Computerworld Security: August 29, 2013
===============================================================
Developers hack Dropbox, show how to access user data
Developers who were able to bypass Dropbox's security by reverse-engineering
Python applications -- the language used by the cloud storage provider --
described their technique in a published paper.
http://cwonline.computerworld.com/t/8711948/823929835/628120/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Argent~~~~~~~~~~~~~~~~~~~~~
What's the biggest bottleneck in VMware?
Do more CPUs improve VMware?
Using VMware NIC Teaming?
Does TCP/IP affect VMware? (You'll be surprised)
Get this essential FREE white paper now
11 pages of technical details, not sales fluff
http://cwonline.computerworld.com/t/8711948/823929835/628121/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. New York Times site hack shifts attention to registry locks
http://cwonline.computerworld.com/t/8711948/823929835/628122/19/
2. Hacker points Syrian telecom website to AT&T, T-Mobile
http://cwonline.computerworld.com/t/8711948/823929835/628123/20/
3. Pirate Bay co-founder appeals fraud conviction, says others controlled his computer
http://cwonline.computerworld.com/t/8711948/823929835/628124/21/
4. Spear phishing led to DNS attack against the New York Times, others
http://cwonline.computerworld.com/t/8711948/823929835/628125/28/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: McAfee~~~~~~~~~~~~~~~~~~~~~
The New Reality of Stealth Crimeware
It takes more than signatures and operating system-level protections to protect
intellectual property and other assets against stealthy malware.
http://cwonline.computerworld.com/t/8711948/823929835/628126/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1fe53e18
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New York Times site hack shifts attention to registry locks
One way that owners of major websites can mitigate the risk of their domains
being hijacked like The New York Times' site was on Tuesday is to apply what is
known as a registry lock on the domain, security researchers say.
http://cwonline.computerworld.com/t/8711948/823929835/628122/30/
Hacker points Syrian telecom website to AT&T, T-Mobile
The website of a Syrian telecommunications provider redirected to AT&T's
website and then T-Mobile's on Wednesday, an apparent prank by a hacker who has
been probing the country's Internet infrastructure for several days.
http://cwonline.computerworld.com/t/8711948/823929835/628123/31/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Moovweb~~~~~~~~~~~~~~~~~~~~~
Responsive Delivery: The Next Generation of Mobile
In this tech dossier from Moovweb, learn about responsive web delivery, an
approach to mobile development that can reduce costs and increase agility so
companies can build great mobile solutions without the big rewrite of their
existing sites.
http://cwonline.computerworld.com/t/8711948/823929835/628127/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=986b5280
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Pirate Bay co-founder appeals fraud conviction, says others controlled his computer
Pirate Bay co-founder Gottfrid Svartholm Warg's appeal of his conviction on
charges of data intrusion, attempted aggravated fraud and aggravated fraud
started on Wednesday, with arguments centering on the contention that other
parties used the defendant's computer by remote control.
http://cwonline.computerworld.com/t/8711948/823929835/628124/33/
Spear phishing led to DNS attack against the New York Times, others
The cyberattack that resulted in nytimes.com and some other high-profile
websites being inaccessible to a large number of users Tuesday started with a
targeted phishing attack against a reseller for Melbourne IT, an Australian
domain registrar and IT services company.
http://cwonline.computerworld.com/t/8711948/823929835/628125/34/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8711948/823929835/615407/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=144ec073
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8711948/823929835/616819/36/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8711948/823929835/604375/37/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8711948/823929835/598565/38/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?
http://cwonline.computerworld.com/t/8711948/823929835/621572/39/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8711948/823929835/156832/40/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8711948/823929835/311619/41/
Facebook: http://cwonline.computerworld.com/t/8711948/823929835/311620/42/
Twitter: http://cwonline.computerworld.com/t/8711948/823929835/311621/43/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8711948/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzExOTQ4&x=88ba7034
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8711948/823929835/72510/45/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8711948/823929835/231613/46/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8711948/823929835/72509/47/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Thursday, August 29, 2013
Developers hack Dropbox, show how to access user data
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:52 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment