Tuesday, August 28, 2012

Macs at risk from 'super dangerous' Java zero-day

Computerworld Security: August 28, 2012
===============================================================

Macs at risk from 'super dangerous' Java zero-day

A zero-day vulnerability in Java 7 can be exploited through any browser running
on any operating system -- from Windows and Linux to OS X -- that has Java
installed, security experts said today.
http://cwonline.computerworld.com/t/8196500/823929835/578203/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Amazon Web Services~~~~~~~~~~~~~~~~~~~~~

Become a Cloud expert at AWS re: Invent

Amazon Web Services invites you to AWS re:Invent, our first global customer and
partner conference. Hear how companies are migrating their IT applications to
the Cloud. Learn best practices for managing security, monitoring your
resources, optimizing performance, and cutting costs. Get your questions
answered by AWS experts to help you get started.

http://cwonline.computerworld.com/t/8196500/823929835/577965/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Darlene Storm: Hacking the mind: 3 new brain hacks expose new realm of security & privacy risks
http://cwonline.computerworld.com/t/8196500/823929835/578204/0/

2. Twitter appeals court ruling to turn over user information
http://cwonline.computerworld.com/t/8196500/823929835/578205/0/

3. Unpatched Java flaw hit in targeted attacks, researchers say
http://cwonline.computerworld.com/t/8196500/823929835/578206/0/

4. How to configure Dropbox's two-step authentication
http://cwonline.computerworld.com/t/8196500/823929835/578207/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: AppCentral~~~~~~~~~~~~~~~~~~~~~

4 Tips to Leverage Mobile Enterprise Apps

Read this tip sheet to learn how to use custom mobile apps to share information
with customers, partners and suppliers, while retaining control of the data.

http://cwonline.computerworld.com/t/8196500/823929835/578208/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e15b737c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Darlene Storm: Hacking the mind: 3 new brain hacks expose new realm of security & privacy risks


Brain hacking is a hot subject right now. Be it cool or somewhat
creepy,hacking the mind opens the door to a new realm of security as well as a
new realm of security and privacy risks.
http://cwonline.computerworld.com/t/8196500/823929835/578204/0/

Twitter appeals court ruling to turn over user information

Twitter has filed an appeal of a New York judge's June decision requiring the
company to turn over detailed information about a user tied to the Occupy Wall
Street protest movement.
http://cwonline.computerworld.com/t/8196500/823929835/578205/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

Improving Governance, Risk and Compliance

In this webcast you'll learn how your organization can become more responsive to
financial market challenges while reassuring decision makers the accuracy of
execution.

http://cwonline.computerworld.com/t/8196500/823929835/578209/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ec51f8d2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Unpatched Java flaw hit in targeted attacks, researchers say

Attackers are exploiting a new and unpatched vulnerability that affects the
latest version of Java -- Java 7 Update 6 -- in order to infect computers with
malware, according to researchers from security vendor FireEye.
http://cwonline.computerworld.com/t/8196500/823929835/578206/0/

How to configure Dropbox's two-step authentication

Following in the footsteps of Google and other services, Dropbox this weekend
enabled two-factor authentication to bring enhanced security to its users.
http://cwonline.computerworld.com/t/8196500/823929835/578207/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8196500/823929835/566534/0/

SHARK TANK OF THE DAY
______________________

Just like you told me to

This company's voice-over-IP phone system has a Services key that pops up a
screen full of options, including a calendar, stock price feed -- and one that
says "Call Help Desk."

http://cwonline.computerworld.com/t/8196500/823929835/578210/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

While Samsung and Apple thrive in the overall smartphone market, the situation
is uncertain, perhaps dire, for several cell-phone vendors, including Research
In Motion, Nokia and Motorola. Which of the smartphone rivals is most
endangered?

http://cwonline.computerworld.com/t/8196500/823929835/575015/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8196500/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8196500/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8196500/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8196500/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8196500/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8196500/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTk2NTAw&x=25a7a39e

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8196500/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8196500/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8196500/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:37 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive