Wednesday, January 23, 2013

Encrypt (almost) anything

Computerworld Security: January 23, 2013
===============================================================

Encrypt (almost) anything

It's all too easy to neglect data security, especially for a small business.
While bigger organizations have IT departments, service contracts, and
enterprise hardware, smaller companies frequently rely on consumer software,
which lacks the same sort of always-on security functionality.
http://cwonline.computerworld.com/t/8433072/823929835/598241/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Moovweb~~~~~~~~~~~~~~~~~~~~~

Creating the Right Mobile Strategy

In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You
Need to Know Before You Get Started", get the insight you need to make an
educated decision on the move to mobile.

http://cwonline.computerworld.com/t/8433072/823929835/598242/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=cef6884a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Exposure of files on unsecured wireless no excuse to search, judge rules
http://cwonline.computerworld.com/t/8433072/823929835/598243/0/

2. Reporters Without Borders site hit in malware campaign
http://cwonline.computerworld.com/t/8433072/823929835/598244/0/

3. Darlene Storm: Student expelled for hacking after re-testing security hole in Omnivox college portal
http://cwonline.computerworld.com/t/8433072/823929835/598245/0/

4. Twitter flaw gave private message access to third-party apps, researcher says
http://cwonline.computerworld.com/t/8433072/823929835/598246/0/

5. A taxonomy for the National Cybersecurity Doctrine
http://cwonline.computerworld.com/t/8433072/823929835/598247/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: CA Technologies~~~~~~~~~~~~~~~~~~~~~

Reduce Data Protection Complexity

Choosing the right data protection solution should not add to the complexity and
challenges of meeting the everyday demands of the business. Data protection can
be simple to deploy, use and fit into IT's budget, but more importantly make
systems, applications and data available 24/7.

http://cwonline.computerworld.com/t/8433072/823929835/598248/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=51ab3ed8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Exposure of files on unsecured wireless no excuse to search, judge rules

An individual who inadvertently exposes the contents of his computer over an
unsecured wireless network still has a reasonable expectation of privacy against
a search of those contents by the police, a federal judge in Oregon ruled last
week.
http://cwonline.computerworld.com/t/8433072/823929835/598243/0/

Reporters Without Borders site hit in malware campaign

The website for Reporters Without Borders was booby-trapped to deliver malicious
software using the latest Java and Internet Explorer vulnerabilities, security
vendor Avast said on Tuesday.
http://cwonline.computerworld.com/t/8433072/823929835/598244/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Workday~~~~~~~~~~~~~~~~~~~~~

CIOs in the Cloud

As cloud computing infiltrates the enterprise and transforms the business, the
CIO's role is also experiencing a transformation. This webcast focuses on how
cloud trends arechanging the CIO mindset and how cloud SaaS fosters a
cost-effective, productive, and efficient enterprise.

http://cwonline.computerworld.com/t/8433072/823929835/598249/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=57bd1e27

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Student expelled for hacking after re-testing security hole in Omnivox college portal


Since when is a test account, not for testing purposes? When pen testing web
applications against an Omnivox student portal test server without previous
authorization? Next, if a privacy law prohibits mentioning details about
students, yet a college explicitly mentions a student by name while defending
its position, has that college broken the law? Dawson College student Ahmed
Al-Khabaz was first patted on the back for responsible disclosure of a security
hole in the Omnivox student and faculty portal. Yet when he re-tested on a test
server to see if the flaws were fixed, Al-Khabaz was expelled from college.
http://cwonline.computerworld.com/t/8433072/823929835/598245/0/

Twitter flaw gave private message access to third-party apps, researcher says

Users who signed into third-party Web or mobile applications using their Twitter
accounts might have given those applications access to their Twitter private
"direct" messages without knowing it, according to Cesar Cerrudo, CTO of
IOActive.
http://cwonline.computerworld.com/t/8433072/823929835/598246/0/

A taxonomy for the National Cybersecurity Doctrine

Attorney and risk consultant Doug DePeppe continues the discussion on what the
U.S. cybersecurity doctrine should look like.
http://cwonline.computerworld.com/t/8433072/823929835/598247/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The year 2012 saw innovation, litigation, disruption and accomplishment. Of them
all, what was the biggest tech story of 2012?

http://cwonline.computerworld.com/t/8433072/823929835/595542/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8433072/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8433072/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8433072/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8433072/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8433072/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NDMzMDcy&x=bb157f95

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8433072/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8433072/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8433072/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:46 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive