Computerworld Security: July 01, 2013
===============================================================
Two malware programs help each other stay on computers
Two malicious software programs that help each other stay on computers are
proving difficult to remove.
http://cwonline.computerworld.com/t/8636887/823929835/617944/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Consolidating Remote Servers and Storage for Security
A new kind of storage architecture allows IT to consolidate remote servers and
data in the data center by decoupling storage from its server over any
distance--even thousands of miles--and still get the same performance as if the
storage remained local to the branch.
http://cwonline.computerworld.com/t/8636887/823929835/617945/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7d0fff17
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Steve Pate: Data privacy and PRISM: When politics and technology collide
http://cwonline.computerworld.com/t/8636887/823929835/617946/0/
2. 8 great sites for one-stop data visualization
http://cwonline.computerworld.com/t/8636887/823929835/617947/0/
3. Darlene Storm: NSA collected 1 trillion metadata records, harvested 1 billion mobile calls daily
http://cwonline.computerworld.com/t/8636887/823929835/617948/0/
4. 3 reasons why America's security model is broken
http://cwonline.computerworld.com/t/8636887/823929835/617949/0/
5. New disk wiper malware linked to attacks in South Korea, researchers say
http://cwonline.computerworld.com/t/8636887/823929835/617950/0/
6. Nintendo warns against super Pokemon creator app
http://cwonline.computerworld.com/t/8636887/823929835/617951/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast North America Inc~~~~~~~~~~~~~~~~~~~~~
What it takes to deliver Security, and Privacy at Mimecast.
This whitepaper explains the process and controls that Mimecast put in place to
deliver a secure, private and trusted SaaS platform for your email security,
email archiving and email continuity.
http://cwonline.computerworld.com/t/8636887/823929835/617952/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=79782363
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Steve Pate: Data privacy and PRISM: When politics and technology collide
If you are both a news and a cloud junky as I am, there has never been a more
interesting -- or distracting -- time to hit refresh on your favorite online
news site. The recent statements by whistle-blower Eric Snowden about the scope
of surveillance and data capture by the NSA were surprising -- and highly
concerning -- to many.
Is this news powerful enough to silence the siren call of the cloud? What can
companies do to protect themselves -- and their data -- if Snowden's disclosures
are accurate?
http://cwonline.computerworld.com/t/8636887/823929835/617946/0/
8 great sites for one-stop data visualization
These are places to find, analyze and visualize publicly available data to use
in your own materials.
http://cwonline.computerworld.com/t/8636887/823929835/617947/0/
Darlene Storm: NSA collected 1 trillion metadata records, harvested 1 billion mobile calls daily
An office of secret NSA spooks celebrated one trillion metadata
records collected and counting. Newly leaked PRISM slides show surveillance
capabilities including real-time digital eavesdropping acess. More leaked top
secret documents 'coming soon' will include the fact that the NSA hoovers up
one billion cell phone calls every single day.
http://cwonline.computerworld.com/t/8636887/823929835/617948/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
Enable Faster Backup and More Effective Long-Term Archiving
Read the IDC report on how EMC is well positioned to help organizations that
want to consider alternatives to tape for long-term backup retention and
archiving needs.
http://cwonline.computerworld.com/t/8636887/823929835/617953/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=239cc76a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
3 reasons why America's security model is broken
Securing important corporate or personal information has never been more
challenging. Every day, new vulnerabilities are discovered, more breaches are
reported and we all become less secure. Just look at the headlines, whether it
is Anonymous latest attack, state sponsored Cyber espionage or warfare, criminal
activity or just someone being exploited by five year old malicious code that
still finds victims, the picture metaphor is of a snowball rolling downhill and
getting bigger and bigger as it rolls.
http://cwonline.computerworld.com/t/8636887/823929835/617949/0/
New disk wiper malware linked to attacks in South Korea, researchers say
A new piece of malware designed to delete files from hard disk drives and render
computers unable to boot targets South Korean users, according to researchers
from security firm Symantec.
http://cwonline.computerworld.com/t/8636887/823929835/617950/0/
Nintendo warns against super Pokemon creator app
Nintendo warned Friday against the use of a smartphone app that can be used to
create custom, all-powerful Pokemon characters for use in its handheld games.
http://cwonline.computerworld.com/t/8636887/823929835/617951/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8636887/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=70d77981
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8636887/823929835/616819/0/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8636887/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8636887/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?
http://cwonline.computerworld.com/t/8636887/823929835/617776/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8636887/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8636887/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8636887/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8636887/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8636887/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjM2ODg3&x=13dd4f13
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8636887/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8636887/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8636887/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Monday, July 1, 2013
Two malware programs help each other stay on computers
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:49 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment