Thursday, September 29, 2011

Network breaches, vulnerabilities no longer required

Computerworld Security: September 29, 2011
===============================================================

Network breaches, vulnerabilities no longer required

Some people presume that network attacks are the result of hackers accessing
un-patched systems. However, most of the recent hacks and attacks that I have
looked at, can be attributed to one or more of the following.
Weak passwords
Introduction of malware onto the network
Holes in network perimeter
Social engineering attacks.

http://cwonline.computerworld.com/t/7607225/818816221/532790/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Symantec~~~~~~~~~~~~~~~~~~~~~

IT Security Threats Are Changing Every Minute

Why settle for less when it comes to your antivirus software? Symantec Endpoint
Protection 12 offers break-through community and cloud-based reputation
technology to monitor running applications for suspicious behaviors and block
zero-day threats in real-time before they can do damage to your systems.

http://cwonline.computerworld.com/t/7607225/818816221/532791/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Zenprise offers iPad app for secure SharePoint access
http://cwonline.computerworld.com/t/7607225/818816221/532792/0/

2. Argonne researchers 'hack' Diebold e-voting system
http://cwonline.computerworld.com/t/7607225/818816221/532793/0/

3. Microsoft's botnet take-down helps protect Mac users
http://cwonline.computerworld.com/t/7607225/818816221/532794/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~

Architecting Resilient Private Clouds

Download this white paper for strategies on making sure your private cloud
remains resilient and available. Learn how to transform your existing data
center into your private cloud while ensuring it is resilient and available.

http://cwonline.computerworld.com/t/7607225/818816221/532795/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Zenprise offers iPad app for secure SharePoint access

Positioned as a data loss prevention tool, the app and server software focus on
enforcing SharePoint content policies on iOS devices
http://cwonline.computerworld.com/t/7607225/818816221/532792/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

Improving Governance, Risk and Compliance

Date: Monday, September 26, 2011, 11:00 AM EDT

In this webcast you'll learn how your organization can become more responsive to
financial market challenges while reassuring decision makers the accuracy of
execution.

http://cwonline.computerworld.com/t/7607225/818816221/532796/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Argonne researchers 'hack' Diebold e-voting system

Argonne National Lab researchers say they easily hacked an electronic voting
machine model that's expected to be widely used to tally votes in the 2012
elections using inexpensive, widely-available electronic components.
http://cwonline.computerworld.com/t/7607225/818816221/532793/0/

Microsoft's botnet take-down helps protect Mac users

Mac users can thank Microsoft for taking down a small but dangerous botnet --
Kelihos.
http://cwonline.computerworld.com/t/7607225/818816221/532794/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can Microsoft and Intel's marriage be saved?

http://cwonline.computerworld.com/t/7607225/818816221/530329/0/
rriage_be_saved_


SHARK TANK OF THE DAY
______________________

Unclear on the whole 'push' concept

This IT pilot fish really appreciates software installations that can be pushed
out to users over the network because techs don't have to physically touch each
workstation. But one software vendor's version of "push" challenges that
concept.

http://cwonline.computerworld.com/t/7607225/818816221/532789/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7607225/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7607225/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7607225/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7607225/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7607225/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03NjA3MjI1&x=8b9c2c33

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7607225/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7607225/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7607225/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive