Computerworld Security: Issues and Trends: September 25, 2013
===============================================================
7 characteristics of a secure mobile app
When it comes to building secure mobile applications, errors most often occur in
session management. By themselves, these mistakes do not present a significant
risk, but the more mistakes made, the more vulnerable the application. And
therein lies the problem: There are usually several of these errors in any given
app.
http://cwonline.computerworld.com/t/8741607/823929840/632953/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Webroot Software~~~~~~~~~~~~~~~~~~~~~
Managing Web Security in a Challenging Threat Landscape
This whitepaper deals with the rise of mobility, BYOD and social networking, and
how these trends have led cybercriminals to exploit vulnerabilities in browsers
and mobile apps. From drive-by downloads to spearfishing to XML injection,
web-borne threats represent a significant new risk for businesses.
http://cwonline.computerworld.com/t/8741607/823929840/632954/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5ed0c976
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Chrome will block NPAPI plug-ins over stability, security concerns
http://cwonline.computerworld.com/t/8741607/823929840/632955/19/
2. Java exploits seen as huge menace so far this year
http://cwonline.computerworld.com/t/8741607/823929840/632956/20/
3. Security researchers create undetectable hardware trojans
http://cwonline.computerworld.com/t/8741607/823929840/632957/21/
4. Hacking courses offer cybercrooks tips on how to hone skills
http://cwonline.computerworld.com/t/8741607/823929840/632958/28/
5. Kenneth van Wyk: High hopes for iPhone's Touch ID
http://cwonline.computerworld.com/t/8741607/823929840/632959/29/
6. German hackers say old technique can beat Apple's Touch ID
http://cwonline.computerworld.com/t/8741607/823929840/632960/30/
7. Experts praise Pentagon's march to security standards
http://cwonline.computerworld.com/t/8741607/823929840/632961/31/
8. Energy Department spends $30M to bolster utility cybersecurity tools
http://cwonline.computerworld.com/t/8741607/823929840/632962/32/
~~~~~~~~~~~~~~~~~~~WEBCAST: SAP~~~~~~~~~~~~~~~~~~~~~
Enterprise IT Innovation Forum: 2013 to 2020
Join us for a virtual event featuring noted author Geoffrey Moore and SAP CIO
Michael Golz to discuss the number one challenge facing senior business leaders
today – how to embrace the emerging "Systems of Engagement."
http://cwonline.computerworld.com/t/8741607/823929840/632963/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=67881e90
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Chrome will block NPAPI plug-ins over stability, security concerns
Plug-ins based on the NPAPI architecture will be blocked by default in Chrome
starting early next year as Google moves toward completely removing support for
them in the browser.
http://cwonline.computerworld.com/t/8741607/823929840/632955/34/
Java exploits seen as huge menace so far this year
Java was the most targeted development platform for exploit attacks during the
first half of the year, and attacks have increasingly shifted to zero-day
vulnerabilities, according to F-Secure's new threat report.
http://cwonline.computerworld.com/t/8741607/823929840/632956/35/
Security researchers create undetectable hardware trojans
Security researchers from the U.S. and Europe released a paper showing how
integrated circuits used in computers, military equipment and other critical
systems can be maliciously compromised during the manufacturing process through
virtually undetectable changes at the transistor level.
http://cwonline.computerworld.com/t/8741607/823929840/632957/36/
Hacking courses offer cybercrooks tips on how to hone skills
A growing number of experienced hackers have begun offering structured hacking
courses for crooks seeking to make a career in cybercrime.
http://cwonline.computerworld.com/t/8741607/823929840/632958/37/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Quantum Corporation~~~~~~~~~~~~~~~~~~~~~
Make Backups Reliable, Available, and Secure
Recent surveys have shown that almost half of today's data centers are using the
same backup system architecture that was all the rage 20 years ago. The other
half are using disk in some fashion. This Deep Dive will explain the evolving
role of disk and tape, as well as how they can work together to bring you the
best of both worlds.
http://cwonline.computerworld.com/t/8741607/823929840/632964/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=90d34442
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kenneth van Wyk: High hopes for iPhone's Touch ID
The iPhone 5S is the first smartphone with fingerprint authentication. It's not
perfect, but it could herald a new emphasis on security for mobile devices.
http://cwonline.computerworld.com/t/8741607/823929840/632959/39/
German hackers say old technique can beat Apple's Touch ID
Apple's Touch ID authentication system can be defeated using a well-honed
technique for creating a latex copy of someone's fingerprint, according to a
German hacking group.
http://cwonline.computerworld.com/t/8741607/823929840/632960/40/
Experts praise Pentagon's march to security standards
The Pentagon's decision to move its thousands of networks under a single
security architecture is the right strategy to bolster defenses against hackers
and malicious insiders, experts say.
http://cwonline.computerworld.com/t/8741607/823929840/632961/41/
Energy Department spends $30M to bolster utility cybersecurity tools
The Department of Energy today awarded $30 million to a 11 security vendors to
develop technology the agency says will better protect the nation's electric
grid, oil and gas infrastructure from cyber-attack.
http://cwonline.computerworld.com/t/8741607/823929840/632962/42/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8741607/823929840/631622/43/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=32c2f6f2
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8741607/823929840/604375/44/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8741607/823929840/598565/45/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?
http://cwonline.computerworld.com/t/8741607/823929840/630384/46/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8741607/823929840/156832/47/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8741607/823929840/311619/48/
Facebook: http://cwonline.computerworld.com/t/8741607/823929840/311620/49/
Twitter: http://cwonline.computerworld.com/t/8741607/823929840/311621/50/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8741607/823929840/131135/51/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODc0MTYwNw%3d%3d&x=f4bbe0f5
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8741607/823929840/72510/52/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8741607/823929840/231613/53/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8741607/823929840/72509/54/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, September 25, 2013
7 characteristics of a secure mobile app
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:46 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment