Thursday, May 30, 2013

Private retaliation in cyberspace a 'remarkably bad idea'

Computerworld Security: May 30, 2013
===============================================================

Private retaliation in cyberspace a 'remarkably bad idea'

Despite the growing threat of state-sponsored cyberattacks launched from China
and other countries, U.S companies should not be allowed fight back on their
own, security experts say.
http://cwonline.computerworld.com/t/8599888/823929835/613921/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: KnowBe4~~~~~~~~~~~~~~~~~~~~~

How big is your 'phishing attack surface'?

Many email addresses of your organization are exposed, allowing cybercriminals
to launch spear-phishing attacks. The bigger the attack footprint, the higher
your risk. Fill out the form and we'll email you the list of exposed addresses.

http://cwonline.computerworld.com/t/8599888/823929835/613905/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. McAfee offers business endpoint security suites for broader protection
http://cwonline.computerworld.com/t/8599888/823929835/613922/0/

2. Telenor hopes to encourage phone recycling by erasing data more securely
http://cwonline.computerworld.com/t/8599888/823929835/613923/0/

3. Darlene Storm: Music playing 55 feet away could covertly activate Android mobile malware
http://cwonline.computerworld.com/t/8599888/823929835/613924/0/

4. Drupal resets account passwords after detecting unauthorized access
http://cwonline.computerworld.com/t/8599888/823929835/613925/0/

5. Decryption disclosure doesn't violate Fifth Amendment, judge rules in child porn case
http://cwonline.computerworld.com/t/8599888/823929835/613926/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

Enable Faster Backup and More Effective Long-Term Archiving

EMC Data Domain Systems respond to the challenges organizations are struggling
with as they balance requirements for disk-based backup, long-term backup
retention, and cost-effective archiving. The systems support long-term backup
retention and provide a foundation for supporting new archiving workloads.

http://cwonline.computerworld.com/t/8599888/823929835/613927/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3d4aa674

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

McAfee offers business endpoint security suites for broader protection

Aiming to better address the security needs of businesses of all sizes that are
facing increasingly complex attacks, McAfee has added two endpoint security
suites to its product lineup.
http://cwonline.computerworld.com/t/8599888/823929835/613922/0/

Telenor hopes to encourage phone recycling by erasing data more securely

Norwegian operator Telenor will use special software to ensure that all personal
and sensitive content is deleted from smartphones and tablets handed in by users
for recycling, a change it hopes will result in fewer customers holding on to
their old devices.
http://cwonline.computerworld.com/t/8599888/823929835/613923/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: serVelocity~~~~~~~~~~~~~~~~~~~~~

Priorities for Reversing Services Decay

The state of the high tech services industry is in flux as never before. With
changing patterns of software/solution consumption and pressure on traditional
service delivery models increasing, many leaders "get it" and want to move
services forward. But we are often reactive given the reality of the world we
live in.

http://cwonline.computerworld.com/t/8599888/823929835/613928/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=38af3e44

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Music playing 55 feet away could covertly activate Android mobile malware


Security researchers warned that the music playing at Starbucks, light
from the TV, vibration from riding in your car, or even magnets in NFC readers
could potentially trigger malware hidden in Android devices. Command and control
trigger messages could be sent from up to 55 feet away based on acoustic,
visual, magnetic and vibrational signaling. Mobile malware using sensor-based
channels would be nearly impossible to detect.
http://cwonline.computerworld.com/t/8599888/823929835/613924/0/

Drupal resets account passwords after detecting unauthorized access

Drupal.org has reset account passwords after it found unauthorized access to
information on its servers.
http://cwonline.computerworld.com/t/8599888/823929835/613925/0/

Decryption disclosure doesn't violate Fifth Amendment, judge rules in child porn case

A federal judge in Wisconsin has ordered a suspect in a child porn investigation
to either provide prosecutors with the passwords to several encrypted storage
devices of his that are thought to contain incriminating evidence or to provide
them with a decrypted copy of the contents of the drives.
http://cwonline.computerworld.com/t/8599888/823929835/613926/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8599888/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8599888/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

BYOD has moved beyond smartphones and tablets to PCs. In fact, about 25% of
employees in businesses with more than 10 employees have bought the primary PC
they use for work, meaning companies are buying fewer PCs. Do you think BYOD is
to blame for slack PC sales?

http://cwonline.computerworld.com/t/8599888/823929835/613901/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8599888/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8599888/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8599888/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8599888/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8599888/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NTk5ODg4&x=dccf4c8b

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8599888/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8599888/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8599888/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:16 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive