Know the cyber enemy: Who's attacking and what they want

Amazon looks to move security appliances to the cloud | AP Twitter hack prompts fresh look at cyber security needs

Today's InfoWorld Headlines: First Look

Forward this to a Friend >>>


Know thy cyber enemy: Who's attacking and what they want
China and Romania spawned the most cyber attacks last year, according to an in-depth study released this week by Verizon. Notably, whereas Romanian attackers were primarily prowling for financial data to score a big payday, Chinese perpetrators were engaged in espionage, focused on swiping trade secrets and internal data. Much of the responsibility for successful data breaches in 2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication. Read More


WHITE PAPER: Citrix

Embracing BYOD Through Secure App & Data Delivery
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution. Learn More

WHITE PAPER: CDW

Ultra-Low-Latency Networking
In a world where so much trading is systematic, millisecond delays matter. Low-latency, high-performance networking, therefore, has become a competitive imperative. Read Now

Amazon looks to move security appliances to the cloud
Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it looks to increase the level of protection users can get in its cloud. For Amazon, proving its cloud computing platform can offer the same level of security as traditional hardware and software has been an ongoing challenge. Read More

AP Twitter hack prompts fresh look at cyber security needs
Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said. Wider use of two-factor authentication, which can involve an access code being sent to a user on a second device such as a smartphone, is one possible solution. Such a mechanism could be introduced selectively, some experts said, for high profile accounts such as celebrities and large corporations. Read More

Microsoft re-releases MS13-036 patch
Microsoft today re-released a security update that had crashed customers' PCs and crippled the machines with endless reboots, saying that the revised patch is now safe to install. The revamped MS13-036 update -- first issued April 9, but pulled three days later from distribution -- "resolves issues some customers experienced," said Microsoft spokesman Dustin Childs in an email Tuesday. Read More

ZTE agrees to Android, Chrome patent licensing from Microsoft
Microsoft has inked an agreement with China's ZTE for its Android and Chrome patent licensing program. The agreement gives ZTE access to Microsoft patents covering phones, tablets, computers, and other devices running Google's Android and Chrome operating systems. ZTE joins others, including Samsung, HTC, and Acer, that have also signed up with Microsoft's patent licensing program. Last week manufacturing giant Foxconn entered into a similar agreement and is paying royalties to Microsoft for access to its patent portfolio Read More



Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_first_look as marketing@newsnews.org.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2013 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Comments