Computerworld Security: August 06, 2012
===============================================================
Car-hacking: Bluetooth and other security issues
Thanks to increased computerization and access to the outside world for
functions including music and social networking, researchers have successfully
hacked cars -- brakes applied remotely, conversations overheard, GPS signals
interfered with. This has potentially disastrous consequences, especially for
managers of large fleets of trucks, cars and other vehicles.
http://cwonline.computerworld.com/t/8151003/823929835/573672/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: VMware~~~~~~~~~~~~~~~~~~~~~
3 Common Misconceptions About Virtualization
This article by an industry expert helps clear up misinformation and shatters
three common myths, illustrated by a customer success story. Learn more how
VMware can add value and help your company no matter what stage you are on in
your virtualization journey.
http://cwonline.computerworld.com/t/8151003/823929835/573673/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8c8e64cc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Richi Jennings: Apple iCloud 'not secure': Cloud rains on BYOD parade
http://cwonline.computerworld.com/t/8151003/823929835/573674/0/
2. Massive payment card upgrade has mixed results in Australia
http://cwonline.computerworld.com/t/8151003/823929835/573675/0/
3. Microsoft tool shows whether apps pose danger to Windows
http://cwonline.computerworld.com/t/8151003/823929835/573676/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker, Inc~~~~~~~~~~~~~~~~~~~~~
Create, deploy and manage custom business apps for iPad
The FileMaker Platform is a complete software suite to create, deploy, and
manage custom business apps for iPad and iPhone. Design and build stunning iOS
apps. Integrate mobile apps into existing enterprise systems. Deploy and
instantly update your apps. Secure your apps with industry-standard
authentication.
http://cwonline.computerworld.com/t/8151003/823929835/569239/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Richi Jennings: Apple iCloud 'not secure': Cloud rains on BYOD parade
Mat Honan suffered a hellacious hack Friday. It turns out that Apple
(NASDAQ:AAPL) reset his password for a hacker. Due to the nature of iCloud, all
his devices stopped working and he's lost all his backups. In IT Blogwatch,
bloggers are excoriatingly critical of Apple's security policies .
http://cwonline.computerworld.com/t/8151003/823929835/573674/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: Intel Corporation~~~~~~~~~~~~~~~~~~~~~
Stealthy Threats: Driving a New Approach to Security
Watch this video to find out how rootkits and other stealthy threats have
significantly changed today's threat landscape, and how you can prevent these
threats with an integrated solution from Intel and McAfee that delivers embedded
security beyond the operating system.
http://cwonline.computerworld.com/t/8151003/823929835/573677/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=253d81ec
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Massive payment card upgrade has mixed results in Australia
Despite a years-long upgrade of Australia's payment systems, fraudsters are
still profiting, leaving a questionable record for a vast program to equip debit
and credit cards with new security features.
http://cwonline.computerworld.com/t/8151003/823929835/573675/0/
Microsoft tool shows whether apps pose danger to Windows
Microsoft has released Attack Surface Analyzer 1.0, a free tool that can help
system administrators, IT security professionals or software developers
understand how newly installed applications can affect the security of a Windows
OS.
http://cwonline.computerworld.com/t/8151003/823929835/573676/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PREMIER 100 -- CALL FOR NOMINATIONS
Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:
http://cwonline.computerworld.com/t/8151003/823929835/566534/0/
SHARK TANK OF THE DAY
______________________
Bzzzzzt! Wrong answer!
This power-user pilot fish handles a lot of the questions in his department
about software and equipment, but one day it's his own PC that's making an
ominous sound: that characteristic intermittent bzzzzzt of something beginning
to short out.
http://cwonline.computerworld.com/t/8151003/823929835/573586/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
The latest version of Mac OS X, Mountain Lion, is now available. Will you be
upgrading to Apple's new operating system?
http://cwonline.computerworld.com/t/8151003/823929835/572420/0/
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/8151003/823929835/558670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8151003/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8151003/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8151003/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8151003/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8151003/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTUxMDAz&x=fa24e4d6
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8151003/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8151003/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8151003/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Monday, August 6, 2012
Car-hacking: Bluetooth and other security issues
Lainnya dari

Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment