Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

NASA Mars Mission's Cloud | Flame 2.0 Malware: 7 Key Facts

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Friday, August 10, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist Gauss Espionage Malware: 7 Key Facts
By Mathew J. Schwartz
From targeting Lebanese banking customers to installing a font, security researchers seem to be unearthing as many questions as answers in their teardown of the surveillance malware.

Flame 2.0: Gauss Malware Targets Banking Credentials
5 Steps To Prevent Twitter Hacks

NASA Mars Mission Fueled By Amazon Web Services
Just how is NASA keeping up with all that Mars mission data and imagery? Think cloud: Take a look at the wide range of Amazon Web Services and tools working behind the scenes.

IBM Said To Eye RIM Services Unit
Possible deal would see IBM add struggling smartphone vendor's network operations to outsourcing portfolio.

Apple's Mobile Commerce Future: AuthenTec Just The Start
Look at Apple's proposed buy of fingerprint sensor expert Authentec alongside iOS 6 plans, App Store growth, and Android legal battles, and you'll see a long term competitive strategy.

Big Data Tackles Longtime Salesperson Headaches
One future direction for big data analytics: Help sales pros make productive use of the endless flood of information about prospects.

Jordache Redesigns IT Around Cloud, Google
As '80s icon Jordache attempts a comeback, designer's SVP of operations discusses why it moved 400 blue-jeaned seats to Google Apps and other cloud platforms.

Google $22.5 Million FTC Fine Has No Teeth
FTC privacy fine represents less than a day's profits for Google. But if you care about privacy, you have options.

Blizzard Security Breached, Passwords Accessed
World of Warcraft developer warns that attackers stole usernames and encrypted passwords, urges users to reset logins.

"Minds are like parachutes. They only function when they are open." ~ Sir James Dewar


Google $22.5 Million FTC Fine Has No Teeth
Blizzard Security Breached, Passwords Accessed
Best Practices: Top Tech Tools for Educators
10 Critical Sales Management Reports and 10 Reasons to Care
Google Gmail, Search Linkup Makes Waves
Hackers' Favorite Methods for Attacking Web Users
There's Still Time To Attend Cloud Connect Chicago

Download our iPad App

Posted By There Dude:
"Let's put this speeding ticket violation in perspective. They just wanted to show you ads that were relevant to YOU. Not exactly peering into your bedroom."
In reply to: "Google $22.5 Million FTC Fine Has No Teeth"
View Entire Response | Post Your Own Reply

Posted By JameKatt:
"Why would Samsung buy RIM? It would have nothing successful to copy."
In reply to: "Samsung To RIM: Not Interested"
View Entire Response | Post Your Own Reply

  Digital Issue  
Don't get tripped up by these common payment card data security mistakes: failing to vet the auditor, skipping the pre-audit assessment, losing track of your data, and seven more.

Also in the new, all-digital issue of Dark Reading, Test data security before the auditor arrives, Tim Wilson recommends.

DOWNLOAD NOW FREE (Registration Required)


Best Practices: Top Tech Tools for Educators
This report highlights some top applications being developed and used to increase the effectiveness of instruction and the level of student engagement and higher-order thinking from elementary school through postgraduate studies.
Download Now (Registration Required)

Featured Report
Research: Compliance in the Cloud Era
Just as we're finally getting to a good place with controls, a new pressure is emerging, say the 422 respondents to our 2012 Regulatory Compliance Survey. Enterprises are placing increased reliance on external parties, and 72% of respondents see at least some vendors and partners as a compliance threat. Here's how to minimize your risk.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
10 Critical Sales Management Reports and 10 Reasons to Care
There are currently 10 sales management reports that is not able to produce that can dramatically impact how well sales managers understand what is happening with their pipeline and forecasts. Download this report to learn more.
Download Now (Registration Required)

Top 5 Largest Malware Delivery Networks
Single-layer defenses such as firewalls and anti-virus software are not enough against today's dynamic, evolving threats. View this paper to discover the top 5 malware delivery networks and explore how web security solutions can protect networks by providing intelligent, real-time cloud-based web defense.
Download Now (Registration Required)

Google Gmail, Search Linkup Makes Waves
New audible answering capability will be available in a few days, according to Google. Meanwhile, test showing Gmail messages in personal search results raises some eyebrows.

8 Accountable Care Organizations Worth Closer Look
ACOs break new ground in healthcare as cost pressures mount for providers.

Flame 2.0: Gauss Malware Targets Banking Credentials
Stuxnet, Duqu, and Flame cousin has been used in targeted attacks, operating undetected for at least a year, primarily in Middle Eastern countries.

11 Security Sights Seen Only At Black Hat
Who says fun, sun, malware, and penetration testing don't mix? This year's Black Hat conference in Las Vegas offered information security training, hardware hacking, pool time, and more.

How To Keep Your Best Talent
Pam Slim, author of the bestselling Escape From Cubicle Nation, discusses what might keep our best and brightest from fleeing our cubicles. Maybe the answer is to encourage a "side hustle."


8 Accountable Care Organizations Worth Closer Look
ACOs break new ground in healthcare as cost pressures mount for providers.   View Now

10 Tablets That Will Shake Up 2012
Curiosity's Mars Mission: View The Amazing Technology


spacer spacer spacer
Jelly Bean Demo On The Samsung Galaxy Nexus
BYTE reviewed Jelly Bean on the Samsung Galaxy Nexus. We found that it operated faster and smoother than the previous operating system, Ice Cream Sandwich.   Watch

First Look At Windows 8, Microsoft's Office 2013��
The Most Interesting IT Guy In The World, Part 3



Hackers' Favorite Methods for Attacking Web Users
In this one-hour webinar on Wednesday, August 15, 2012, a leading security expert will discuss cybercriminals' most favored methods for rooking Web users -- and what steps you can take to prevent your users from becoming the next victims. More Information & Registration

Click here


There's Still Time To Attend Cloud Connect Chicago
Cloud Connect is expanding to the Windy City. Join 1,000+ IT professionals at the event where you will learn how to leverage new cloud technology solutions to increase productivity and improve your business agility. Use Priority Code UFPQCH25 for a Free Expo Pass. Join us in Chicago, Sept. 10-13.
Register today!

InformationWeek 2012 State of Server Technology Survey
We are conducting a survey on the current state of server technology within the enterprise. One lucky participant will be randomly selected to win an iPod Touch!
Survey ends Aug. 10

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.