Friday, July 19, 2013

Lawmakers push for federal data breach notification law

Computerworld Security: July 19, 2013
===============================================================

Lawmakers push for federal data breach notification law

U.S. lawmakers plan to resurrect national data breach notification legislation
that has failed to pass in past sessions of Congress, but some advocates don't
agree on what should be included in a bill.
http://cwonline.computerworld.com/t/8660516/823929835/620788/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Xerox~~~~~~~~~~~~~~~~~~~~~

SMB Security Guide

Amidst evolving cybersecurity threats, SMBs must be armed for the worst in order
to drive innovation in today's decentralized, mobile workforce. Join this live
webcast Tuesday, April 16, 2013, 11:00 AM EDT as we explore everything from
threats and vulnerabilities to new security models and risk management best
practices.

http://cwonline.computerworld.com/t/8660516/823929835/620789/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7bdeeb3a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Wyndham lawsuit tests FTC's data security enforrcement authority
http://cwonline.computerworld.com/t/8660516/823929835/620790/0/

2. N.J. Supreme Court rules warrants needed for phone tracking
http://cwonline.computerworld.com/t/8660516/823929835/620791/0/

3. Google Glass still vulnerable to Wi-Fi attack
http://cwonline.computerworld.com/t/8660516/823929835/620792/0/

4. In the run-up to security conference Black Hat, all apps are suspicious
http://cwonline.computerworld.com/t/8660516/823929835/620793/0/

5. Facebook lands bug hunters with Monoidics buy
http://cwonline.computerworld.com/t/8660516/823929835/620794/0/

6. Java 7 vulnerability opens door to 10-year-old attack
http://cwonline.computerworld.com/t/8660516/823929835/620795/0/

7. 'Kill switch' on smartphones takes a step forward
http://cwonline.computerworld.com/t/8660516/823929835/620796/0/

8. Jonny Evans: Apple, Google, Microsoft and others demand transparency post-PRISM
http://cwonline.computerworld.com/t/8660516/823929835/620797/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Average Attack Bandwidth Increases 1,655% over Q2 2012

As the world's leading DDoS mitigation provider, Prolexic is ideally positioned
to collect valuable data on the origins, tactics, types, and targets of these
attacks and identify emerging trends. Through data forensics and post attack
analysis, Prolexic is able to build a global view of DDoS attacks.

http://cwonline.computerworld.com/t/8660516/823929835/620798/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Wyndham lawsuit tests FTC's data security enforrcement authority

The Chamber of Commerce and several other organizations to asking a federal
court to dismiss a closely watched data breach lawsuit filed by the Federal
Trade Commission against Wyndham Worldwide Corp.
http://cwonline.computerworld.com/t/8660516/823929835/620790/0/

N.J. Supreme Court rules warrants needed for phone tracking

Cellphone users have a reasonable expectation of privacy in their cellphone
location information, and police must obtain a search warrant before accessing
that information, the Supreme Court of New Jersey ruled Thursday.
http://cwonline.computerworld.com/t/8660516/823929835/620791/0/

Google Glass still vulnerable to Wi-Fi attack

Google fixed one Wi-Fi security problem with its wearable computer Glass, but
Symantec says there's another problem, which has been a long-known weakness in
wireless networking.
http://cwonline.computerworld.com/t/8660516/823929835/620792/0/

In the run-up to security conference Black Hat, all apps are suspicious

Navigating city streets, walking to work… you see cell phones, everywhere. Three
out of four of those are Android, according to Gartner.Users might feel
confident that the apps they use are safe-- but that's not always true.
http://cwonline.computerworld.com/t/8660516/823929835/620793/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~

Intelligent IT Operations: Making IT Smarter

Consolidating IT event management in a centralized operations bridge can help
you increase efficiency in the short term while setting the stage for greater
competitiveness over the long term.

http://cwonline.computerworld.com/t/8660516/823929835/620799/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=9b98de6f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Facebook lands bug hunters with Monoidics buy

Facebook is acquiring the assets of Monoidics, a U.K.-based software startup,
including its bug-hunting technical team.
http://cwonline.computerworld.com/t/8660516/823929835/620794/0/

Java 7 vulnerability opens door to 10-year-old attack

Security researchers from Polish vulnerability research firm Security
Explorations claim to have identified a new vulnerability in Java 7 that could
allow attackers to bypass the software's security sandbox and execute arbitrary
code on the underlying system.
http://cwonline.computerworld.com/t/8660516/823929835/620795/0/

'Kill switch' on smartphones takes a step forward

A call by U.S. prosecutors for phone manufacturers to install a "kill switch" to
discourage smartphone theft has taken a step forward, with Apple and Samsung
providing handsets whose security features will be put to the test.
http://cwonline.computerworld.com/t/8660516/823929835/620796/0/

Jonny Evans: Apple, Google, Microsoft and others demand transparency post-PRISM


Tech firms have begun fighting back against the level of US government
surveillance revealed with PRISM, with Apple, Google, Facebook and
others uniting to demand greater transparency when it comes to the full extent
of government surveillance -- but this isn't just about privacy, this is
a fight for the future of technology.
http://cwonline.computerworld.com/t/8660516/823929835/620797/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8660516/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=350bb5be

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8660516/823929835/616819/0/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8660516/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8660516/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?

http://cwonline.computerworld.com/t/8660516/823929835/617776/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8660516/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8660516/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8660516/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8660516/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8660516/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjYwNTE2&x=5f945132

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8660516/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8660516/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8660516/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:41 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive