Wednesday, August 28, 2013

New York Times website hacked

Computerworld Security: August 28, 2013
===============================================================

New York Times website hacked

Less than two weeks after suffering a prolonged website outage, the New York
Times was knocked offline again on Tuesday -- apparently as the result of a
malicious hacking attack.
http://cwonline.computerworld.com/t/8710317/823929835/627761/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CDW~~~~~~~~~~~~~~~~~~~~~

Requirements for compliance

As organizational needs change, often your IT infrastructure does as well. But
if you're accepting credit cards as payment -- as most organizations do -- these
changes to your infrastructure can rattle your compliance with the Payment Card
Industry Data Security Standards (PCI DSS).

http://cwonline.computerworld.com/t/8710317/823929835/627762/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=18442d3d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. U.S. man pleads guilty to hacking Department of Energy, other sites
http://cwonline.computerworld.com/t/8710317/823929835/627763/19/

2. Bitcoin offers privacy -- as long as you don't cash out or spend it
http://cwonline.computerworld.com/t/8710317/823929835/627764/20/

3. Tesla's Model S vulnerable to hackers, kind of
http://cwonline.computerworld.com/t/8710317/823929835/627765/21/

4. Cybercrime service automates creation of fake scanned IDs
http://cwonline.computerworld.com/t/8710317/823929835/627766/28/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

Backup Game Plan

Learn the 3 steps you can take now to implement the right disk platform, ensure
quick recoveries, identify the biggest backup pain points, and add a range of
value-added services across the organization.

http://cwonline.computerworld.com/t/8710317/823929835/627767/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d859da89

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

U.S. man pleads guilty to hacking Department of Energy, other sites

A Pennsylvania man who was allegedly a member of the computer hacking group the
Underground Intelligence Agency has pleaded guilty to one count of conspiracy
and two counts of computer intrusion, the U.S. Department of Justice announced.
http://cwonline.computerworld.com/t/8710317/823929835/627763/30/

Bitcoin offers privacy -- as long as you don't cash out or spend it

On the surface, Bitcoin seems to be a great way to hide cash. Actually, it's a
terrible way to launder money.
http://cwonline.computerworld.com/t/8710317/823929835/627764/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: ServiceNow~~~~~~~~~~~~~~~~~~~~~

Making IT Support Social

When IT organizations utilize social media, it can efficiently help more people
inside and outside the data center quickly access more services and knowledge.

http://cwonline.computerworld.com/t/8710317/823929835/627768/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=9968a797

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tesla's Model S vulnerable to hackers, kind of

It's the curse of the connected car a once it's linked to the Internet, it's,
well, on the Internet. In the case of the Tesla Model S, this means that
malicious hackers could, in theory, control some functions of the vehicle and
even track it without the owner's knowledge.
http://cwonline.computerworld.com/t/8710317/823929835/627765/33/

Cybercrime service automates creation of fake scanned IDs

A new Web-based service for cybercriminals automates the creation of fake
scanned documents that can help fraudsters bypass the identity verification
processes used by some banks, e-commerce businesses and other online services
providers, according to researchers from Russian cybercrime investigations firm
Group-IB.
http://cwonline.computerworld.com/t/8710317/823929835/627766/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8710317/823929835/615407/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f011bff0

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8710317/823929835/616819/36/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8710317/823929835/604375/37/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8710317/823929835/598565/38/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?

http://cwonline.computerworld.com/t/8710317/823929835/621572/39/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8710317/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8710317/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/8710317/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/8710317/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8710317/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzEwMzE3&x=cae006c3

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8710317/823929835/72510/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8710317/823929835/231613/46/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8710317/823929835/72509/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive