Computerworld Security: May 23, 2013
===============================================================
Growing mobile malware threat swirls (mostly) around Android
Mobile devices are getting hit by a boom in malware similar to the one that hit
PCs starting with the rise of the Web, a security software executive said
Tuesday.
http://cwonline.computerworld.com/t/8591571/823929835/613266/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast North America Inc~~~~~~~~~~~~~~~~~~~~~
What it takes to deliver Security, and Privacy at Mimecast.
This whitepaper explains the process and controls that Mimecast put in place to
deliver a secure, private and trusted SaaS platform for your email security,
email archiving and email continuity.
http://cwonline.computerworld.com/t/8591571/823929835/613267/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ba3f345e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Why you need a security buddy (and how to find one)
http://cwonline.computerworld.com/t/8591571/823929835/613268/0/
2. New Citadel malware variant targets Payza online payment platform
http://cwonline.computerworld.com/t/8591571/823929835/613269/0/
3. Blue Coat Systems to acquire security analytics firm Solera Networks
http://cwonline.computerworld.com/t/8591571/823929835/613270/0/
4. Twitter aims to become safer with two-step sign-in
http://cwonline.computerworld.com/t/8591571/823929835/613271/0/
5. Google engineer bashes Microsoft's handling of security researchers, discloses Windows zero-day
http://cwonline.computerworld.com/t/8591571/823929835/613272/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~
White Paper: Planning for and Validating a DDoS Defense
It's not uncommon for DDoS monitoring or mitigation to fail under attack
conditions. Eliminate that risk by being proactive. Prolexic's new white paper
shows you how to validate your mitigation solution – whether third party or
in-house – and build an effective "play book" against DDoS attacks.
http://cwonline.computerworld.com/t/8591571/823929835/613273/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Why you need a security buddy (and how to find one)
At a school event, I noticed my son sitting and talking with a younger boy. When
I asked who he was, my son explained, "he's my kinder buddy!"
http://cwonline.computerworld.com/t/8591571/823929835/613268/0/
New Citadel malware variant targets Payza online payment platform
A new variant of the Citadel financial malware is targeting users of the Payza
online payment platform by launching local in-browser attacks to steal their
credentials, according to researchers from security firm Trusteer.
http://cwonline.computerworld.com/t/8591571/823929835/613269/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Red Hat~~~~~~~~~~~~~~~~~~~~~
Red Hat JBoss Enterprise Application Platform
This competitive brief outlines the differences in the economies of the
competing application platforms, the implementation of the JEE specification,
open standards support and other non-JEE specifications features. Read this
paper to learn more about how your organization can benefit from Red Hat JBoss
Enterprise Application Platform.
http://cwonline.computerworld.com/t/8591571/823929835/613274/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f6a29391
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Blue Coat Systems to acquire security analytics firm Solera Networks
Blue Coat Systems, a provider of Web traffic filtering and business assurance
products and services, plans to buy security analytics specialist Solera
Networks, which uses data mining techniques to classify network traffic and
detect potential security threats.
http://cwonline.computerworld.com/t/8591571/823929835/613270/0/
Twitter aims to become safer with two-step sign-in
Twitter, in a much-needed move to keep its users safer from cyberattacks, is
introducing a more secure login process.
http://cwonline.computerworld.com/t/8591571/823929835/613271/0/
Google engineer bashes Microsoft's handling of security researchers, discloses Windows zero-day
A Google security engineer accused Microsoft of treating outside researchers
with "great hostility" days before posting details of an unpatched vulnerability
in Windows that could be used to crash PCs or gain additional access rights.
http://cwonline.computerworld.com/t/8591571/823929835/613272/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8591571/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8591571/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
One of the first Google Glass apps, Winky, lets Glass users take pictures with
the blink of an eye, leading some to start talking about a potential privacy
issues and social etiquette. Would you buy a pair of Google Glass when it
becomes available?
http://cwonline.computerworld.com/t/8591571/823929835/611670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8591571/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8591571/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8591571/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8591571/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8591571/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NTkxNTcx&x=d7d51b6a
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8591571/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8591571/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8591571/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Thursday, May 23, 2013
Growing mobile malware threat swirls (mostly) around Android
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:15 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment