Computerworld Security: March 06, 2013
===============================================================
Asprox botnet proves to be a resilient foe
A botnet that has been in the eye of researchers for years continues to serve up
malware, spam and fake antivirus software, according to research by Trend Micro.
http://cwonline.computerworld.com/t/8485246/823929835/603409/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Resolve Performance Issues Within Your Citrix Environment
Citrix offers significant benefits to IT organizations but alters the
performance troubleshooting process due to its unique architecture. Breakthrough
new technology flips the Citrix performance management paradigm on its head by
providing unprecedented end-to-end visibility of user transactions traversing a
Citrix server.
http://cwonline.computerworld.com/t/8485246/823929835/603410/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8a84bfa9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. U.S. military networks not prepared for cyber threats, report warns
http://cwonline.computerworld.com/t/8485246/823929835/603411/0/
2. Security Manager's Journal: Reining in network accounts
http://cwonline.computerworld.com/t/8485246/823929835/603412/0/
3. Following hack, Evernote speeds move to two-factor authentication
http://cwonline.computerworld.com/t/8485246/823929835/603413/0/
4. Peter Eicher: Data protection and data growth -- within budget. Possible?
http://cwonline.computerworld.com/t/8485246/823929835/603414/0/
5. Privacy as product differentiation. Is it time?
http://cwonline.computerworld.com/t/8485246/823929835/603415/0/
6. Oracle pulls Java 6 plug, but Apple likely to keep patching OS X Snow Leopard
http://cwonline.computerworld.com/t/8485246/823929835/603416/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~
Cloud Computing for Midsize Business
Read this paper to see what IBM discovered about how companies like yours are
adopting, implementing and using cloud computing solutions. Learn about the
current rate of adoption, as well as drivers, barriers, and considerations that
are influencing the adoption of cloud computing.
http://cwonline.computerworld.com/t/8485246/823929835/603417/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1b020e95
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
U.S. military networks not prepared for cyber threats, report warns
The U.S. is dangerously unprepared to face a full-scale cyber conflict launched
by a peer adversary, a report by the military's Defense Science Board (DSB)
warns.
http://cwonline.computerworld.com/t/8485246/823929835/603411/0/
Security Manager's Journal: Reining in network accounts
Many accounts exist that aren't associated with individual people, and theyve
gotten out of control.
http://cwonline.computerworld.com/t/8485246/823929835/603412/0/
Following hack, Evernote speeds move to two-factor authentication
Evernote is speeding up its plans to offer two-factor authentication to users
following a recent data breach that exposed user names, email addresses and
encrypted passwords.
http://cwonline.computerworld.com/t/8485246/823929835/603413/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed~~~~~~~~~~~~~~~~~~~~~
Accelerating Cloud Performance with WAN Optimization
Today's smart CIOs are assessing their workloads against business needs and
analyzing where each should run—locally or in the public cloud. Read on to learn
about the benefits of cloud computing, and why its success or failure is often
dependent on WAN optimization.
http://cwonline.computerworld.com/t/8485246/823929835/603418/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=81c40464
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Peter Eicher: Data protection and data growth -- within budget. Possible?
A few months ago the folks at Wikibon published a survey around a number
of different IT topics. One of the questions centered around the biggest
IT challenges that organizations were facing. The top three challenges were data
growth, budget constraints and data protection / disaster recovery.
http://cwonline.computerworld.com/t/8485246/823929835/603414/0/
Privacy as product differentiation. Is it time?
One of the big problems standing in the way of getting anything that remotely
resembles a concern among Internet companies for the privacy rights of their
customers is that there has been no business reason for any such concern. That
may be changing, but don't bet big on the possibility.
http://cwonline.computerworld.com/t/8485246/823929835/603415/0/
Oracle pulls Java 6 plug, but Apple likely to keep patching OS X Snow Leopard
Apple on Monday patched Java 6 for OS X, following Oracle's lead and quashing a
browser plug-in vulnerability that hackers have been exploiting.
http://cwonline.computerworld.com/t/8485246/823929835/603416/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8485246/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Yahoo CEO Marissa Mayer thinks workers are more efficient and creative when
they're in the office. Is ending employee telecommuting a smart idea or not?
http://cwonline.computerworld.com/t/8485246/823929835/602345/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8485246/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8485246/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8485246/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8485246/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8485246/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NDg1MjQ2&x=0db2aaa0
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8485246/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8485246/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8485246/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, March 6, 2013
Asprox botnet proves to be a resilient foe
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:44 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment