
Spammers Require Banks, Suppliers, Staff to Run Illegal Trade
Adobe Preps Quarterly Security Update for Reader, Acrobat
Commerce Department Calls for Partnership on Cyber-Security
SPOTLIGHT
IBM at 100: Biggest Hits and Misses
From its delivery of a fine-tuned punched card to Watson, IBM has a lot to brag about. But it's also had its fair share of duds.
READ MORE >>
BEST OF eWEEK
Mac OS X 'Lion,' iOS 5 Converge in iCloud
Microsoft Offers Windows 8 First Look
iCloud Gives Amazon, Google Competition
Apps That Harness Dual Touch Screens
FEATURED VIDEO
Healthy Dose of Analytics
A Texas hospital slashed patient readmissions by 22% using analytics software.
WATCH NOW >>
MOST READ STORIES
Apple's iOS Stats Put Android's to Shame
Why iPad 3 Should Be Released This Year
Inside Samsung Chromebook Teardown
Why Apple's iPhone 5 Remains a No-Show
IN THIS ISSUE
Arrest of 'Anonymous' Hacker Group Members Claimed
Spanish authorities claim to have captured three members of the "Anonymous" hacker group, which took part in denial-of-service attacks against government Websites. They are also suspected of having some involvement in the attacks against Sony.
READ MORE >>

Oracle's Java Update Fixes 17 Remote Execution Vulnerabilities
Oracle has closed 17 remote execution vulnerabilities in Java, most of which are also present in the browser plug-ins.
READ MORE >>

Sponsored by Lumension


More than 2 million new malware signatures are identified each month and stand-alone AV can't keep up. With Lumension(R) Intelligent Whitelisting(TM), you can proactively protect your endpoints from sophisticated and zero-day threats - and keep your operations productive. Try it free for 30 days.
Learn more.
ADVERTISEMENT
Spammers Require Banks, Suppliers, Staff to Run Illegal Trade
Researchers analyzing spam operations found that they are run like any other business, albeit an illegal one, and rely on banks' merchant services to function.
READ MORE >>

Adobe Preps Quarterly Security Update for Reader, Acrobat
Adobe plans to address several bugs in its Reader and Acrobat software as part of its scheduled quarterly update. All of the vulnerabilities being patched are rated critical.
READ MORE >>

Commerce Department Calls for Partnership on Cyber-Security
The U.S. Department of Commerce's Internet Policy Task Force recommends the federal agency work with private-sector businesses to establish a set of best practices for cyber-security.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: