Wednesday, April 24, 2013

AP Twitter hack prompts fresh look at cybersecurity needs

Computerworld Security: Issues and Trends: April 24, 2013
===============================================================

AP Twitter hack prompts fresh look at cybersecurity needs

Getting hacked on Twitter is fast becoming a rite of passage for big
corporations, but Tuesday's attack on the Associated Press could be a tipping
point and shows that social networks must do more to keep their users safe,
security experts said.
http://cwonline.computerworld.com/t/8549252/823929840/609606/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: HP Intel VMware~~~~~~~~~~~~~~~~~~~~~

Your IT Journey - Your Way

Faced with unrelenting pressure to do more with less, IT leaders are
implementing virtualization, mobility and cloud computing in their enterprises.
In this Knowledge Vault Exchange you'll find a plethora of valuable information,
including videos, on-demand Webcasts, white papers and Twitter chats.

http://cwonline.computerworld.com/t/8549252/823929840/609607/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=20b9a0b1

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. INSIDER: 5 lessons for IT from the Boston Marathon bombings
http://cwonline.computerworld.com/t/8549252/823929840/609608/0/

2. Security Manager's Journal: A little housecleaning
http://cwonline.computerworld.com/t/8549252/823929840/609609/0/

3. One in five data breaches are the result of cyberespionage, Verizon says
http://cwonline.computerworld.com/t/8549252/823929840/609610/0/

4. INSIDER: Bart Perkins: Beware of self-destructing messaging in the enterprise
http://cwonline.computerworld.com/t/8549252/823929840/609611/0/

5. DDOS attacks have increased in number and size this year, report says
http://cwonline.computerworld.com/t/8549252/823929840/609612/0/

6. BYOL: Bring your own liabilities
http://cwonline.computerworld.com/t/8549252/823929840/609613/0/

7. Hackers could start abusing electric car chargers to cripple the grid, researcher says
http://cwonline.computerworld.com/t/8549252/823929840/609614/0/

8. Wireless IP cameras open to hijacking over the Internet, researchers say
http://cwonline.computerworld.com/t/8549252/823929840/609615/0/

9. Popular home routers contain critical security vulnerabilities
http://cwonline.computerworld.com/t/8549252/823929840/609616/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

Transform Your Cloud

This video highlights how VMAX Cloud Edition automates day-to-day tasks,
improves service levels and accelerates time-to-value for users of public,
private and hybrid clouds.

http://cwonline.computerworld.com/t/8549252/823929840/609617/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=de49d9fb

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: 5 lessons for IT from the Boston Marathon bombings

The CIO of Boston's Beth Israel Deaconess Medical Center learned a few things
last week. Insider (free registration required)
http://cwonline.computerworld.com/t/8549252/823929840/609608/0/

Security Manager's Journal: A little housecleaning

Our manager finds the time and opportunity to cross a few nagging items off of
his to-do list.
http://cwonline.computerworld.com/t/8549252/823929840/609609/0/

One in five data breaches are the result of cyberespionage, Verizon says

Even though the majority of data breaches continue to be the result of
financially motivated cybercriminal attacks, cyberespionage activities are also
responsible for a significant number of data theft incidents, according to a
report by Verizon.
http://cwonline.computerworld.com/t/8549252/823929840/609610/0/

INSIDER: Bart Perkins: Beware of self-destructing messaging in the enterprise

They may be a boon for individual privacy, but self-destructing messages will
bring headaches to enterprises. Insider (free registration required)
http://cwonline.computerworld.com/t/8549252/823929840/609611/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: ITinvolve~~~~~~~~~~~~~~~~~~~~~

How ITinvolve Blows Away the Service Desk Status Quo

Learn how a new cloud-based approach provides a personalized social platform
where your IT professionals can see a comprehensive view of your IT environment.

http://cwonline.computerworld.com/t/8549252/823929840/609618/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5524b391

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DDOS attacks have increased in number and size this year, report says

The volume, duration and frequency of distributed denial-of-service (DDOS)
attacks used to flood websites and other systems with junk traffic have
significantly increased during the first three months of this year, according to
a report by Florida-based DDOS mitigation provider Prolexic.
http://cwonline.computerworld.com/t/8549252/823929840/609612/0/

BYOL: Bring your own liabilities

What are the legal ramifications of allowing staff to bring their own mobile
devices to work and where is the dividing line between organisational and
employee risk?
http://cwonline.computerworld.com/t/8549252/823929840/609613/0/

Hackers could start abusing electric car chargers to cripple the grid, researcher says

Hackers could use vulnerable charging stations to prevent the charging of
electric vehicles in a certain area, or possibly even use the vulnerabilities to
cripple parts of the electricity grid, a security researcher said during the
Hack in the Box conference.
http://cwonline.computerworld.com/t/8549252/823929840/609614/0/

Wireless IP cameras open to hijacking over the Internet, researchers say

Thousands of wireless IP cameras connected to the Internet have serious security
weaknesses that allow attackers to hijack them and alter their firmware,
according to two researchers from security firm Qualys.
http://cwonline.computerworld.com/t/8549252/823929840/609615/0/

Popular home routers contain critical security vulnerabilities

Thirteen popular home and small office routers contain security problems that
could allow a hacker to snoop on or modify network traffic, according to new
research.
http://cwonline.computerworld.com/t/8549252/823929840/609616/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8549252/823929840/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8549252/823929840/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

IDC analysts blamed Windows 8 for the unprecedented 14% fall-off in consumer PC
purchases during 2013's first-quarter. What do you think is the real reason for
sluggish Windows PC sales?

http://cwonline.computerworld.com/t/8549252/823929840/609013/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8549252/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8549252/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8549252/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8549252/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8549252/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODU0OTI1Mg%3d%3d&x=b4f2f536

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8549252/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8549252/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8549252/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive