Thursday, August 23, 2012

What developers can learn from Anonymous

Computerworld Security: August 23, 2012
===============================================================

What developers can learn from Anonymous

The reason Anonymous has a permanent place in our collective imagination: For a
time, its organizational model worked very well
http://cwonline.computerworld.com/t/8189469/823929835/576154/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

Improving Governance, Risk and Compliance

In this webcast you'll learn how your organization can become more responsive to
financial market challenges while reassuring decision makers the accuracy of
execution.

http://cwonline.computerworld.com/t/8189469/823929835/576155/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=86f0107a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 60-minute security makeover: Prevent your own 'epic hack'
http://cwonline.computerworld.com/t/8189469/823929835/576156/0/

2. Darlene Storm: ToorCamp: Adventures in an American hacker camp
http://cwonline.computerworld.com/t/8189469/823929835/576157/0/

3. Siemens works to fix vulnerability in critical control networks
http://cwonline.computerworld.com/t/8189469/823929835/576158/0/

4. ICS-CERT warns of SSL security flaw in RuggedCom industrial networking devices
http://cwonline.computerworld.com/t/8189469/823929835/576159/0/

5. Groups lodge FTC complaints over childrens' online privacy
http://cwonline.computerworld.com/t/8189469/823929835/576160/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verisign Inc.~~~~~~~~~~~~~~~~~~~~~

Best Practices for Malware Incident Response

To mitigate risks associated with these intrusions, a financial services
organization's incident response program should incorporate best practices that
accelerate responses to true threats, facilitate threat prioritization and help
prevent unnecessary emergency responses.

http://cwonline.computerworld.com/t/8189469/823929835/576161/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1482afea

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


60-minute security makeover: Prevent your own 'epic hack'

Here are some ways to beef up security on your digital life -- before someone
seeking to duplicate the hack that seized control of a Wired reporter's Apple,
Amazon and Google accounts finds similar vulnerabilities in yours.
http://cwonline.computerworld.com/t/8189469/823929835/576156/0/

Darlene Storm: ToorCamp: Adventures in an American hacker camp


While a tech camping event might sound like an oxymoron, hackers, makers,
breakers and shakers assembled at the northwestern tip of the USA for
ToorCamp and dispelled the notion that all hackers avoid sunshine and the
great outdoors. As you would expect from a hacker conference, there were
workshops like the one for lock picking and a plethora of presentations from
"hacking computers to brain hacking, from brewing soda to fighting robots,
from civil rights to lightning guns." Then unique aspects of this
cool hacker camp get more bizarre . . like the laser that was so
bright it required FAA clearance to deploy it, the ShadyTel community
'payphone,' the Temple of Robotron, an RFID implantation station, bike
jousting, dancing robots and of course campfires. Need an even stranger
adventure that's also in the ToorCon family of hacking conferences? There's the
upcoming WorldToor, the first ever hacker conference in Antarctica.
http://cwonline.computerworld.com/t/8189469/823929835/576157/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verisign Inc.~~~~~~~~~~~~~~~~~~~~~

Best Practices for a Rapidly Changing Threat Landscape

DDoS attacks are increasing in sophistication, and the amount of damage they can
cause threatens a healthcare organization's brand, reputation and patient
confidentiality. Verisign has identified a set of best practices that can help
healthcare organizations keep pace with DDoS attacks while minimizing impact on
daily business operations.

http://cwonline.computerworld.com/t/8189469/823929835/576162/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f895dd1f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Siemens works to fix vulnerability in critical control networks

Siemens is working to fix a remotely exploitable vulnerability in network
routers and switches from subsidiary RuggedCom that are widely deployed in
refineries, power substations and other critical infrastructure networks in the
U.S.
http://cwonline.computerworld.com/t/8189469/823929835/576158/0/

ICS-CERT warns of SSL security flaw in RuggedCom industrial networking devices

Industrial Ethernet switches and other devices produced by industrial networking
equipment manufacturer RuggedCom contain a vulnerability that could be exploited
to compromise SSL-based communications between them and their users, according
to a security researcher from security startup Cylance.
http://cwonline.computerworld.com/t/8189469/823929835/576159/0/

Groups lodge FTC complaints over childrens' online privacy

A coalition of 17 advocacy groups filed complaints with the U.S. Federal Trade
Commission against five prominent companies, including McDonald's, claiming that
certain of their online marketing practices violate child privacy laws.
http://cwonline.computerworld.com/t/8189469/823929835/576160/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8189469/823929835/566534/0/

SHARK TANK OF THE DAY
______________________

That would explain it

Remote user calls this help-desk pilot fish to complain that Outlook has a
password prompt, but his password won't let him through. And for once, fish's
quick fixes don't do the trick.

http://cwonline.computerworld.com/t/8189469/823929835/576145/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

While Samsung and Apple thrive in the overall smartphone market, the situation
is uncertain, perhaps dire, for several cell-phone vendors, including Research
In Motion, Nokia and Motorola. Which of the smartphone rivals is most
endangered?

http://cwonline.computerworld.com/t/8189469/823929835/575015/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8189469/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8189469/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8189469/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8189469/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8189469/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8189469/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTg5NDY5&x=dc086398

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8189469/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8189469/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8189469/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:18 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive