Monday, July 22, 2013

Apple confirms hack of its developer website

Computerworld Security: July 22, 2013
===============================================================

Apple confirms hack of its developer website

Apple on Sunday admitted that its developer website, which has been offline
since Thursday, had been hacked and sSome information may have been stolen.
http://cwonline.computerworld.com/t/8663342/823929835/620994/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: LogMeIn~~~~~~~~~~~~~~~~~~~~~

Powerful and secure remote support with LogMeIn Rescue

For companies that want to compete in their industry, improving the customer
experience is a top priority. To do that, having an on-demand remote support
solution is essential. That's why companies around the world choose LogMeIn
Rescue to provide powerful, secure support of any device, anytime, anywhere.

http://cwonline.computerworld.com/t/8663342/823929835/620995/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Best security tools for under $3,000
http://cwonline.computerworld.com/t/8663342/823929835/620996/0/

2. Ubuntu forum defaced, breached by hackers
http://cwonline.computerworld.com/t/8663342/823929835/620997/0/

3. True tales of (mostly) white-hat hacking
http://cwonline.computerworld.com/t/8663342/823929835/620998/0/

4. SIM cards vulnerable to hacking, says researcher
http://cwonline.computerworld.com/t/8663342/823929835/620999/0/

5. Cyber drills like Quantum Dawn 2 vital to security in financial sector
http://cwonline.computerworld.com/t/8663342/823929835/621000/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~

Consolidating Remote Servers and Storage for Security

A new kind of storage architecture allows IT to consolidate remote servers and
data in the data center by decoupling storage from its server over any
distance--even thousands of miles--and still get the same performance as if the
storage remained local to the branch.

http://cwonline.computerworld.com/t/8663342/823929835/621001/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5bbf8e7a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Best security tools for under $3,000

Check Point wins test of eight unified threat management (UTM) devices for
small business.
http://cwonline.computerworld.com/t/8663342/823929835/620996/0/

Ubuntu forum defaced, breached by hackers

A website dedicated to discussion of the Ubuntu Linux distribution was breached
on Saturday, with hackers gaining access to encrypted passwords and email
addresses.
http://cwonline.computerworld.com/t/8663342/823929835/620997/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Hitachi and Microsoft~~~~~~~~~~~~~~~~~~~~~

Rapid Deployment of Microsoft Environments

Learn how to get the most out of your Microsoft environments while staying
within budget, by looking at Hitachi turnkey converged infrastructure solutions
validated by Microsoft from a single qualified vendor. They're pre-validated and
preconfigured, they ship quickly and they're ready to deploy right out of the
box.

http://cwonline.computerworld.com/t/8663342/823929835/621002/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fb0dfe6d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin
gray line of IT security
http://cwonline.computerworld.com/t/8663342/823929835/620998/0/

SIM cards vulnerable to hacking, says researcher

Millions of mobile phones may be vulnerable to spying due to the use of
outdated, 1970s-era cryptography, according to new research due to be presented
at the Black Hat security conference.
http://cwonline.computerworld.com/t/8663342/823929835/620999/0/

Cyber drills like Quantum Dawn 2 vital to security in financial sector

Cyber exercises, like the Quantum Dawn 2 drill carried out by dozens of Wall
Street firms this week, can be useful in helping financial firms close critical
gaps in their incident response capabilities, analysts said.
http://cwonline.computerworld.com/t/8663342/823929835/621000/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8663342/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=21e0b646

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8663342/823929835/616819/0/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8663342/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8663342/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?

http://cwonline.computerworld.com/t/8663342/823929835/617776/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8663342/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8663342/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8663342/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8663342/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8663342/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjYzMzQy&x=8a5690e1

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8663342/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8663342/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8663342/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:14 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive