Wednesday, March 20, 2013

Google fully implements security feature on DNS lookups

Computerworld Security: March 20, 2013
===============================================================

Google fully implements security feature on DNS lookups

Google has fully implemented a security feature that ensures a person looking up
a website isn't inadvertently directed to a fake one.
http://cwonline.computerworld.com/t/8502164/823929835/605195/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: McAfee~~~~~~~~~~~~~~~~~~~~~

Real-Time Database Auditing and Security

Learn the shortcomings of database security tools used by enterprises worldwide,
and what's required to effectively protect all types of databases.

http://cwonline.computerworld.com/t/8502164/823929835/605196/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=94ba21b8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Microsoft: Hackers obtained high-profile Xbox Live accounts
http://cwonline.computerworld.com/t/8502164/823929835/605197/0/

2. South Korean TV and bank networks paralyzed, say reports
http://cwonline.computerworld.com/t/8502164/823929835/605198/0/

3. Apple sneaks Safari update into Snow Leopard
http://cwonline.computerworld.com/t/8502164/823929835/605199/0/

4. Lawmakers call for greater protections from e-surveillance
http://cwonline.computerworld.com/t/8502164/823929835/605200/0/

5. Researcher hijacks unsecure embedded devices en masse for Internet scanning project
http://cwonline.computerworld.com/t/8502164/823929835/605201/0/

6. Darlene Storm: Black Hat Europe: Hacking to spy & remotely control video conferencing systems
http://cwonline.computerworld.com/t/8502164/823929835/605202/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: HOSTING~~~~~~~~~~~~~~~~~~~~~

How The Cloud Threatens Midsize Enterprises

Date: March 21st, 2013 1: 00 PM EST
A recent study showed 92% of IT pros recognize that moving to the cloud provides
a competitive edge, but only 20% plan to get there. The failure to close that
Cloud gap poses a serious threat.

http://cwonline.computerworld.com/t/8502164/823929835/605203/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3d77df9e

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Microsoft: Hackers obtained high-profile Xbox Live accounts

Several high-profile Xbox Live accounts for former and current Microsoft
employees were compromised by attackers using social engineering techniques, the
company said late Tuesday.
http://cwonline.computerworld.com/t/8502164/823929835/605197/0/

South Korean TV and bank networks paralyzed, say reports

Computer networks of banks and some broadcasters in South Korea were hit
Wednesday in what is suspected to be a cyberattack, according to news reports.
http://cwonline.computerworld.com/t/8502164/823929835/605198/0/

Apple sneaks Safari update into Snow Leopard

Apple last week silently updated the aged Safari 5 browser for Snow Leopard to
version 5.1.8, more evidence that the company intends to support the 2009
operating system for an unusually long time.
http://cwonline.computerworld.com/t/8502164/823929835/605199/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel®~~~~~~~~~~~~~~~~~~~~~

BYOD in Education

This white paper can help you address the security and management of multiple
devices being introduced into your network. Read on and learn how to embrace a
BYOD.

http://cwonline.computerworld.com/t/8502164/823929835/605204/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0240bff3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Lawmakers call for greater protections from e-surveillance

If U.S. law enforcement agencies agree to changes in electronic surveillance law
to better protect the privacy of stored email and documents, they want several
changes in return, including a requirement that email and cloud service
providers hold onto records longer.
http://cwonline.computerworld.com/t/8502164/823929835/605200/0/

Researcher hijacks unsecure embedded devices en masse for Internet scanning project

An anonymous researcher created a massive botnet by hijacking about 420,000
Internet-accessible embedded devices with default or no login passwords and used
it to map the entire Internet.
http://cwonline.computerworld.com/t/8502164/823929835/605201/0/

Darlene Storm: Black Hat Europe: Hacking to spy & remotely control video conferencing systems


At Black Hat Europe, Moritz Jodeit presented "Hacking Video Conferencing
Systems" and demonstrated how to exploit vulnerabilities in video
conference devices and how to remotely compromise all variants of the
popular Polycom HDX systems. Here is an interview with Jodeit about
his research and hacking to remotely own and turn video conferencing devices
into surveillance for an attacker such as for espionage purposes.
http://cwonline.computerworld.com/t/8502164/823929835/605202/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8502164/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Google plans to shut down various services and APIs. Will this affect your use
of Google's APIs and cloud services?


http://cwonline.computerworld.com/t/8502164/823929835/604681/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8502164/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8502164/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8502164/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8502164/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8502164/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NTAyMTY0&x=d565ccc3

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8502164/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8502164/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8502164/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:05 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive