Tuesday, June 28, 2011

Supreme Court to weigh in on warrantless GPS tracking

Computerworld Security: June 28, 2011
===============================================================

Supreme Court to weigh in on warrantless GPS tracking

The U.S. Supreme Court has decided to hear a case involving the government's
authority to conduct prolonged GPS tracking of suspects in criminal cases
without first obtaining a court warrant
http://cwonline.computerworld.com/t/7408880/818816221/518509/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Diskeeper Corporation~~~~~~~~~~~~~~~~~~~~~

NEW Diskeeper 2011 EnterpriseServer FREE 30-day trialware

Bring your largest and most mission-critical server operations to a new level of
efficiency and reliability. Diskeeper 2011 EnterpriseServer provides
uncompromising peak performance continuously and without requiring downtime or
further management.

http://cwonline.computerworld.com/t/7408880/818816221/518510/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. DHS releases software security scoring system
http://cwonline.computerworld.com/t/7408880/818816221/518511/0/

2. LulzSec's parting Trojan is a false positive
http://cwonline.computerworld.com/t/7408880/818816221/518512/0/

3. Sony 'cut corners' in protecting user data, lawsuit alleges
http://cwonline.computerworld.com/t/7408880/818816221/518513/0/

4. Darlene Storm: Anonymous published anti-cyberterrorism training ISO
http://cwonline.computerworld.com/t/7408880/818816221/518514/0/

5. Symantec compares iOS and Android security
http://cwonline.computerworld.com/t/7408880/818816221/518515/0/

6. Mastercard.com slammed again as punishment over WikiLeaks
http://cwonline.computerworld.com/t/7408880/818816221/518516/0/

7. FTC's Brill: New online privacy tools needed
http://cwonline.computerworld.com/t/7408880/818816221/518517/0/

8. Cellcrypt releases encrypted voice call app for the iPhone
http://cwonline.computerworld.com/t/7408880/818816221/518518/0/

9. L.A. man sentenced for phishing attacks on banks
http://cwonline.computerworld.com/t/7408880/818816221/518519/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: Red Hat~~~~~~~~~~~~~~~~~~~~~

Migrate from VMware to Red Hat Enterprise Virtualization

Join us for a webinar highlighting the cost benefits of migrating from VMware to
Red Hat Enterprise Virtualization. Hear about common customer deployments and
the drivers that lead to migrating to Red Hat and the tools available to help
organizations with planning and executing a migration of their own.

http://cwonline.computerworld.com/t/7408880/818816221/518520/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DHS releases software security scoring system

The Department of Homeland Security, along with the SANS Institute and Mitre,
released a scoring system on Monday designed to help enterprises verify whether
the software they are using meets reasonable standards for secure coding.
http://cwonline.computerworld.com/t/7408880/818816221/518511/0/

LulzSec's parting Trojan is a false positive

The LulzSec hacking group sailed off into the sunset Saturday, leaving behind a
treasure trove of stolen data along with what some antivirus programs identified
as a nasty surprise for anyone who downloaded the Torrent file: a Trojan horse
program.
http://cwonline.computerworld.com/t/7408880/818816221/518512/0/

Sony 'cut corners' in protecting user data, lawsuit alleges

Three PlayStation Network users charge that Sony 'cut corners' in its efforts to
protect personal data of its users.
http://cwonline.computerworld.com/t/7408880/818816221/518513/0/

Darlene Storm: Anonymous published anti-cyberterrorism training ISO

Anonymous released an ISO of Cyberterrorism Defense and Analysis Center training
for the Sentinel program that seems to have been published by FEMA. Here are
some screenshots of the counter-hacks. Also there is news that anonymous hackers
will teach their own online hacking classes.
http://cwonline.computerworld.com/t/7408880/818816221/518514/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Webroot~~~~~~~~~~~~~~~~~~~~~

Why Web Security is Best Served in the Cloud

Download this informative whitepaper to find out why web security is best served
in the cloud. Fran Howarth, Bloor Research senior security analyst, examines the
benefits of applying protection where threats are being created - at the
Internet layer.

http://cwonline.computerworld.com/t/7408880/818816221/518521/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Symantec compares iOS and Android security

Apple's iOS and Google's Android smartphone platforms are more secure than
traditional desktop-based operating systems, but are still susceptible to many
existing categories of attacks, according toa 23-page report from security
software vendor Symantec.
http://cwonline.computerworld.com/t/7408880/818816221/518515/0/

Mastercard.com slammed again as punishment over WikiLeaks

MasterCard's main website was unavailable for Tuesday as it appeared hackers
were again targeting the company for its refusal to process donations for the
whistle-blowing site WikiLeaks.
http://cwonline.computerworld.com/t/7408880/818816221/518516/0/

FTC's Brill: New online privacy tools needed

The mobile industry should adopt do-not-track tools, an FTC commissioner says.
http://cwonline.computerworld.com/t/7408880/818816221/518517/0/

Cellcrypt releases encrypted voice call app for the iPhone

Cellcrypt released a version of its voice encryption software for Apple's iPhone
on Tuesday, adding to its portfolio of software to prevent eavesdropping on
calls.
http://cwonline.computerworld.com/t/7408880/818816221/518518/0/

L.A. man sentenced for phishing attacks on banks

A 27-year-old man has been sentenced to 13 years in prison for managing a
phishing operation in conjunction with Egyptian hackers that looted consumer
bank accounts.
http://cwonline.computerworld.com/t/7408880/818816221/518519/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN OUR LATEST QUICKPOLL


Do you like the direction Microsoft is headed in with Windows 8?

http://cwonline.computerworld.com/t/7408880/818816221/517845/0/


SHARK TANK
___________

Bad bosses, useless users, clueless consultants, lyrical limericks -- it's all
in a day's tank for Sharky. Join him and his pilot fish for a daily dose of IT
from the trenches.

Submit your true IT tale, and if Sharky takes a bite, he'll send you a sharp
Shark shirt!

http://cwonline.computerworld.com/t/7408880/818816221/256230/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7408880/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7408880/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7408880/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7408880/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7408880/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03NDA4ODgw&x=7d13f081

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7408880/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7408880/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7408880/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 11:11 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive