Monday, September 23, 2013

NSA spying fiasco sending customers overseas

Computerworld Security: September 23, 2013
===============================================================

NSA spying fiasco sending customers overseas

The spectacle of National Security Agency contractor Edward Snowden exposing the
covert spying nature of US federal officials has sent ripple waves through the
technology industry -- especially in the outsourcing arena.
http://cwonline.computerworld.com/t/8738125/823929835/632285/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Quantum Corporation~~~~~~~~~~~~~~~~~~~~~

Make Backups Reliable, Available, and Secure

Recent surveys have shown that almost half of today's data centers are using the
same backup system architecture that was all the rage 20 years ago. The other
half are using disk in some fashion. This Deep Dive will explain the evolving
role of disk and tape, as well as how they can work together to bring you the
best of both worlds.

http://cwonline.computerworld.com/t/8738125/823929835/632286/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8f4a2ba9

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security org raises Internet threat level after seeing expanded IE attacks
http://cwonline.computerworld.com/t/8738125/823929835/632287/19/

2. German hackers say old technique can beat Apple's Touch ID
http://cwonline.computerworld.com/t/8738125/823929835/632288/20/

3. Encryption is still the best defense, despite NSA code-cracking
http://cwonline.computerworld.com/t/8738125/823929835/632289/21/

4. LinkedIn denies harvesting user email accounts without permission
http://cwonline.computerworld.com/t/8738125/823929835/632290/28/

5. Sen. Franken seeks data on privacy controls in iPhone 5S fingerprint tech
http://cwonline.computerworld.com/t/8738125/823929835/632291/29/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~

Evolution and Value of Purpose Build

This IDC White Paper explores the increased use and adoption patterns of PBBAs
and the utility these appliances provide to customers in their data protection
processes. In addition, this White Paper illuminates the customer value that
Symantec's Backup Exec and NetBackup appliances bring to the data protection and
recovery process.

http://cwonline.computerworld.com/t/8738125/823929835/632292/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=85db53c3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security org raises Internet threat level after seeing expanded IE attacks

The Internet Storm Center on Saturday boosted its threat level to 'Yellow,'
indicating a 'significant new threat' to Internet users from attacks exploiting
an unpatched vulnerability in all versions of Microsoft's Internet Explorer (IE)
browser.
http://cwonline.computerworld.com/t/8738125/823929835/632287/31/

German hackers say old technique can beat Apple's Touch ID

Apple's Touch ID authentication system can be defeated using a well-honed
technique for creating a latex copy of someone's fingerprint, according to a
German hacking group.
http://cwonline.computerworld.com/t/8738125/823929835/632288/32/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel® Xeon® processors~~~~~~~~~~~~~~~~~~~~~

Evolving Datacenter Architectures

In this paper, Evaluator Group highlights the critical features necessary to
move beyond server virtualization by leveraging key integration capabilities
between IT components with a particular focus on the important role that storage
plays in the evolution of data center architecture.

http://cwonline.computerworld.com/t/8738125/823929835/632293/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4d837932

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Encryption is still the best defense, despite NSA code-cracking

Though the NSA has apparently cracked widely used encryption algorithms,
security experts maintain that, properly implemented, encryption is still the
best way to secure data.
http://cwonline.computerworld.com/t/8738125/823929835/632289/34/

LinkedIn denies harvesting user email accounts without permission

LinkedIn denied over the weekend charges that the company breaks into the email
accounts of its members without permission to harvest contacts' addresses.
http://cwonline.computerworld.com/t/8738125/823929835/632290/35/

Sen. Franken seeks data on privacy controls in iPhone 5S fingerprint tech

A U.S. lawmaker wants to know whether the Touch ID fingerprint reader in Apple's
iPhone 5S has adequate controls to protect the personal data of users.
http://cwonline.computerworld.com/t/8738125/823929835/632291/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8738125/823929835/631622/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c220e7f7

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8738125/823929835/604375/38/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8738125/823929835/598565/39/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?

http://cwonline.computerworld.com/t/8738125/823929835/630384/40/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8738125/823929835/156832/41/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8738125/823929835/311619/42/

Facebook: http://cwonline.computerworld.com/t/8738125/823929835/311620/43/

Twitter: http://cwonline.computerworld.com/t/8738125/823929835/311621/44/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8738125/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzM4MTI1&x=fe89f700

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8738125/823929835/72510/46/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8738125/823929835/231613/47/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8738125/823929835/72509/48/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:43 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive