Computerworld Security: July 02, 2013
===============================================================
With BlackBerry reportedly hacked, is anything secure?
You have to wonder what level of encryption can withstand the brute-force
computing power that is cheaply available today.
http://cwonline.computerworld.com/t/8638675/823929835/618183/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~
Intelligent IT Operations: Making IT Smarter
Consolidating IT event management in a centralized operations bridge can help
you increase efficiency in the short term while setting the stage for greater
competitiveness over the long term.
http://cwonline.computerworld.com/t/8638675/823929835/618184/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=9946dca0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. AT&T iPad hacker files appeal over conviction, long sentence
http://cwonline.computerworld.com/t/8638675/823929835/618185/0/
2. Critical vulnerabilities found in Atlassian Crowd enterprise single sign-on tool
http://cwonline.computerworld.com/t/8638675/823929835/618186/0/
3. Modified online children's privacy rules take effect in US
http://cwonline.computerworld.com/t/8638675/823929835/618187/0/
4. All about Prism, Internet privacy and -- wait! -- squirrel!
http://cwonline.computerworld.com/t/8638675/823929835/618188/0/
5. Vulnerabilities found in code library used by encrypted phone call apps
http://cwonline.computerworld.com/t/8638675/823929835/618189/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
Top Reasons Why More People Choose EMC Backup for Oracle
It's all about choice. We are the first and only vendor to offer full DBA
control of backup, recovery and replication for Oracle. This means your backup
team or your DBAs can back up your Oracle environment - the choice is theirs!
http://cwonline.computerworld.com/t/8638675/823929835/618190/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=97c7aa9a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
AT&T iPad hacker files appeal over conviction, long sentence
A U.S. man prosecuted for exposing a weakness in how AT&T handled the
personal data of its iPad users filed an appeal on Monday of his conviction and
41-month sentence.
http://cwonline.computerworld.com/t/8638675/823929835/618185/0/
Critical vulnerabilities found in Atlassian Crowd enterprise single sign-on tool
A critical vulnerability that could allow remote attackers to access sensitive
enterprise log-in credentials and other data was fixed last week in Crowd, a
single sign-on (SSO) and identity management tool used by large organizations to
simplify access to their internal Web applications and services.
http://cwonline.computerworld.com/t/8638675/823929835/618186/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: VMware, Cisco and NetApp~~~~~~~~~~~~~~~~~~~~~
Meritrust Sees Results with FlexPod and VMware
Faced with an aging physical IT infrastructure, Meritrust Credit Union sought a
more stable foundation for its business critical applications and for its Oracle
database, which is central to its operations.
http://cwonline.computerworld.com/t/8638675/823929835/618191/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3ff4093b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Modified online children's privacy rules take effect in US
Some websites and mobile app developers are confused about how to comply with
revised rules governing the online collection of personal information from
children that took effect in the U.S. Monday, critics said.
http://cwonline.computerworld.com/t/8638675/823929835/618187/0/
All about Prism, Internet privacy and -- wait! -- squirrel!
Some people are deeply upset about the latest incursions into our privacy. But
as a society, we don't seem to care all that much.
http://cwonline.computerworld.com/t/8638675/823929835/618188/0/
Vulnerabilities found in code library used by encrypted phone call apps
ZRTPCPP, an open-source library that's used by several applications offering
end-to-end encrypted phone calls, contained three vulnerabilities that could
have enabled arbitrary code execution and denial-of-service attacks, according
to researchers from security firm Azimuth Security.
http://cwonline.computerworld.com/t/8638675/823929835/618189/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8638675/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0b96603b
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8638675/823929835/616819/0/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8638675/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8638675/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?
http://cwonline.computerworld.com/t/8638675/823929835/617776/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8638675/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8638675/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8638675/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8638675/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8638675/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjM4Njc1&x=b9bb7514
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8638675/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8638675/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8638675/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, July 2, 2013
With BlackBerry reportedly hacked, is anything secure?
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:58 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment