Computerworld Security: July 23, 2013
===============================================================
F5 data center firewall aces performance test
Huge data center, check. Multiple 10G Ethernet pipes, check. Load balancer,
check. Firewall? Really? Do network architects need to buy yet another box, and
likely take a performance hit?
http://cwonline.computerworld.com/t/8665012/823929835/621224/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
EMC Storage Resource Management Suite
Learn how you can visualize applications to storage dependencies, analyze
configurations and capacity growth, and optimize your environment to improve
storage management efficiency.
http://cwonline.computerworld.com/t/8665012/823929835/621225/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=faae8dca
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Darlene Storm: 750 million phones vulnerable to spying: Hack SIM card via tainted text to get root
http://cwonline.computerworld.com/t/8665012/823929835/621226/0/
2. Following attacks, Networks Solutions reports MySQL hiccups
http://cwonline.computerworld.com/t/8665012/823929835/621227/0/
3. Tired of spam? Hand out a disposable email address
http://cwonline.computerworld.com/t/8665012/823929835/621228/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Plantronics, Inc.~~~~~~~~~~~~~~~~~~~~~
Making Voice a Successful Part of Your UC Rollout
You've thought long and hard about the investment you're making in Unified
Communications. We've compiled ten steps to streamline the audio aspect of your
UC deployment. Putting an audio strategy in place now can help you plan, deploy
and eventually drive higher adoption rates. Download our workbook now!
http://cwonline.computerworld.com/t/8665012/823929835/621229/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8c2417e5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: 750 million phones vulnerable to spying: Hack SIM card via tainted text to get root
Security researchers exploited an encryption flaw by sending hidden text
messages like mobile operators do to push out updates. But the researchers can
text a secret virus that allows root access to the SIM card. An attacker could
then eavesdrop on calls, access location information, send premium text
messages, change the voicemail number, and even make purchases via mobile
payment systems. About 750 million phones may be vulnerable and the attack takes
only about two minutes. "Rooting SIM cards" will be presented at the Black
Hat security conference in Las Vegas.
http://cwonline.computerworld.com/t/8665012/823929835/621226/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: FICO (Fair Isaac)~~~~~~~~~~~~~~~~~~~~~
Cloud Analytics for the Masses
Learn the best practices in building applications that can leverage volume,
variety and velocity of Big Data for organizations of any size.
http://cwonline.computerworld.com/t/8665012/823929835/621230/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e5ee1b43
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Following attacks, Networks Solutions reports MySQL hiccups
Network Solutions warned on Monday of latency problems for customers using MySQL
databases just a week after the hosting company fended off distributed
denial-of-service (DDoS) attacks.
http://cwonline.computerworld.com/t/8665012/823929835/621227/0/
Tired of spam? Hand out a disposable email address
A new privacy tool called MaskMe may help people evade data harvesting efforts
by websites and marketers.
http://cwonline.computerworld.com/t/8665012/823929835/621228/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8665012/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4ebac627
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8665012/823929835/616819/0/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8665012/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8665012/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?
http://cwonline.computerworld.com/t/8665012/823929835/617776/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8665012/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8665012/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8665012/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8665012/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8665012/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjY1MDEy&x=46b2b3ac
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8665012/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8665012/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8665012/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, July 23, 2013
F5 data center firewall aces performance test
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:39 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment