Wednesday, June 27, 2012

Facebook yanks mobile location-tracking feature

Computerworld Security: June 27, 2012
===============================================================

Facebook yanks mobile location-tracking feature

Facebook has quickly pulled a feature it launched Sunday that allowed mobile
users of the social network to find fellow members who may be nearby.
http://cwonline.computerworld.com/t/8078735/823929835/568564/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~

Customer Success - Tree In The Glen

Treehouse in the Glen replaced a variety of security solutions with Symantec
Endpoint Protection Small Business Edition. Since deployment, the store has had
zero virus infections, system performance has improved, and security management
time has dropped from three hours a week to 15 minutes.

http://cwonline.computerworld.com/t/8078735/823929835/568565/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=467d60cd

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Researchers devise practical key recovery attack against smart cards, security tokens
http://cwonline.computerworld.com/t/8078735/823929835/568566/0/

2. Should cloud contracts cover client responsibilities?
http://cwonline.computerworld.com/t/8078735/823929835/568567/0/

3. 24 arrested in international online 'carding' crackdown
http://cwonline.computerworld.com/t/8078735/823929835/568568/0/

4. FTC files lawsuit over data breaches at Wyndham Worldwide
http://cwonline.computerworld.com/t/8078735/823929835/568569/0/

5. Cybercriminals increasingly use online banking fraud automation techniques
http://cwonline.computerworld.com/t/8078735/823929835/568570/0/

6. Darlene Storm: Civilian drones vulnerable to hackers, can be hijacked, used as missiles
http://cwonline.computerworld.com/t/8078735/823929835/568571/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Brocade Communications~~~~~~~~~~~~~~~~~~~~~

Is Cloud the Answer to Federal IT Savings?

In this eGuide, Computerworld and its sister publications CIO and Network World
have collected interviews and articles that cover some of the biggest issues
faced by federal agency IT departments today. Read on to learn about the
technology challenges the U.S. government is facing, and how some agencies are
dealing with them.

http://cwonline.computerworld.com/t/8078735/823929835/568572/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=161db3cb

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Researchers devise practical key recovery attack against smart cards, security tokens

A team of cryptographic researchers claim to have developed an attack method
that can be used to recover secret keys in an acceptable time frame from
cryptographic devices like smart cards, hardware security modules and USB
security tokens.
http://cwonline.computerworld.com/t/8078735/823929835/568566/0/

Should cloud contracts cover client responsibilities?

The main focus of a cloud computing contract is on vendor responsibilities, but
it's appropriate to consider what the client remains responsible for.
http://cwonline.computerworld.com/t/8078735/823929835/568567/0/

24 arrested in international online 'carding' crackdown

A total of 24 people from 13 countries, including 11 from the United States,
were arrested on Tuesday on charges related to the theft and misuse of credit
card data, bank account information and other financial data.
http://cwonline.computerworld.com/t/8078735/823929835/568568/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5~~~~~~~~~~~~~~~~~~~~~

Securing the Cloud

Cloud computing has become another key resource for IT deployments, but there is
still fear of securing applications and data in the cloud. With F5 devices, you
can keep your most precious assets safe, no matter where they live.

http://cwonline.computerworld.com/t/8078735/823929835/568573/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7f33c0df

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


FTC files lawsuit over data breaches at Wyndham Worldwide

The U.S. Federal Trade Commission has filed a lawsuit against hotel operator
Wyndham Worldwide and three of its subsidiaries after three data breaches at
Wyndham hotels in less than two years, the agency announced Tuesday.
http://cwonline.computerworld.com/t/8078735/823929835/568569/0/

Cybercriminals increasingly use online banking fraud automation techniques

Cybercriminals attempted to steal at least $75 million from high-balance
business and consumer bank accounts by using sophisticated fraud automation
techniques that can bypass two-factor authentication, according to a report
released bu two security vendors.
http://cwonline.computerworld.com/t/8078735/823929835/568570/0/

Darlene Storm: Civilian drones vulnerable to hackers, can be hijacked, used as missiles


You know those thousands of drones that will be flying and spying overhead in
American skies? They are vulnerable to hacking. Radionavigation Laboratory
demonstrated hacking and taking control of a civilian drone by spoofing GPS
signals. Researchers warn that terrorists could hijack the drones and turn them
into GPS-guided weapons and missiles to crash into other planes or buildings.
http://cwonline.computerworld.com/t/8078735/823929835/568571/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

WIN AN AMAZON KINDLE FIRE!

Computerworld turned 45 years old this month, and to celebrate our birthday,
we're giving away an Amazon Kindle Fire tablet to one lucky Facebook user. Just
"like" our Facebook page, then use our Facebook app to submit your email address
anytime before the end of Monday, July 9, 2012.

http://cwonline.computerworld.com/t/8078735/823929835/568508/0/

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8078735/823929835/566534/0/

SHARK TANK OF THE DAY
______________________

Well, not you -- the other one

This support pilot fish works in a local office for a state transportation
department, handling the usual PC issues: hardware, software and networks. But
the big iron in the other room? This she knows from nothing.

http://cwonline.computerworld.com/t/8078735/823929835/568444/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Apple has little to worry about from Microsoft's tradition-breaking move to sell
its own tablets, analysts say. What do you think?

http://cwonline.computerworld.com/t/8078735/823929835/567888/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8078735/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8078735/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8078735/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8078735/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8078735/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8078735/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MDc4NzM1&x=51132056

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8078735/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8078735/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8078735/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:07 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive