Wednesday, July 3, 2013

Two malware programs help each other stay on computers

Computerworld Security: Issues and Trends: July 03, 2013
===============================================================

Two malware programs help each other stay on computers

Two malicious software programs that help each other stay on computers are
proving difficult to remove.
http://cwonline.computerworld.com/t/8640672/823929840/618337/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Workday, Inc.~~~~~~~~~~~~~~~~~~~~~

Innovation in the Cloud – Knowledge Vault

Managing HR and financial information in the modern business requires efficient
business practices and technology. Learn how leveraging the cloud allows you to
unify financial and HR data; visualize data with cloud analytics and improve
productivity with flexible configuration.

http://cwonline.computerworld.com/t/8640672/823929840/618338/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=996fd11e

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. How to run your own NSA spy program
http://cwonline.computerworld.com/t/8640672/823929840/618339/0/

2. Citadel malware targets localized brands and users
http://cwonline.computerworld.com/t/8640672/823929840/618340/0/

3. Google adds malware, phishing numbers to its transparency report
http://cwonline.computerworld.com/t/8640672/823929840/618341/0/

4. Suspected China-based hackers 'Comment Crew' rises again
http://cwonline.computerworld.com/t/8640672/823929840/618342/0/

5. Expanded '2-person rule' could help plug NSA leaks
http://cwonline.computerworld.com/t/8640672/823929840/618343/0/

6. NSA can retain encrypted communications of Americans possibly indefinitely
http://cwonline.computerworld.com/t/8640672/823929840/618344/0/

7. New privacy bill aimed at reforming FISA and the Patriot Act introduced in the Senate
http://cwonline.computerworld.com/t/8640672/823929840/618345/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: HP Intel VMware~~~~~~~~~~~~~~~~~~~~~

Your IT Journey - Your Way

Faced with unrelenting pressure to do more with less, IT leaders are
implementing virtualization, mobility and cloud computing in their enterprises.
In this Knowledge Vault Exchange you'll find a plethora of valuable information,
including videos, on-demand Webcasts, white papers and Twitter chats.

http://cwonline.computerworld.com/t/8640672/823929840/618346/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ce578135

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How to run your own NSA spy program

The ideas behind the NSA's spy program are built into a wide variety of tools
available to everybody. Mike Elgan walks you through the steps for building your
very own PRISM-like program.
http://cwonline.computerworld.com/t/8640672/823929840/618339/0/

Citadel malware targets localized brands and users

A new variant of the Citadel financial malware uses in-browser injection
techniques combined with extensive content localization to steal log-in
credentials and credit card information from users in different countries,
according to researchers from security vendor Trusteer.
http://cwonline.computerworld.com/t/8640672/823929840/618340/0/

Google adds malware, phishing numbers to its transparency report

Google is revealing some new numbers around malware and phishing attempts in an
effort to get more people thinking about online security and to make the Web
safer.
http://cwonline.computerworld.com/t/8640672/823929840/618341/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: SAP~~~~~~~~~~~~~~~~~~~~~

Bring Mobile Innovation to your Enterprise.

With the mobility revolution well underway, CIO's and Line of Business owners
are faced with the struggle to develop a winning mobile strategy. In this
exclusive SAP KnowledgeVault Exchange, find out how to give your company an edge
by developing a secure, future-proof mobile strategy.

http://cwonline.computerworld.com/t/8640672/823929840/618347/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f46b23b7

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Suspected China-based hackers 'Comment Crew' rises again

The suspected China-based hackers known as the "Comment Crew" are back at it
again, a development likely to contribute to continued tensions between the U.S.
and China over cyberattacks.
http://cwonline.computerworld.com/t/8640672/823929840/618342/0/

Expanded '2-person rule' could help plug NSA leaks

The National Security Agency is creating new processes aimed at making it harder
for systems administrators to misuse privileged access to agency systems, NSA
officials told the U.S. House Intelligence Committee.
http://cwonline.computerworld.com/t/8640672/823929840/618343/0/

NSA can retain encrypted communications of Americans possibly indefinitely

The National Security Agency can retain communications of U.S. citizens or
residents potentially indefinitely if those communications are encrypted,
according to a newly leaked secret government document.
http://cwonline.computerworld.com/t/8640672/823929840/618344/0/

New privacy bill aimed at reforming FISA and the Patriot Act introduced in the Senate

New legislation aims to reform the Patriot and FISA Amendments Acts to apply
greater oversight and control to the government's surveillance programs.
http://cwonline.computerworld.com/t/8640672/823929840/618345/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8640672/823929840/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3be6d672

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8640672/823929840/616819/0/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8640672/823929840/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8640672/823929840/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?

http://cwonline.computerworld.com/t/8640672/823929840/617776/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8640672/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8640672/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8640672/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8640672/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8640672/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODY0MDY3Mg%3d%3d&x=8c0dfbfb

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8640672/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8640672/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8640672/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive