Monday, July 30, 2012

Twitter suffers malware spam outbreak

Computerworld Security: July 30, 2012
===============================================================

Twitter suffers malware spam outbreak


http://cwonline.computerworld.com/t/8137369/823929835/572768/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco~~~~~~~~~~~~~~~~~~~~~

Webcast Demonstrates New Collaboration Advances

An insightful webcast demonstrates how you can harness the power of
people-centric collaboration in today's post-PC world. You'll learn about new
collaboration tools and technologies and witness firsthand why they're making
the experience more immersive and more mobile, in boardrooms, bistros, and
everywhere in between. Watch the webcast today.

http://cwonline.computerworld.com/t/8137369/823929835/572125/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Darlene Storm: Day One of Def Con 20
http://cwonline.computerworld.com/t/8137369/823929835/572769/0/

2. Richi Jennings: DEF CON 20 roundup: Critical lessons for all
http://cwonline.computerworld.com/t/8137369/823929835/572770/0/

3. Fraudsters tempt Olympic fans with bogus streaming websites
http://cwonline.computerworld.com/t/8137369/823929835/572771/0/

4. New Mac Trojan hints at ties to high-priced commercial hacking toolkit
http://cwonline.computerworld.com/t/8137369/823929835/572772/0/

5. Apple to spend $356 million on security company AuthenTec
http://cwonline.computerworld.com/t/8137369/823929835/572773/0/

6. Google failed to delete all Street View data in UK
http://cwonline.computerworld.com/t/8137369/823929835/572774/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker, Inc~~~~~~~~~~~~~~~~~~~~~

Create, deploy and manage custom business apps for iPad

The FileMaker Platform is a complete software suite to create, deploy, and
manage custom business apps for iPad and iPhone. Design and build stunning iOS
apps. Integrate mobile apps into existing enterprise systems. Deploy and
instantly update your apps. Secure your apps with industry-standard
authentication.

http://cwonline.computerworld.com/t/8137369/823929835/569239/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Darlene Storm: Day One of Def Con 20


Def Con 20: Here's a look at a few of the talks presented on day one during the
20th anniversary of Def Con. Charlie Miller showed how slightly bumping into
someone could end up getting an Android smartphone pwned via NFC and Android
Beam. Christopher Soghoian talked about government surveillance via mobile
location data during 'Can you track me now?'
http://cwonline.computerworld.com/t/8137369/823929835/572769/0/

Richi Jennings: DEF CON 20 roundup: Critical lessons for all


So that was DEF CON 20. The infamous security convention has wound up, leaving
hackers of all hat colors bemused, befuddled, and bewildered. This year saw an
official NSA appearance, which posed more questions than it answered. It also
brought worrying threats to enterprise VPN and Wi-Fi networks. In IT Blogwatch,
bloggers count their Lost Wages.
http://cwonline.computerworld.com/t/8137369/823929835/572770/0/

Fraudsters tempt Olympic fans with bogus streaming websites

The Olympic Games in London have sparked interest from fraudsters, with a raft
of sites supposedly offering live video streams of events, according to security
vendor Trend Micro.
http://cwonline.computerworld.com/t/8137369/823929835/572771/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Framehawk~~~~~~~~~~~~~~~~~~~~~

An Interactive eGuide: Bring Your Own Device

BYOD brings some concerns, blurring the line between personal and corporate use
raises security, compliance, and ownership issues. Does the BYOD trend actually
make workers more productive, or is IT simply caving in to employee demand?

http://cwonline.computerworld.com/t/8137369/823929835/572775/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=cfa9d00f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


New Mac Trojan hints at ties to high-priced commercial hacking toolkit

French security firm Intego discovered a new Mac Trojan horse this week that is
being used to target specific individuals.
http://cwonline.computerworld.com/t/8137369/823929835/572772/0/

Apple to spend $356 million on security company AuthenTec

In a deal that should help Apple boost its enterprise security offerings, the
iPhone maker is planning to buy mobile security company AuthenTec for $8 per
share or a little over $356 million, AuthenTec said on Friday.
http://cwonline.computerworld.com/t/8137369/823929835/572773/0/

Google failed to delete all Street View data in UK

Google disclosed in an email to the U.K. Information Commissioner's Office that
it had not yet deleted all user data collected by its Street View vehicles, as
it had agreed to more than 18 months ago.
http://cwonline.computerworld.com/t/8137369/823929835/572774/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8137369/823929835/566534/0/

SHARK TANK OF THE DAY
______________________

One at a time -- remember?

Flashback to 1999, when this electric utility is converting to a new
Y2k-compliant accounting system -- which means 150 million transactions to
convert for the previous five years.

http://cwonline.computerworld.com/t/8137369/823929835/572705/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The latest version of Mac OS X, Mountain Lion, is now available. Will you be
upgrading to Apple's new operating system?

http://cwonline.computerworld.com/t/8137369/823929835/572420/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8137369/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8137369/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8137369/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8137369/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8137369/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8137369/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTM3MzY5&x=9027da8f

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8137369/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8137369/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8137369/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive