Thursday, January 5, 2012

Two new security books ponder how vulnerable we are

Computerworld Security: January 05, 2012
===============================================================

Two new security books ponder how vulnerable we are

Two recently-published books, "America the Vulnerable" by Joel Brenner, a former
official at the National Security Agency (NSA) and "When Gadgets Betray Us," by
writer and security analyst Robert Vamosi, have one theme in common: We've come
to depend on modern networks and technology, but the compromise of them by
attackers is a serious threat to both individuals and society as a whole.
http://cwonline.computerworld.com/t/7798170/818816221/545910/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Red Hat~~~~~~~~~~~~~~~~~~~~~

FOUR STEPS TO A PRIVATE OR HYBRID CLOUD

STEP 4: ACCELERATE BUSINESS RESULTS WITH YOUR CLOUD. WEBINAR - JANUARY 19, 2012.
In the From Virtualization to Cloud webinar series, Red Hat® and the IT Process
Institute guide you through the best practices of cloud-building. Learn how to
optimize cloud economics, reshape behavior for IT-as-a-Service, and streamline
cross-functional collaboration.

http://cwonline.computerworld.com/t/7798170/818816221/545057/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Blind spots: How cyber defense is like stopping Tim Tebow
http://cwonline.computerworld.com/t/7798170/818816221/545911/0/

2. IT Blogwatch: Holy P2P! File-sharing now official religion in Sweden...
http://cwonline.computerworld.com/t/7798170/818816221/545912/0/

3. Microsoft sues U.K. retail chain for pirating Windows
http://cwonline.computerworld.com/t/7798170/818816221/545913/0/

4. Darlene Storm: Brute force tools crack WiFi security in hours, millions of wireless routers vulnerable
http://cwonline.computerworld.com/t/7798170/818816221/545914/0/

5. Check Point supports cloud security for Amazon Web Services
http://cwonline.computerworld.com/t/7798170/818816221/545915/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Red Hat~~~~~~~~~~~~~~~~~~~~~

FOUR STEPS TO A PRIVATE OR HYBRID CLOUD

STEP 4: ACCELERATE BUSINESS RESULTS WITH YOUR CLOUD. WEBINAR - JANUARY 19, 2012.
In the From Virtualization to Cloud webinar series, Red Hat® and the IT Process
Institute guide you through the best practices of cloud-building. Learn how to
optimize cloud economics, reshape behavior for IT-as-a-Service, and streamline
cross-functional collaboration.

http://cwonline.computerworld.com/t/7798170/818816221/545057/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Blind spots: How cyber defense is like stopping Tim Tebow

Cyber defense faces a growing disconnect between perception and reality.
http://cwonline.computerworld.com/t/7798170/818816221/545911/0/

IT Blogwatch: Holy P2P! File-sharing now official religion in Sweden...

Sweden now has a new, officially-recognized religion: File-sharing. The
government agency, Kammarkollegiet, has finally registered the Church of
Kopimism as a religious organization. In IT Blogwatch, devout bloggers see the
funny side.

http://cwonline.computerworld.com/t/7798170/818816221/545912/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Autonomy, an HP company~~~~~~~~~~~~~~~~~~~~~

Better Governing of Mobile Data

Date: January 10th, 2012
Time: 1:00 PM EST
Join this live Webcast for a discussion on a unique approach to protecting and
retaining data that resides on mobile devices by creating a meaning-based backup
that allows organizations to apply intelligent legal hold policies against the
full corpus of data.

http://cwonline.computerworld.com/t/7798170/818816221/545916/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Microsoft sues U.K. retail chain for pirating Windows

Microsoft today sued a U.K. electronics retail chain for selling Windows
recovery discs to customers, claiming that the practice amounts to piracy.
http://cwonline.computerworld.com/t/7798170/818816221/545913/0/

Darlene Storm: Brute force tools crack WiFi security in hours, millions of wireless routers vulnerable

Millions of wireless routers around the world, about 95%, are vulnerable to
brute force attacks which can crack WPA/WPA2 and other WiFi router security
protocols. That was made much easier with the release of two free brute force
tools that can exploit the WiFi router flaws and crack a wireless network in two
to ten hours.

http://cwonline.computerworld.com/t/7798170/818816221/545914/0/

Check Point supports cloud security for Amazon Web Services

Check Point and Amazon Web Services are teaming up to enable Check Point
Security Gateway functionality to boost cloud security for business assets.
http://cwonline.computerworld.com/t/7798170/818816221/545915/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SHARK TANK OF THE DAY
______________________

So THAT'S what the PC nobody uses is for!

Pilot fish's wife, the IT consultant, gets an alert at 10 p.m., and he drives
with her to the client site. But when he walks in, there's a shriek of disgust.

http://cwonline.computerworld.com/t/7798170/818816221/545909/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

IT made headlines throughout 2011, from social media's role in Arab Spring to
the popularity of Google's Android and Google+ and more. What was the top story
of this year?

http://cwonline.computerworld.com/t/7798170/818816221/545471/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7798170/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7798170/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7798170/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7798170/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7798170/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03Nzk4MTcw&x=6b8bc65f

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7798170/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7798170/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7798170/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:12 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive