Wednesday, September 28, 2011

Lawmakers want investigation of supercookies

Computerworld Security: Issues and Trends: September 28, 2011
===============================================================

Lawmakers want investigation of supercookies

Two U.S. lawmakers have called on the U.S. Federal Trade Commission to
investigate the use of so-called supercookies on many websites, saying that use
of the hard-to-remove tracking tools may be an unfair business practice.
http://cwonline.computerworld.com/t/7605179/818816226/532713/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Symantec~~~~~~~~~~~~~~~~~~~~~

IT Security Threats Are Changing Every Minute

Why settle for less when it comes to your antivirus software? Symantec Endpoint
Protection 12 offers break-through community and cloud-based reputation
technology to monitor running applications for suspicious behaviors and block
zero-day threats in real-time before they can do damage to your systems.

http://cwonline.computerworld.com/t/7605179/818816226/532714/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Scammers pretend to be friendly office printers
http://cwonline.computerworld.com/t/7605179/818816226/532715/0/

2. 5 more dirty tricks: Social engineers' latest pick-up lines
http://cwonline.computerworld.com/t/7605179/818816226/532716/0/

3. NSA label-based system could secure big data
http://cwonline.computerworld.com/t/7605179/818816226/532717/0/

4. Concern over U.S. snoops drives Canadian political party to cloud-based encryption
http://cwonline.computerworld.com/t/7605179/818816226/532718/0/

5. SIEM: Dead as claimed?
http://cwonline.computerworld.com/t/7605179/818816226/532719/0/

6. Bad new world: Cyber risk and the future of the United States
http://cwonline.computerworld.com/t/7605179/818816226/532720/0/

7. Group urges U.S. to require warrants for location-based tracking
http://cwonline.computerworld.com/t/7605179/818816226/532721/0/

8. Senators question whether Google has biased search results
http://cwonline.computerworld.com/t/7605179/818816226/532722/0/

9. Security Manager's Journal: The bad guys are in the house
http://cwonline.computerworld.com/t/7605179/818816226/532723/0/

10. 5 secrets to building a great security team
http://cwonline.computerworld.com/t/7605179/818816226/532724/0/

11. Kenneth van Wyk: Security failures could erode public trust in the Internet
http://cwonline.computerworld.com/t/7605179/818816226/532725/0/

12. Master two words to advance your security career
http://cwonline.computerworld.com/t/7605179/818816226/532726/0/

13. Sharky: When in doubt, it must be a botnet, right?
http://cwonline.computerworld.com/t/7605179/818816226/532727/0/

14. Darragh Delaney: 9 top tips for upgrading controlled systems
http://cwonline.computerworld.com/t/7605179/818816226/532728/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~

Setting a Strategy for Secure Mobile Printing

HP's mobile printing solutions help employees to print securely and easily no
matter if they're on the go, in the office or at home.

http://cwonline.computerworld.com/t/7605179/818816226/532729/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Scammers pretend to be friendly office printers

Hackers have found a new hook to trick people into opening malicious
attachments: send emails that purport to come from office printers, many of
which now have the ability to email scanned documents.
http://cwonline.computerworld.com/t/7605179/818816226/532715/0/

5 more dirty tricks: Social engineers' latest pick-up lines

From a new twist on tech support to playing the odds with a large number of
desperate job seekers, today's social engineers are getting very specific in
their plans to manipulate their marks.
http://cwonline.computerworld.com/t/7605179/818816226/532716/0/

NSA label-based system could secure big data

The National Security Agency has submitted Accumulo, its label-based, data-store
software, to the Apache Software Foundation so that other parties can further
develop the technology for use in secure systems.
http://cwonline.computerworld.com/t/7605179/818816226/532717/0/

Concern over U.S. snoops drives Canadian political party to cloud-based encryption

One of Canada's largest political parties is using cloud-based Salesforce.com in
the U.S. to store information about voters and interact with them, but worries
that U.S. government snoops could peek at sensitive information under U.S. law
prompted the Canadian party to use a strong encryption approach.
http://cwonline.computerworld.com/t/7605179/818816226/532718/0/

SIEM: Dead as claimed?

Security practitioners defend the value of SIEM after elQnetworks declares the
technology dead.
http://cwonline.computerworld.com/t/7605179/818816226/532719/0/

Bad new world: Cyber risk and the future of the United States

In September 2007, in a remote laboratory in Idaho, researchers working on a
project dubbed "Aurora" demonstrated the ability of a cyber hacker to destroy
physical equipment -- in this case a generator used to create electricity for
the power grid. The Aurora research brought the question of physical safety and
the ability for a nation to defend itself from attack in the cyber world to the
forefront.
http://cwonline.computerworld.com/t/7605179/818816226/532720/0/

Group urges U.S. to require warrants for location-based tracking

Law enforcement officials should be required to obtain a warrant based on
probable cause before using GPS or other electronic location tracking to follow
individuals, a bi-partisan group said.
http://cwonline.computerworld.com/t/7605179/818816226/532721/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Driving Down Enterprise Storage TCO

The IBM XIV Storage System series is designed to address each of these cost
concerns. Click here to find out how the XIV system's unique architecture and
approach to storage enable it to accomplish a better bottom line for you and
your business.

http://cwonline.computerworld.com/t/7605179/818816226/532730/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Senators question whether Google has biased search results

Several U.S. senators accused Google of giving search preferences to its own
suite of services over competitors, but Executive Chairman Eric Schmidt denied
that his company is manipulating search results.
http://cwonline.computerworld.com/t/7605179/818816226/532722/0/

Security Manager's Journal: The bad guys are in the house

New IDS detects something horrifying.
http://cwonline.computerworld.com/t/7605179/818816226/532723/0/

5 secrets to building a great security team

For a security industry leader, Tim Williams is a pretty modest guy. As the
former head of ASIS International and now as global security director for the
$42.5 billion construction equipment manufacturer Caterpillar, Williams has won
his share of recognition, which he doesn't take lightly.
http://cwonline.computerworld.com/t/7605179/818816226/532724/0/

Kenneth van Wyk: Security failures could erode public trust in the Internet

Recent attacks could reverberate and undercut the public's faith that the
Internet is a trustworthy medium for doing business.
http://cwonline.computerworld.com/t/7605179/818816226/532725/0/

Master two words to advance your security career

"Don't screw up. When you do good, no one pays attention, but if you screw up,
the weight of the world will be dropped on your shoulders."
http://cwonline.computerworld.com/t/7605179/818816226/532726/0/

Sharky: When in doubt, it must be a botnet, right?

IT pilot fish on a military base gets back from a weekend to discover his
computer is running like a slug -- and when he calls the help desk, the tech is
certain he's been infected with a botnet.

http://cwonline.computerworld.com/t/7605179/818816226/532727/0/

Darragh Delaney: 9 top tips for upgrading controlled systems

We all know that it's important to keep our systems up to date with the latest
software upgrades and antivirus updates. However, there are many networks out
there with controlled systems. Examples of controlled systems would be something
that is part of a manufacturing process, or is connected to patient care. These
systems cannot be changed without going through some sort of rigorous change
control and software validation process. The result is that your upgrade
strategy cannot keep pace with operating system updates. (Insider - free
registration required.)

http://cwonline.computerworld.com/t/7605179/818816226/532728/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can Microsoft and Intel's marriage be saved?

http://cwonline.computerworld.com/t/7605179/818816226/530329/0/
rriage_be_saved_


SHARK TANK OF THE DAY
______________________

The smartest man in... well, SOME room

This IT manager pilot fish makes his name setting up a very successful support
center at his company -- and soon he finds himself on a critical sales call with
the CEO.

http://cwonline.computerworld.com/t/7605179/818816226/532605/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7605179/818816226/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7605179/818816226/311619/0/

Facebook: http://cwonline.computerworld.com/t/7605179/818816226/311620/0/

Twitter: http://cwonline.computerworld.com/t/7605179/818816226/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7605179/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzYwNTE3OQ%3d%3d&x=7a965cc9

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7605179/818816226/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7605179/818816226/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7605179/818816226/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 12:16 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive