Thursday, September 1, 2011

Hackers may have stolen over 200 SSL certificates

Computerworld Security: September 01, 2011
===============================================================

Hackers may have stolen over 200 SSL certificates

Hackers may have obtained more than 200 digital certificates from a Dutch
company after breaking into its network, including ones for Mozilla, Yahoo and
the Tor project, a security researcher reported today.
http://cwonline.computerworld.com/t/7538606/818816221/528926/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Websense, Inc.~~~~~~~~~~~~~~~~~~~~~

Unified Content Security Defined

In particular, this paper defines a unified content security solution as one
that has a unified architecture, consisting of unified content analysis, a
unified platform, and unified management capabilities. A detailed explanation is
provided for each of these components and the individual elements that comprise
them.

http://cwonline.computerworld.com/t/7538606/818816221/528927/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Mac OS X can't properly revoke dodgy digital certificates
http://cwonline.computerworld.com/t/7538606/818816221/528928/0/

2. Hackers break into Linux source code site
http://cwonline.computerworld.com/t/7538606/818816221/528929/0/

3. Secunia integrates patching tool with Microsoft's WSUS
http://cwonline.computerworld.com/t/7538606/818816221/528930/0/

4. IBM to acquire i2 for criminal mastermind software
http://cwonline.computerworld.com/t/7538606/818816221/528931/0/

5. VMware strives to expand security partner ecosystem
http://cwonline.computerworld.com/t/7538606/818816221/528932/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

The Benefits of Cloud Computing

Although the benefits of cloud computing are clear, so is the need to develop
proper security for cloud implementations. The following whitepaper provides an
overview of key security issues related to cloud computing, concluding with the
IBM Point of View on a secure cloud architecture and environment.

http://cwonline.computerworld.com/t/7538606/818816221/528933/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mac OS X can't properly revoke dodgy digital certificates

A programming glitch in Apple's OS X operating system is making it hard for Mac
users to tell their computers not to trust digital certificates, exacerbating an
ongoing security problem with a Dutch certificate authority that was recently
hacked.
http://cwonline.computerworld.com/t/7538606/818816221/528928/0/

Hackers break into Linux source code site

As Linux fans know, there are two kinds of hackers: the good guys who develop
free software, such as the Linux kernel, and the bad guys who break into
computers.
http://cwonline.computerworld.com/t/7538606/818816221/528929/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker~~~~~~~~~~~~~~~~~~~~~

Resource: iOS White Paper and Deployment Kit

Quickly Develop and Deploy iOS Solutions. With FileMaker Pro, iPad and iPhone
solutions can be prototyped and completed in hours or days versus weeks or
months. No iOS application programming or design experience is required.

http://cwonline.computerworld.com/t/7538606/818816221/527588/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Secunia integrates patching tool with Microsoft's WSUS

Secunia, a Danish security company that makes two tools that ensure applications
have up-to-date patches, released a product on Wednesday that can deploy
non-Microsoft patches using that company's widely used patching tool.
http://cwonline.computerworld.com/t/7538606/818816221/528930/0/

IBM to acquire i2 for criminal mastermind software

Expanding its portfolio of analytic software for state and local governments,
IBM is in the process of acquiring security analytics software provider i2, the
companies announced Wednesday. Terms of the deal were not disclosed.
http://cwonline.computerworld.com/t/7538606/818816221/528931/0/

VMware strives to expand security partner ecosystem

VMware yesterday said it has added more security vendor partners to its vShield
product-development program in which security firms work with the company to
develop data protection specifically designed for VMware's flagship
virtualization platform, which today is vSphere 5.0.
http://cwonline.computerworld.com/t/7538606/818816221/528932/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Computerworld's IT Careers Special Report: What's the IT job market look like?

The editorial department of Computerworld is preparing a special report on IT
careers, and we're interested in your feedback.

This short survey contains fewer than 10 questions about your IT career plans
and job search status and your predictions for the future of the IT profession,
plus demographic questions, and takes less than 10 minutes to complete.

Click here to take the survey: http://cwonline.computerworld.com/t/7538606/818816221/525081/0/

Results of this survey will be part of the December 19 special report on IT
careers.



CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Should AT&T be allowed to acquire T-Mobile?

http://cwonline.computerworld.com/t/7538606/818816221/528774/0/
owed_to_take_over_T_Mobile_

SHARK TANK OF THE DAY
______________________

Why can't we get problem reports this good nowadays?

It's the mid-1980s, and this pilot fish is working as a technician in a retail
computer store when a customer arrives with an IBM PC/XT with a problem -- and a
two-year-old who says he "put a number in the drive."

http://cwonline.computerworld.com/t/7538606/818816221/528824/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7538606/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7538606/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7538606/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7538606/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7538606/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03NTM4NjA2&x=523d1bb9

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7538606/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7538606/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7538606/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:12 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive