Wednesday, October 26, 2011

Bank adopts 'security data warehouse' to fight persistent security threats

Computerworld Security: Issues and Trends: October 26, 2011
===============================================================

Bank adopts 'security data warehouse' to fight persistent security threats

Zions Bancorporation has set up a massive repository for proactively analyzing a
combination of real-time security and business data in order to identify
phishing attacks, prevent fraud and ward off stealthy hacker incursions known as
advanced persistent threats.
http://cwonline.computerworld.com/t/7661950/818816226/537168/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CA Technologies~~~~~~~~~~~~~~~~~~~~~

Building the Next Generation Data Center

Virtualization promotes flexible utilization of IT resources, reduced capital
costs, high energy efficiency, highly-available applications, and improved
business continuity.

http://cwonline.computerworld.com/t/7661950/818816226/537198/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Widely used encryption standard is insecure, say experts
http://cwonline.computerworld.com/t/7661950/818816226/537170/0/

2. Meru software applies corporate Wi-Fi security to private devices
http://cwonline.computerworld.com/t/7661950/818816226/537171/0/

3. IT Blogwatch: Windows XP becomes zombie tween
http://cwonline.computerworld.com/t/7661950/818816226/537172/0/

4. Appeals court says some claims may proceed in Hannaford data breach lawsuit
http://cwonline.computerworld.com/t/7661950/818816226/537173/0/

5. Thomas J. Trappler: Why physical security matters, even in the cloud
http://cwonline.computerworld.com/t/7661950/818816226/537174/0/

6. Exploit-powered Android Trojan uses update attack
http://cwonline.computerworld.com/t/7661950/818816226/537175/0/

7. Spammers create their own URL shortening services
http://cwonline.computerworld.com/t/7661950/818816226/537176/0/

8. Google Apps failing LAPD, says advocacy group
http://cwonline.computerworld.com/t/7661950/818816226/537177/0/

9. New DOS tool overloads SSL servers with ease
http://cwonline.computerworld.com/t/7661950/818816226/537178/0/

10. Richi Jennings: iPhone app spyware: Shocking enterprise risks
http://cwonline.computerworld.com/t/7661950/818816226/537179/0/

11. FCC unveils tool to help small businesses plan for cyberattack
http://cwonline.computerworld.com/t/7661950/818816226/537180/0/

12. Stupid hacker tricks: Exploits gone bad
http://cwonline.computerworld.com/t/7661950/818816226/537181/0/

13. FCC warns retailers to stop selling signal-jamming devices
http://cwonline.computerworld.com/t/7661950/818816226/537182/0/

14. World's most sophisticated rootkit is being overhauled
http://cwonline.computerworld.com/t/7661950/818816226/537183/0/

15. Despite Stuxnet, Duqu, control system flaws still overlooked
http://cwonline.computerworld.com/t/7661950/818816226/537184/0/

16. Obama issues order aimed at preventing federal data leaks
http://cwonline.computerworld.com/t/7661950/818816226/537185/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker~~~~~~~~~~~~~~~~~~~~~

Resource: iOS White Paper and Deployment Kit

Quickly Develop and Deploy iOS Solutions. With FileMaker Pro, iPad and iPhone
solutions can be prototyped and completed in hours or days versus weeks or
months. No iOS application programming or design experience is required.

http://cwonline.computerworld.com/t/7661950/818816226/535047/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Widely used encryption standard is insecure, say experts

A weakness in XML Encryption can be exploited to decrypt sensitive information,
researchers say.
http://cwonline.computerworld.com/t/7661950/818816226/537170/0/

Meru software applies corporate Wi-Fi security to private devices

WLAN vendor Meru Networks has announced a new optional software module that lets
its Wi-Fi networks recognize privately owned clients and automatically configure
them to meet corporate security and management policies.
http://cwonline.computerworld.com/t/7661950/818816226/537171/0/

IT Blogwatch: Windows XP becomes zombie tween

Microsoft is this week celebrating the 10th birthday of Windows XP, the
preadolescent operating system that will not die. In IT Blogwatch, bloggers
eXPerience XP's twilight years.

http://cwonline.computerworld.com/t/7661950/818816226/537172/0/

Appeals court says some claims may proceed in Hannaford data breach lawsuit

A federal appeals court has cleared the way for a class-action lawsuit to
proceed against grocery chain Hannaford Bros. over a 2007 data breach that
exposed millions of customers' credit and debit cards.
http://cwonline.computerworld.com/t/7661950/818816226/537173/0/

Thomas J. Trappler: Why physical security matters, even in the cloud

Thomas J. Trappler advises you to vet cloud providers to make sure they have
adequate physical security safeguards. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/7661950/818816226/537174/0/

Exploit-powered Android Trojan uses update attack

A new variant of the DroidKungFu Android Trojan is posing as a legitimate
application update in order to infect handsets, according to security
researchers from Finnish antivirus vendor F-Secure.
http://cwonline.computerworld.com/t/7661950/818816226/537175/0/

Spammers create their own URL shortening services

Spammers have created their own services to shorten URLs (uniform resource
locators) in an apparent attempt to circumvent security measures in place at
well-known shortening websites, according to Symantec.
http://cwonline.computerworld.com/t/7661950/818816226/537176/0/

Google Apps failing LAPD, says advocacy group

A consumer advocacy group has released documents it has obtained that indicate
that CSC, the prime contractor for Google Apps services for Los Angeles, has
allegedly not managed to meet the security requirements of the Los Angeles
Police Department.
http://cwonline.computerworld.com/t/7661950/818816226/537177/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Insights from the Global Chief Information Officer Study

Read this white paper to identify the 4 patterns, or mandates, employed by CIOs
when leveraging business and information technology to innovate.

http://cwonline.computerworld.com/t/7661950/818816226/537186/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

New DOS tool overloads SSL servers with ease

A newly released denial-of-service (DOS) tool can be used to bring down SSL
servers using an average laptop computer and a standard DSL connection.
http://cwonline.computerworld.com/t/7661950/818816226/537178/0/

Richi Jennings: iPhone app spyware: Shocking enterprise risks

Many iPhone apps are stuffed with spyware. That's the worrying conclusion from
Troy Hunt's recent analysis of network traffic generated by popular iOS apps.
Enterprises using iPhones and iPads need to be concerned about the
possibilities of data leakage and regulatory non-compliance, argues Richi in
The Long View. (Insider - free registration required.)

http://cwonline.computerworld.com/t/7661950/818816226/537179/0/

FCC unveils tool to help small businesses plan for cyberattack

With hackers increasingly setting their sights on small businesses, the U.S.
Federal Communications Commission said it will provide an online tool to help
those businesses develop a cybersecurity strategy.
http://cwonline.computerworld.com/t/7661950/818816226/537180/0/

Stupid hacker tricks: Exploits gone bad

Taunting tweets, provocative pics, iPad-spam chats -- stupid slip-ups lead to
high-profile hacker arrests.
http://cwonline.computerworld.com/t/7661950/818816226/537181/0/

FCC warns retailers to stop selling signal-jamming devices

The Federal Communications Commission has warned 20 online retailers to stop
selling illegal devices that jam cell phone, GPS and Wi-Fi signals.
http://cwonline.computerworld.com/t/7661950/818816226/537182/0/

World's most sophisticated rootkit is being overhauled

Experts from security vendor ESET warn that TDL4, one of the most sophisticated
pieces of malware in the world, is being rewritten and improved for increased
resilience to antivirus detection.
http://cwonline.computerworld.com/t/7661950/818816226/537183/0/

Despite Stuxnet, Duqu, control system flaws still overlooked

Efforts to strengthen critical infrastructure targets continue to focus on
front-end systems rather than on underlying industrial control systems where the
real problems exist, security experts warned.
http://cwonline.computerworld.com/t/7661950/818816226/537184/0/

Obama issues order aimed at preventing federal data leaks

President Obama has issued an executive order that aims to reform rules for the
sharing and securing of data by federal agencies.
http://cwonline.computerworld.com/t/7661950/818816226/537185/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

TAKE OUR ANNUAL SALARY SURVEY TODAY!

Computerworld's 2012 Salary Survey: What's your earning power? How does your
salary compare with your peers? Computerworld's 26th Annual Salary Survey will
feature the latest IT salary trends and advice on where to find the best-paying
jobs. This year's survey participants can enter a drawing to win 1 of 3 new 16GB
Apple iPad 2s with Wi-Fi! The sweepstakes is open to legal U.S. residents, age
18 or older.

http://cwonline.computerworld.com/t/7661950/818816226/534321/0/

SHARK TANK OF THE DAY
______________________

At least he didn't say it's a feature

Support pilot fish at this software vendor gets a call from the quality
assurance department, saying they've accidentally sent out 200 test faxes out
that need to be killed. Simple, right? Not so fast.

http://cwonline.computerworld.com/t/7661950/818816226/537156/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Apple's iCloud debuted this week with problems reminiscent of the MobileMe
fiasco of 2008. Why did Apple have so many problems rolling out iCloud?

http://cwonline.computerworld.com/t/7661950/818816226/535365/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7661950/818816226/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7661950/818816226/311619/0/

Facebook: http://cwonline.computerworld.com/t/7661950/818816226/311620/0/

Twitter: http://cwonline.computerworld.com/t/7661950/818816226/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7661950/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzY2MTk1MA%3d%3d&x=cc947348

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7661950/818816226/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7661950/818816226/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7661950/818816226/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:51 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive