Computerworld Security: Issues and Trends: July 18, 2012
===============================================================
DHS warns of vulnerabilities in widely used Niagara software
The U.S. Department of Homeland Security (DHS) has issued an alert warning of
vulnerabilities in a software technology called the Niagara AX Framework, used
to manage millions of devices over the Internet.
http://cwonline.computerworld.com/t/8117302/823929840/571625/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco~~~~~~~~~~~~~~~~~~~~~
Webcast Demonstrates New Collaboration Advances
An insightful webcast demonstrates how you can harness the power of
people-centric collaboration in today's post-PC world. You'll learn about new
collaboration tools and technologies and witness firsthand why they're making
the experience more immersive and more mobile, in boardrooms, bistros, and
everywhere in between. Watch the webcast today.
http://cwonline.computerworld.com/t/8117302/823929840/571536/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Darlene Storm: Black Hat: Hacking iris recognition systems
http://cwonline.computerworld.com/t/8117302/823929840/571626/0/
2. INSIDER: BYOD: Big security, small devices
http://cwonline.computerworld.com/t/8117302/823929840/571627/0/
3. For BYOD Best Practices, Secure Data, Not Devices
http://cwonline.computerworld.com/t/8117302/823929840/571628/0/
4. 10 crazy IT security tricks that actually work
http://cwonline.computerworld.com/t/8117302/823929840/571629/0/
5. Android malware steals location data from mobile devices
http://cwonline.computerworld.com/t/8117302/823929840/571630/0/
6. Madhu Nutakki: Healthcare IT should 'do no harm'
http://cwonline.computerworld.com/t/8117302/823929840/571631/0/
7. Security Manager's Journal: Information rights management: Magic bullet or dud?
http://cwonline.computerworld.com/t/8117302/823929840/571632/0/
8. INSIDER: Securing the new data center
http://cwonline.computerworld.com/t/8117302/823929840/571633/0/
9. Privacy groups question NTIA's focus on mobile privacy transparency
http://cwonline.computerworld.com/t/8117302/823929840/571634/0/
10. Jaikumar Vijayan: Drone industry's Code of Conduct disappoints
http://cwonline.computerworld.com/t/8117302/823929840/571635/0/
11. Richi Jennings: Warning: Google cloud email spam FAIL
http://cwonline.computerworld.com/t/8117302/823929840/571636/0/
12. Ease the Need for IT Security Pros by Writing More Secure Code
http://cwonline.computerworld.com/t/8117302/823929840/571637/0/
13. Facebook launches malware checkpoints for users with infected computers
http://cwonline.computerworld.com/t/8117302/823929840/571638/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: FrontRange Solutions~~~~~~~~~~~~~~~~~~~~~
The Next Generation of Client Computing
Data is now accessed via physical and virtual desktops, laptops and mobile
devices. IT organizations struggle to control and manage the widening pool of
devices and operating systems. A recent IDG Research Quick Poll found that most
organizations will try to get a handle on this changing landscape this year.
http://cwonline.computerworld.com/t/8117302/823929840/571639/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0cedadd9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Black Hat: Hacking iris recognition systems
At the upcoming Black Hat USA hacking conference, security researcher Javier
Galbally will talk about a new vulnerability to attack iris-recognition systems.
This seems interesting from a security and a privacy point of view, but
especially thought-provoking in light of the FBI's plans to test a database "for
searching iris scans nationwide to more quickly track criminals."
http://cwonline.computerworld.com/t/8117302/823929840/571626/0/
INSIDER: BYOD: Big security, small devices
Enterprises may be ready for BYOD, but most consumer devices aren't, so vendors
are adding high-level security features to their new and upcoming products.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/8117302/823929840/571627/0/
For BYOD Best Practices, Secure Data, Not Devices
IT organizations are justifiably concerned about the security risks inherent in
bringing your own device (BYOD). Many are turning to mobile device management
(MDM) products and services to address the problem. But a number of mobile
security vendors believe organizations are focusing the device when they should
be focusing on the data.
http://cwonline.computerworld.com/t/8117302/823929840/571628/0/
10 crazy IT security tricks that actually work
IT security threats are constantly evolving. It's time for IT security pros to
get ingenious.
http://cwonline.computerworld.com/t/8117302/823929840/571629/0/
Android malware steals location data from mobile devices
Symantec joined other vendors offering tools to stop such mobile malware with
its own: Mobile Security for Android.
http://cwonline.computerworld.com/t/8117302/823929840/571630/0/
Madhu Nutakki: Healthcare IT should 'do no harm'
"I will prescribe regimens for the good of my patients according to my ability
and my judgment and never do harm to anyone." This is one of the lines from the
original Hippocratic Oath that physicians swore before commencing practice. What
if we, as IT professionals, had to take a similar oath to do no harm? What if
every line of code written, every instruction burned into the silica chip, every
system that was designed or deployed had to be provided with this oath in mind?
http://cwonline.computerworld.com/t/8117302/823929840/571631/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC~~~~~~~~~~~~~~~~~~~~~
Transform End User Computing
Turn to EMC to bring new simplicity, power, and efficiency to end user
computing-any user, any device, anywhere.
http://cwonline.computerworld.com/t/8117302/823929840/571395/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security Manager's Journal: Information rights management: Magic bullet or dud?
Our manager seeks a way to protect information on a network whose perimeter is
blurring in the age of SaaS.
http://cwonline.computerworld.com/t/8117302/823929840/571632/0/
INSIDER: Securing the new data center
It's hard enough to secure resources when they are bound to a physical box, but
the game changes when servers are virtualized and start to move around, not only
to other servers in the data center, but also to off-premise cloud facilities.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/8117302/823929840/571633/0/
Privacy groups question NTIA's focus on mobile privacy transparency
The U.S. National Telecommunications and Information Administration's first step
toward developing a consensus on mobile privacy standards may be the wrong step,
privacy advocates said.
http://cwonline.computerworld.com/t/8117302/823929840/571634/0/
Jaikumar Vijayan: Drone industry's Code of Conduct disappoints
People concerned about the privacy implications of civilian drones operating
over American airspace are likely to be disappointed by a recent industry "Code
of Conduct" released by the Association for Unmanned Vehicle Systems
International (AUVSI).
http://cwonline.computerworld.com/t/8117302/823929840/571635/0/
Richi Jennings: Warning: Google cloud email spam FAIL
This is a public service announcement. If you're using Gmail, or the email built
in to Google Apps, check your Spam folder. Yes, you. Right now...
http://cwonline.computerworld.com/t/8117302/823929840/571636/0/
Ease the Need for IT Security Pros by Writing More Secure Code
The demand for information security professionals, which already high, will
surge in the next few years. Finding trained security professionals to meet the
demand will be challenging, but businesses can ease the burden by training
developers to write more secure code.
http://cwonline.computerworld.com/t/8117302/823929840/571637/0/
Facebook launches malware checkpoints for users with infected computers
Facebook launched a feature that allows users to lock down their Facebook
accounts and perform malware scans if they suspect that their computers might be
infected.
http://cwonline.computerworld.com/t/8117302/823929840/571638/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PREMIER 100 -- CALL FOR NOMINATIONS
Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:
http://cwonline.computerworld.com/t/8117302/823929840/566534/0/
SHARK TANK OF THE DAY
______________________
Takin' care of business
This IT pilot fish working for a big hotel chain gets a call and several emails
from a new hotel one afternoon -- and no wonder, because the network has all but
collapsed -- so guests can't be checked in and keys can't be made.
http://cwonline.computerworld.com/t/8117302/823929840/571135/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Why are smaller tablets likely to dominate the tablet market?
http://cwonline.computerworld.com/t/8117302/823929840/570428/0/
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/8117302/823929840/558670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8117302/823929840/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8117302/823929840/311619/0/
Facebook: http://cwonline.computerworld.com/t/8117302/823929840/311620/0/
Twitter: http://cwonline.computerworld.com/t/8117302/823929840/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8117302/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODExNzMwMg%3d%3d&x=c4213ccd
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8117302/823929840/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8117302/823929840/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8117302/823929840/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, July 18, 2012
DHS warns of vulnerabilities in widely used Niagara software
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 10:05 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment