Tuesday, September 24, 2013

Java exploits seen as huge menace so far this year

Computerworld Security: September 24, 2013
===============================================================

Java exploits seen as huge menace so far this year

Java was the most targeted development platform for exploit attacks during the
first half of the year, and attacks have increasingly shifted to zero-day
vulnerabilities, according to F-Secure's new threat report.
http://cwonline.computerworld.com/t/8739764/823929835/632582/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

New DDOS Threat Advisory Issued – Drive Toolkit

There's a growing trend where DDoS attacks are used to camouflage fraud and
identity theft. The #1 perpetrator is the Drive toolkit, an attack tool commonly
used to sidetrack IT security personnel at financial services and e-Commerce
firms while criminals attempt to transfer funds, gather passwords for later use,
or place unauthorized orders.

http://cwonline.computerworld.com/t/8739764/823929835/632583/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Kenneth van Wyk: High hopes for iPhone's Touch ID
http://cwonline.computerworld.com/t/8739764/823929835/632584/19/

2. Jonny Evans: Security: With Touch ID Apple's iOS becomes target number one
http://cwonline.computerworld.com/t/8739764/823929835/632585/20/

3. Apple is a tempting phishing target for scammers
http://cwonline.computerworld.com/t/8739764/823929835/632586/21/

4. Darlene Storm: Strange but true: Companies say stop using our security products, cops say use iOS 7
http://cwonline.computerworld.com/t/8739764/823929835/632587/28/

5. Yorgen Edholm: Are your employees gambling on the public cloud?
http://cwonline.computerworld.com/t/8739764/823929835/632588/29/


~~~~~~~~~~~~~~~~~~~WEBCAST: Citrix Online~~~~~~~~~~~~~~~~~~~~~

Detecting and Dealing with Toxic Teams

Join Paul Glen, CEO and author of Leading Geeks, on Thursday September 26 at
10AM PDT/ 1 PM EDT. as he explains the 5 warning signs that indicate you have a
toxic team and how to restore your team to 100% health. Learn big solutions for
big problems!

http://cwonline.computerworld.com/t/8739764/823929835/632589/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1f1f09b2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Kenneth van Wyk: High hopes for iPhone's Touch ID

The iPhone 5S is the first smartphone with fingerprint authentication. It's not
perfect, but it could herald a new emphasis on security for mobile devices.
http://cwonline.computerworld.com/t/8739764/823929835/632584/31/

Jonny Evans: Security: With Touch ID Apple's iOS becomes target number one


This is the year Apple will see its mobile security tested as never before
as focus turns to undermining Touch ID. This will quickly extend to attacks at
other vectors within iOS security -- it stands to reason, because:
http://cwonline.computerworld.com/t/8739764/823929835/632585/32/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CA Technologies~~~~~~~~~~~~~~~~~~~~~

Applying Best Practice DevOps for Mission Success

Joe User has a great idea for a new application that could help him and other
agency users do their jobs better and faster. How can Joe's agency take this
vision and transform it into a real working app that will move the agency
mission forward?

http://cwonline.computerworld.com/t/8739764/823929835/632590/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3c276880

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Apple is a tempting phishing target for scammers

Spam volumes took a usual seasonal drop in August, but phishing spiked,
including a noticeable interest in hijacking Apple accounts.
http://cwonline.computerworld.com/t/8739764/823929835/632586/34/

Darlene Storm: Strange but true: Companies say stop using our security products, cops say use iOS 7


Today's strange but true security news includes security companies
warning customers to stop using their security products and cops handing out
flyers about upgrading to iOS 7 for better security.
http://cwonline.computerworld.com/t/8739764/823929835/632587/35/

Yorgen Edholm: Are your employees gambling on the public cloud?


How would you feel if a competitor picked up your product specs? An
investor got a copy of your quarterly financials before earnings? An
employee's personnel file ended up with the press? Not great? Yet
employees within your organization may be unknowingly gambling with the security
of corporate data every time they use unsanctioned public cloud file sharing and
storage services.
http://cwonline.computerworld.com/t/8739764/823929835/632588/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8739764/823929835/631622/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a536bf6c

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8739764/823929835/604375/38/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8739764/823929835/598565/39/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?

http://cwonline.computerworld.com/t/8739764/823929835/630384/40/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8739764/823929835/156832/41/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8739764/823929835/311619/42/

Facebook: http://cwonline.computerworld.com/t/8739764/823929835/311620/43/

Twitter: http://cwonline.computerworld.com/t/8739764/823929835/311621/44/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8739764/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzM5NzY0&x=374349c7

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8739764/823929835/72510/46/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8739764/823929835/231613/47/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8739764/823929835/72509/48/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:13 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive