Wednesday, January 28, 2015

6 DNS services protect against malware and other unwanted content

Computerworld Security: Issues and Trends: January 28, 2015
===============================================================

6 DNS services protect against malware and other unwanted content

A good DNS service can protect users from a variety of unwanted Web intruders,
including phishing sites and botnets. We look at six of them.
http://cwonline.computerworld.com/t/9117041/823929840/716471/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=45aa3ac3

~~~~~~~~~~~~~~~~~~~WHITE PAPER: RSA~~~~~~~~~~~~~~~~~~~~~

Infographic: Data Access Governance

Did you know that 80% of enterprise data is unstructured and doubling every 90
days? Did you know that 76% of organizations find it challenging to control
access to sensitive data? Read this Infographic to learn more.

http://cwonline.computerworld.com/t/9117041/823929840/716472/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=489e7a66

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 'Ghost' flaws poses high risk to Linux distributions
http://cwonline.computerworld.com/t/9117041/823929840/716473/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=bc453ed8

2. FTC wants IoT vendors to safeguard privacy
http://cwonline.computerworld.com/t/9117041/823929840/716474/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e5acdd63

3. DNS hijacking flaw affects D-Link DSL router, possibly other devices
http://cwonline.computerworld.com/t/9117041/823929840/716475/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=08688293

4. INSIDER: Why smart devices and wearables will be security's new headache
http://cwonline.computerworld.com/t/9117041/823929840/716476/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=62c1a4bc

5. Be prepared for the breach that's headed your way
http://cwonline.computerworld.com/t/9117041/823929840/716477/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3921c208

6. Wikileaks staffers are SHOCKED that FBI read their Gmail
http://cwonline.computerworld.com/t/9117041/823929840/716478/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e9d5437a

7. INSIDER: The 2015 Social Engineering Survival Guide
http://cwonline.computerworld.com/t/9117041/823929840/716479/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=152ad05a

8. Thousands of U.S. gas stations vulnerable to cyberattacks
http://cwonline.computerworld.com/t/9117041/823929840/716480/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=0287f22f

9. CryptoWall ransomware is back after two month absence
http://cwonline.computerworld.com/t/9117041/823929840/716481/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=20a5799a

10. Now on CIO: 6 biggest business security risks and how to fight them
http://cwonline.computerworld.com/t/9117041/823929840/716482/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e20b0ba0


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CIO Perspectives Conference~~~~~~~~~~~~~~~~~~~~~

Reserve your seat today for CIO Perspectives Dallas

Some of our agenda highlights include these sessions and topics: Tapping into
the Innovative Minds of Millennials, Clearing Away the FUD Factors in
Cybersecurity Decision-Making, Charting the Future of the Digital Enterprise,
and Straight Talk About SMAC.

http://cwonline.computerworld.com/t/9117041/823929840/713400/35/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

'Ghost' flaws poses high risk to Linux distributions

A fault in a widely used component of most Linux distributions could allow an
attacker to take remote control of a system with just a malicious email.
http://cwonline.computerworld.com/t/9117041/823929840/716473/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=16328ee2

FTC wants IoT vendors to safeguard privacy

The FTC wants companies developing Internet-of-Things products to adopt best
practices to protect the privacy and security of consumers.
http://cwonline.computerworld.com/t/9117041/823929840/716474/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d884eaa1

DNS hijacking flaw affects D-Link DSL router, possibly other devices

A vulnerability found in a DSL router model from D-Link allows remote hackers to
change its DNS settings and hijack users' traffic.
http://cwonline.computerworld.com/t/9117041/823929840/716475/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cc95eb96

INSIDER: Why smart devices and wearables will be security's new headache

First it was BYOD and how to secure all of those smartphones in your
organization. Now those smart devices are communicating with smartphones, and
that means they're the weakest link in your cyber kill chain. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/9117041/823929840/716476/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2ce3b1fa

Be prepared for the breach that's headed your way

If we learned anything in 2014, it was that no one is immune to a massive data
breach. If one hits you this year, are you going to have the visibility that
will let you tell the executive team what they need to know?
http://cwonline.computerworld.com/t/9117041/823929840/716477/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=caef78fa

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

What's New in Elastic Storage Version 4.1

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM
Elastic Storage to improve the power of their voice recognition applications by
managing storage growth, cost and complexity while increasing performance.

http://cwonline.computerworld.com/t/9117041/823929840/716483/41/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=92f73113

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Wikileaks staffers are SHOCKED that FBI read their Gmail

Wikileaks really needs your donation -- to purchase an email server. Three
Wikileaks staffers, working for an organization hated by the U.S. government,
led by a man critical of the both the U.S. and Google, decided to use Google's
Gmail -- because it's so good.
http://cwonline.computerworld.com/t/9117041/823929840/716478/42/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e6b93eec

INSIDER: The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social
engineering tactics always seem to go underappreciated by enterprise security
teams. However, it's often easier to trick someone into opening an email and
exploiting a vulnerability that way, or convincing an unsuspecting assistant to
provide a few useful bits of information, than it is to directly attack a web
application or network connection. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9117041/823929840/716479/43/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ad78b3ac

Thousands of U.S. gas stations vulnerable to cyberattacks

Automated tank gauges used to trigger alarms in case of problems at gas stations
such as fuel spills are vulnerable, according to Rapid7.
http://cwonline.computerworld.com/t/9117041/823929840/716480/44/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=0c242b0f

CryptoWall ransomware is back after two month absence

Attackers are now distributing a new and improved version of the CryptoWall
file-encrypting ransomware program.
http://cwonline.computerworld.com/t/9117041/823929840/716481/45/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=82aa6bda

Now on CIO: 6 biggest business security risks and how to fight them

IT and security experts discuss the leading causes of security breaches and what
your organization can do to reduce them.
http://cwonline.computerworld.com/t/9117041/823929840/716482/46/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1196abbf



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Digital Spotlight: Mobile Security

Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9117041/823929840/693449/47/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=18c9b4cb

Computerworld's Digital Magazine

Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The January edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9117041/823929840/713903/48/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9117041/823929840/641183/49/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9117041/823929840/689330/50/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9117041/823929840/689330/51/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9117041/823929840/156832/52/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9117041/823929840/311619/53/

Facebook: http://cwonline.computerworld.com/t/9117041/823929840/311620/54/

Twitter: http://cwonline.computerworld.com/t/9117041/823929840/311621/55/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9117041/823929840/131135/56/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTExNzA0MQ%3d%3d&x=b6515d98

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9117041/823929840/689329/57/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9117041/823929840/689329/58/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9117041/823929840/689331/59/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:33 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive