CNET’s Livestream of the 2012 Consumer Electronics Showcase: Watch Online

/
The 2012 Consumer Electronics Showcase, presented by the International Consumer Electronics Association, is this week in Las Vegas, Nevada. The 2012 CES will feature some of consumer electronics’ biggest names and brands unveiling their next big things.

MobileIron Will Demo Enterprise Mobile Device Management and Security at CES in Verizon Booth

/
MobileIron, the innovator in enterprise management and security for mobile devices and apps, will be demonstrating its enterprise mobile device management and security platform in the Verizon booth at the Consumer Electronics Show (CES) in Las Vegas . The MobileIron platform was purpose-built for global companies to secure and manage mobile devices and apps. As business mobilizes, IT must support multiple operating systems, secure enterprise data on both corporate and employee-owned devices, and build and deliver mobile apps. MobileIron provides the most scalable solution for mobile device management, security and enterprise app storefronts.

Online Registration Closes Friday for 2012 DoD Cyber Crime Conference

/
REGISTER NOW to get trained by the experts in revolutionary technologies and techniques for exposing and preventing cyber crime. There is still time to make your plans and reserve your spot. ONLINE CONFERENCE REGISTRATION HURRY! Online conference registration closes this Friday, January 13, 2012

First “Patch Tuesday” of 2012

/
In the first “Patch Tuesday” of 2012, Microsoft is releasing seven security bulletins to address software issues an attacker could use to remotely exploit and take control of infected Windows systems. Patch Tuesday occurs on the second Tuesday of each month and on that day Microsoft releases security patches to fix vulnerabilities found in their products.

ShmooCon 2012 – January 27-29

/
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Break It and Bring It On.

Spear Phishing: A Quick Review

/
Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear Phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information (SearchSecurity, 2005).

SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012

/
2011 was an attention-grabbing year in the information security industry. We saw some interesting things such as mobile apps become a talking point as well as some Mac OS X malware. Furthermore, the issues pertaining insider threat, hacktivism, Stuxnet’s sibling Duqu, social networking site vulnerabilities as well as our share of zero-day attacks to name a few. So, what is in store for 2012 you ask?