Wednesday, June 22, 2011

Despite arrest, Lulzsec sails on

Computerworld Security: Issues and Trends: June 22, 2011
===============================================================

Despite arrest, Lulzsec sails on

The hacking group known as LulzSec pledged to continue their online rampage
Tuesday, a day after U.K. police arrested a man allegedly affiliated with the
group.
http://cwonline.computerworld.com/t/7397810/818816226/517726/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC~~~~~~~~~~~~~~~~~~~~~

Managing Cloud Services from Request to Retirement

This lifecycle is tailored to the needs of the business, with both the
flexibility to deliver the full required software stacks and the management
rigor to ensure the operational integrity of the cloud.

http://cwonline.computerworld.com/t/7397810/818816226/517727/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. DNS agility leads to botnet detection
http://cwonline.computerworld.com/t/7397810/818816226/517728/0/

2. Researchers: Amazon cloud users leave security holes
http://cwonline.computerworld.com/t/7397810/818816226/517729/0/

3. Michael Horowitz: Five approaches for defending a Windows PC prove their worth
http://cwonline.computerworld.com/t/7397810/818816226/517730/0/

4. Security Manager's Journal: Sometimes nothing gets done if you don't do it yourself
http://cwonline.computerworld.com/t/7397810/818816226/517731/0/

5. Sharky: And how much more secure can you get than that?
http://cwonline.computerworld.com/t/7397810/818816226/517732/0/

6. Vulnerability analysis tools add compliance features
http://cwonline.computerworld.com/t/7397810/818816226/517733/0/

7. Do you know where your security holes are?
http://cwonline.computerworld.com/t/7397810/818816226/517734/0/

8. Mesh networks may make SQL injection attacks more persistent
http://cwonline.computerworld.com/t/7397810/818816226/517735/0/

9. Research group developing new cybersecurity tools
http://cwonline.computerworld.com/t/7397810/818816226/517736/0/

10. Senator: New cybersecurity regulations needed for banks
http://cwonline.computerworld.com/t/7397810/818816226/517737/0/

11. NSA wants bulletproof smartphone, tablet security
http://cwonline.computerworld.com/t/7397810/818816226/517738/0/

12. Pentagon building Internet simulator to practice cyberwar
http://cwonline.computerworld.com/t/7397810/818816226/517739/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco Systems, Inc. ~~~~~~~~~~~~~~~~~~~~~

Unite Communications Across Multiple Devices

Mobile devices, delivery models, and new applications are redefining our jobs.
Find out how your company can unite communications across multiple devices,
allowing you to communicate with employees, customers, and partners on any
device, anywhere. View this demo to see how unifying your communications
transforms your work and productivity.

http://cwonline.computerworld.com/t/7397810/818816226/515532/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DNS agility leads to botnet detection

Research out of the Georgia Institute of Technology can detect when bot masters
reserve domains to set up command-and-control networks.
http://cwonline.computerworld.com/t/7397810/818816226/517728/0/

Researchers: Amazon cloud users leave security holes

Researchers in Germany have found abundant security problems within Amazon's
cloud-computing services due to its customers either ignoring or forgetting
published security tips.
http://cwonline.computerworld.com/t/7397810/818816226/517729/0/

Michael Horowitz: Five approaches for defending a Windows PC prove their worth

Has the previous Defensive Computing advice offered in this blog been
worthwhile? I think so.

http://cwonline.computerworld.com/t/7397810/818816226/517730/0/

Security Manager's Journal: Sometimes nothing gets done if you don't do it yourself

Our manager's growing IT department has a lot of new managers, and they want to
oversee the actual implementation of security projects. But very little
implementation is actually taking place.
http://cwonline.computerworld.com/t/7397810/818816226/517731/0/

Sharky: And how much more secure can you get than that?

This pilot fish is asked to code a secure login access system for a new service
at a university, and he does -- but then he points out that it won't provide
actual security.

http://cwonline.computerworld.com/t/7397810/818816226/517732/0/

Vulnerability analysis tools add compliance features

Compliance is a natural extension of a vulnerability analysis tool. Normal
vulnerability scanning includes searching for unpatched systems, unprotected
directories, and other errors in configuration. (Insider content -- free
registration required.)
http://cwonline.computerworld.com/t/7397810/818816226/517733/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: SAP~~~~~~~~~~~~~~~~~~~~~

Use Data to Beat the Competition

Most companies recognize the importance of their data - but few are leveraging
it to full advantage. So while your competitors sit back, you can sprint ahead -
helping to cut costs, boost profits, build loyalty, and solve a myriad of
day-to-day business challenges. No matter the size of your business, you can
now compete on a level playing field.

http://cwonline.computerworld.com/t/7397810/818816226/517196/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Do you know where your security holes are?

We all worry that there's some lurking security problem in our servers. We do
what we can -- patching, following best practices, keeping up-to-date with
training and news. But wouldn't it be great to have an automated tool to check
our work? That's the promise of vulnerability analyzers: products that detect
problems in configuration, applications and patches.
http://cwonline.computerworld.com/t/7397810/818816226/517734/0/

Mesh networks may make SQL injection attacks more persistent

Mass Web compromises have typically redirected visitors to a handful of central
malware sites, but a peer-to-peer approach will make mass attacks more
pernicious.
http://cwonline.computerworld.com/t/7397810/818816226/517735/0/

Research group developing new cybersecurity tools

The Northrop Grumman Cybersecurity Research Consortium is focused on improving
mobile and cloud security and on reducing the cost of recovery from
cyberattacks.
http://cwonline.computerworld.com/t/7397810/818816226/517736/0/

Senator: New cybersecurity regulations needed for banks

A U.S. senator calls for new cybersecurity regulations for banks.
http://cwonline.computerworld.com/t/7397810/818816226/517737/0/

NSA wants bulletproof smartphone, tablet security

The National Security Agency, America's high-tech spy agency which also plays a
key role in approving hardware and software for use by the Department of
Defense, wants to be able to outfit military personnel with commercial
smartphones and tablets -- but based on an NSA security design.
http://cwonline.computerworld.com/t/7397810/818816226/517738/0/

Pentagon building Internet simulator to practice cyberwar

A model of the Internet where the Pentagon can practice cyberwar games --
complete with software that mimics human behavior under varying military threat
levels -- is due to be up and running by this time next year, according to a
published report.
http://cwonline.computerworld.com/t/7397810/818816226/517739/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN OUR LATEST QUICKPOLL


Are Google Chromebooks right for the enterprise?

http://cwonline.computerworld.com/t/7397810/818816226/516836/0/


SHARK TANK OF THE DAY
______________________

Whaddya mean, sometimes?

User comes to this pilot fish's office to complain that the printer won't print
his job until he puts paper in tray 4. Why would it do that?

http://cwonline.computerworld.com/t/7397810/818816226/517667/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7397810/818816226/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7397810/818816226/311619/0/

Facebook: http://cwonline.computerworld.com/t/7397810/818816226/311620/0/

Twitter: http://cwonline.computerworld.com/t/7397810/818816226/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7397810/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzM5NzgxMA%3d%3d&x=55643aae

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7397810/818816226/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7397810/818816226/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7397810/818816226/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:38 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive