Thursday, July 25, 2013

Apple's developer site overhaul continues following breach

Computerworld Security: July 25, 2013
===============================================================

Apple's developer site overhaul continues following breach

Apple is incrementally restoring its developer systems following an intrusion
last week the company said may have divulged personal information about
registered users.
http://cwonline.computerworld.com/t/8668598/823929835/621613/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Dell Inc.~~~~~~~~~~~~~~~~~~~~~

A New Set of Network Security Challenges

This eBook highlights the latest features, use cases, and justifications of
next-generation firewalls. Their demonstrated ability to filter network and
Internet traffic based upon layer 7 data, prioritize and throttle traffic, and
offer broader and more secure support for mobile users are some of the reasons
driving increased adoption.

http://cwonline.computerworld.com/t/8668598/823929835/621614/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e1f051e9

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Darlene Storm: Spying to continue, House votes down plan to defund the NSA
http://cwonline.computerworld.com/t/8668598/823929835/621615/0/

2. House votes against reining in NSA records collection
http://cwonline.computerworld.com/t/8668598/823929835/621616/0/

3. Ryan Kalember: BrandPost: Weighing COPE vs. BYOD? Don't Forget Key Security Factor: FILE - Sponsored
http://cwonline.computerworld.com/t/8668598/823929835/621617/0/

4. Citadel malware active on 20,000 PCs in Japan
http://cwonline.computerworld.com/t/8668598/823929835/621618/0/

5. Syrian Electronic Army hacks into Viber support website
http://cwonline.computerworld.com/t/8668598/823929835/621619/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: FICO (Fair Isaac)~~~~~~~~~~~~~~~~~~~~~

Deliver Customer Value with Big Data Analytics

Big Data requires that companies adopt a different method in understanding
today's consumer. Read this white paper to learn why Big Data is not just
another passing trend.

http://cwonline.computerworld.com/t/8668598/823929835/621620/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=95bacb32

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Spying to continue, House votes down plan to defund the NSA


The proposal to defund the NSA, to cut the heart of the metadata collection
program, was defeated in the House. Meanwhile the NSA claims it can't search its
own email! The NSA chief claimed the reason for the secrecy surrounding all the
surveillance was not to hide the collection program from Americans, but from
those trying to kill Americans. Lastly, encryption may be a moot point if the
NSA and FBI are holding the master encryption keys.
http://cwonline.computerworld.com/t/8668598/823929835/621615/0/

House votes against reining in NSA records collection

The U.S. House of Representatives has narrowly rejected an effort to stop the
National Security Agency from collecting millions of U.S. residents' telephone
records.
http://cwonline.computerworld.com/t/8668598/823929835/621616/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Dell Inc.~~~~~~~~~~~~~~~~~~~~~

Quantifying the Impact of Network-Based Attacks

New investments in network security can be difficult to cost justify. This paper
offers advice on how to assess the impact of network-based attacks on your
organization with examples of how attacks impact the bottom line, methods to
quantify their effect, and proven techniques to create your own economic model.

http://cwonline.computerworld.com/t/8668598/823929835/621621/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=38764270

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ryan Kalember: BrandPost: Weighing COPE vs. BYOD? Don't Forget Key Security Factor: FILE - Sponsored


In 2012, security conversations about mobile workers tended to focus around
four letters: B-Y-O-D. The bring-your-own-device trend was hot. Workers wanted
to use their own smartphones and tablets, and enterprises wanted to give them
the flexibility to stay connected from anywhere, at any time. Employee
satisfaction, collaboration and productivity were high, but so was risk, since
few businesses knew how to adequately protect their sensitive information in the
age of BYOD.
http://cwonline.computerworld.com/t/8668598/823929835/621617/0/

Citadel malware active on 20,000 PCs in Japan

Citadel malware is installed on over 20,000 PCs in Japan and actively sending
financial information it harvests to servers abroad, according to security
software vendor Trend Micro.
http://cwonline.computerworld.com/t/8668598/823929835/621618/0/

Syrian Electronic Army hacks into Viber support website

The hacker group calling itself the Syrian Electronic Army (SEA) broke into the
customer support website for Viber, an instant messaging and
Voice-over-Internet-Protocol (VoIP) application available for both mobile and
desktop operating systems.
http://cwonline.computerworld.com/t/8668598/823929835/621619/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8668598/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bcc227df

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8668598/823929835/616819/0/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8668598/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8668598/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?

http://cwonline.computerworld.com/t/8668598/823929835/621572/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8668598/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8668598/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8668598/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8668598/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8668598/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjY4NTk4&x=06ebb50f

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8668598/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8668598/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8668598/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:40 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive