Wednesday, September 18, 2013

'HoneyDocs' lays irresistible bait for hackers

Computerworld Security: September 18, 2013
===============================================================

'HoneyDocs' lays irresistible bait for hackers

Police in Austin, Texas, set up sting operations with cars they have under
surveillance, watching for thieves to break into them. Marcus J. Carey's Web
service, HoneyDocs -- born in the same city -- uses the same concept, only with
computer files.
http://cwonline.computerworld.com/t/8732824/823929835/631485/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP Autonomy~~~~~~~~~~~~~~~~~~~~~

Guide to virtual server protection

This whitepaper discusses key challenges associated with backing up virtual
servers and how HP Data Protector's powerful and advanced capabilities provide
comprehensive protection for VMware and Hyper-V environments.

http://cwonline.computerworld.com/t/8732824/823929835/631486/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=916bc76e

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. HP rolls out next-gen firewall line, threat-detection service
http://cwonline.computerworld.com/t/8732824/823929835/631487/19/

2. Hackers exploit critical IE bug; Microsoft promises patch
http://cwonline.computerworld.com/t/8732824/823929835/631488/20/

3. Security researchers create undetectable hardware trojans
http://cwonline.computerworld.com/t/8732824/823929835/631489/21/

4. China-based hacking group behind hundreds of attacks on U.S. companies
http://cwonline.computerworld.com/t/8732824/823929835/631490/28/

5. Antone Gonsalves: iPhone in the enterprise? Forget about it.
http://cwonline.computerworld.com/t/8732824/823929835/631491/29/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~

Evolution and Value of Purpose Build

This IDC White Paper explores the increased use and adoption patterns of PBBAs
and the utility these appliances provide to customers in their data protection
processes. In addition, this White Paper illuminates the customer value that
Symantec's Backup Exec and NetBackup appliances bring to the data protection and
recovery process.

http://cwonline.computerworld.com/t/8732824/823929835/631492/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=81143984

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HP rolls out next-gen firewall line, threat-detection service

HP today took the wraps off its Next-Generation Firewall line designed to exert
application-level controls and visibility over all traffic related to the
enterprise, including mobile devices used in public WiFi settings and traffic
from cloud services.
http://cwonline.computerworld.com/t/8732824/823929835/631487/31/

Hackers exploit critical IE bug; Microsoft promises patch

Microsoft today said that hackers are exploiting a critical, but unpatched,
vulnerability in IE8 and IE9. Its engineers are working on an update to plug the
hole.
http://cwonline.computerworld.com/t/8732824/823929835/631488/32/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel® Xeon® processors~~~~~~~~~~~~~~~~~~~~~

Evolving Datacenter Architectures

In this paper, Evaluator Group highlights the critical features necessary to
move beyond server virtualization by leveraging key integration capabilities
between IT components with a particular focus on the important role that storage
plays in the evolution of data center architecture.

http://cwonline.computerworld.com/t/8732824/823929835/631493/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a9c3c4cf

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security researchers create undetectable hardware trojans

Security researchers from the U.S. and Europe released a paper showing how
integrated circuits used in computers, military equipment and other critical
systems can be maliciously compromised during the manufacturing process through
virtually undetectable changes at the transistor level.
http://cwonline.computerworld.com/t/8732824/823929835/631489/34/

China-based hacking group behind hundreds of attacks on U.S. companies

A group of between 50 and 100 professional hackers operating out of China has
been systematically targeting businesses, military and government agencies
around the world since at least 2009, security vendor Symantec said in a report
released on Tuesday.
http://cwonline.computerworld.com/t/8732824/823929835/631490/35/

Antone Gonsalves: iPhone in the enterprise? Forget about it.


The enterprise-class security in iOS 7 will keep Apple in companies for the
short term, but eventually Android smartphones and tablets will clobber the
iPhone and iPad.
http://cwonline.computerworld.com/t/8732824/823929835/631491/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8732824/823929835/615407/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b803c8aa

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8732824/823929835/604375/38/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8732824/823929835/598565/39/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?

http://cwonline.computerworld.com/t/8732824/823929835/630384/40/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8732824/823929835/156832/41/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8732824/823929835/311619/42/

Facebook: http://cwonline.computerworld.com/t/8732824/823929835/311620/43/

Twitter: http://cwonline.computerworld.com/t/8732824/823929835/311621/44/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8732824/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzMyODI0&x=c078b04b

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8732824/823929835/72510/46/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8732824/823929835/231613/47/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8732824/823929835/72509/48/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:06 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive