Cyber criminals add new exploit for recently patched Java vulnerability to their arsenal | 'Jekyll' test attack sneaks through Apple App Store, wreaks havoc on iOS

InfoWorld's Security Central

Forward this to a Friend >>>


Don't fall prey to ad networks peddling dicey links
Malicious hackers are now using ad networks to deliver malware to unsuspecting users, most recently to Android users. This sort of attack is not new. But it warrants your attention, especially if you're in charge of your company's Web resources. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Remove the burden of homegrown file transfer—and the risks
Staying on top of file transfer activity can burden IT. Custom scripting and securing FTP tools distracts IT from mission-critical tasks, while cloud solutions don't support compliance mandates—and can increase risks.In a live webinar,discover why every business needs managed file transfer to gain control of compliance and minimize security risk. Reduce security risks, support compliance with managed file transfer Learn how to give IT control over file transfer activity with a managed solution. See how leading companies are doing it. Attend a live webinar. Register

WHITE PAPER: Riverbed Technology

Consolidating Remote Servers and Storage for Security
A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance--even thousands of miles--and still get the same performance as if the storage remained local to the branch. Read more >>

Cyber criminals add new exploit for recently patched Java vulnerability to their arsenal
Cyber criminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned. Read More

'Jekyll' test attack sneaks through Apple App Store, wreaks havoc on iOS
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple's review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS "sandbox" designed to isolate apps and data from each other. Read More

Identity Management: Learn the basics
Identity management is the single most important aspect of your organization's security profile. Our deep dive can show you how to set up and use this vital security tool. Read More

Hacker: I pwned Zuckerberg; at least give me a stupid T-shirt
When Facebook fails to pay $500 bug bounty, a hacker went public -- by hacking Zuckerberg's Facebook account. Read More


DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!


Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_sec_rpt as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2013 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **