Wednesday, July 17, 2013

Michael Horowitz: Software bugs as weapons

Computerworld Security: July 17, 2013
===============================================================

Michael Horowitz: Software bugs as weapons


Two recent stories, one in the New York Times and one in InfoWorld, describe
the expanding use of software flaws as weapons. How to defend against this? Look
for software that is simple and unpopular. Windows users should look into
Sandboxie. The safest of the safe however is a Chromebook.
http://cwonline.computerworld.com/t/8657108/823929835/620349/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

MDM and beyond: Rethinking mobile security in a BYOD world

The bring-your-own device (BYOD) phenomenon has both unleashed user productivity
and presented unprecedented challenges for information security. In this
environment, traditional point solutions aren't enough. This white paper reviews
the limitations and explores enterprise mobility management options.

http://cwonline.computerworld.com/t/8657108/823929835/620350/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8f283b41

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. W3C rejects ad industry attempt to hijack do-not-track specs
http://cwonline.computerworld.com/t/8657108/823929835/620351/0/

2. Who can pry into your cloud-based data?
http://cwonline.computerworld.com/t/8657108/823929835/620352/0/

3. Oracle's July patch release includes 27 fixes for remote exploits
http://cwonline.computerworld.com/t/8657108/823929835/620353/0/

4. Tumblr issues security update, asks users to change passwords
http://cwonline.computerworld.com/t/8657108/823929835/620354/0/

5. Alternative fixes released for Android 'master key' vulnerability
http://cwonline.computerworld.com/t/8657108/823929835/620355/0/

6. Microsoft denies giving NSA direct access to email
http://cwonline.computerworld.com/t/8657108/823929835/620356/0/

7. Church, advocacy groups sue NSA over surveillance
http://cwonline.computerworld.com/t/8657108/823929835/620357/0/

8. New digitally signed Mac malware confuses users with right-to-left file name tricks
http://cwonline.computerworld.com/t/8657108/823929835/620358/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

Top 10 Reasons to Strengthen Security with Virtualization

Mobility, cloud computing, consumerization and flexwork mean that more people
are accessing applications & data in more ways than ever before. We explore 10
reasons why desktop virtualization should be the foundation of your approach to
security.

http://cwonline.computerworld.com/t/8657108/823929835/620359/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=370810be

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

W3C rejects ad industry attempt to hijack do-not-track specs

The World Wide Web Consortium has rejected an attempt by the advertising
industry to hijack a specification describing how websites should respond to "do
not track" requests sent by Web browsers.
http://cwonline.computerworld.com/t/8657108/823929835/620351/0/

Who can pry into your cloud-based data?

The NSA's Prism spying program highlights the need to make sure your cloud
contract safeguards your data from access by third parties.
http://cwonline.computerworld.com/t/8657108/823929835/620352/0/

Oracle's July patch release includes 27 fixes for remote exploits

Oracle said on Tuesday that its monthly round of patches for July includes 89
fixes, 27 of which address remotely exploitable vulnerabilities in four widely
used products.
http://cwonline.computerworld.com/t/8657108/823929835/620353/0/

Tumblr issues security update, asks users to change passwords

Tumblr, the blogging site recently acquired by Yahoo, has released a security
update for its iPhone and iPad apps that it said addresses an issue that allowed
passwords to be compromised in certain circumstances.
http://cwonline.computerworld.com/t/8657108/823929835/620354/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

10 Must Haves for Secure EMM paper

While enterprise mobility brings opportunity for your users and organization, it
also invites risk for IT. This whitepaper provides a mobile security framework
for enterprises and a checklist for evaluating enterprise mobility vendors.

http://cwonline.computerworld.com/t/8657108/823929835/620360/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ed78be37

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Alternative fixes released for Android 'master key' vulnerability

More fixes are appearing for a pair of highly dangerous vulnerabilities exposed
earlier this month in the Android mobile operating system.
http://cwonline.computerworld.com/t/8657108/823929835/620355/0/

Microsoft denies giving NSA direct access to email

Microsoft does not give the U.S. National Security agency direct access to its
customers' email or instant messages, contrary to previous news reports, a
company executive said.
http://cwonline.computerworld.com/t/8657108/823929835/620356/0/

Church, advocacy groups sue NSA over surveillance

Nineteen organizations, including a church and gun ownership and marijuana
legalization groups, have filed a lawsuit against the U.S. National Security
Agency for a surveillance program that targets U.S. residents' phone records.
http://cwonline.computerworld.com/t/8657108/823929835/620357/0/

New digitally signed Mac malware confuses users with right-to-left file name tricks

A new piece of digitally signed spyware for Mac OS X uses a special Unicode
character in its file name to hide its real file extension from users and trick
them into installing it.
http://cwonline.computerworld.com/t/8657108/823929835/620358/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8657108/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3aea16ca

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8657108/823929835/616819/0/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8657108/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8657108/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?

http://cwonline.computerworld.com/t/8657108/823929835/617776/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8657108/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8657108/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8657108/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8657108/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8657108/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjU3MTA4&x=19687a91

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8657108/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8657108/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8657108/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:37 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive