Computerworld Security: September 26, 2013
===============================================================
'Viceroi' algorithm eases detection of click fraud
A group of researchers have devised an algorithm they say could help advertising
networks better detect fraudulent clicks.
http://cwonline.computerworld.com/t/8742709/823929835/633316/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Quantum Corporation~~~~~~~~~~~~~~~~~~~~~
Make Backups Reliable, Available, and Secure
Recent surveys have shown that almost half of today's data centers are using the
same backup system architecture that was all the rage 20 years ago. The other
half are using disk in some fashion. This Deep Dive will explain the evolving
role of disk and tape, as well as how they can work together to bring you the
best of both worlds.
http://cwonline.computerworld.com/t/8742709/823929835/633317/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d5cd168f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. 'Icefog' spying operation targeted Japan, South Korea
http://cwonline.computerworld.com/t/8742709/823929835/633318/19/
2. NSA chief seeks more data from private sector in sharing offer
http://cwonline.computerworld.com/t/8742709/823929835/633319/20/
3. U.S. lawmakers move to curb NSA collection of phone and other records
http://cwonline.computerworld.com/t/8742709/823929835/633320/21/
4. Darlene Storm: FDA will regulate mobile apps that turn smartphones into medical devices
http://cwonline.computerworld.com/t/8742709/823929835/633321/28/
5. Sudan drops off Internet amid internal strife
http://cwonline.computerworld.com/t/8742709/823929835/633322/29/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~
HP 2012 Cyber Risk Report
Gain insight into the top vulnerability trends, web application vulnerabilities,
mobile application security, as well as what to look for in the year ahead to
keep your enterprise secure.
http://cwonline.computerworld.com/t/8742709/823929835/633323/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e36cb665
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'Icefog' spying operation targeted Japan, South Korea
A hacking group that targeted Japan's parliament in 2011 is believed to have
conducted nimble data thefts against organizations mainly in South Korea and
Japan, including defense contractors, over the past two years.
http://cwonline.computerworld.com/t/8742709/823929835/633318/31/
NSA chief seeks more data from private sector in sharing offer
Gen. Keith Alexander, head of the embattled National Security Agency, says he is
willing to share cyberattack information with the private sector -- an offer
seen as a Trojan horse by at least one expert.
http://cwonline.computerworld.com/t/8742709/823929835/633319/32/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~
Comparison of Unified vs. Two Products
Because of the outstanding economy, flexibility, and service levels it offers,
virtualization is transforming data centers at breakneck speed: by 2016, an
estimated 80% of the world's x86 servers will be virtual machines (VMs). But the
speed of this transformation raise challenges for "traditional" IT services and
the teams that deliver them.
http://cwonline.computerworld.com/t/8742709/823929835/633324/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=59d4675c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
U.S. lawmakers move to curb NSA collection of phone and other records
A bipartisan group of four U.S. lawmakers has introduced legislation that will
prohibit bulk collection of phone records of Americans.
http://cwonline.computerworld.com/t/8742709/823929835/633320/34/
Darlene Storm: FDA will regulate mobile apps that turn smartphones into medical devices
The FDA will regulate mobile medical apps that can turn smartphones into a
medical device. Although it hasn't yet received FDA approval, researchers have
come up with implantable medical device security that
combines touch-to-access with a heartbeat password.
http://cwonline.computerworld.com/t/8742709/823929835/633321/35/
Sudan drops off Internet amid internal strife
In what has become a familiar pattern in countries in crisis, the government in
Sudan appears to have pulled the plug on Internet services there.
http://cwonline.computerworld.com/t/8742709/823929835/633322/36/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8742709/823929835/631622/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c81fc031
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8742709/823929835/604375/38/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8742709/823929835/598565/39/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?
http://cwonline.computerworld.com/t/8742709/823929835/630384/40/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8742709/823929835/156832/41/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8742709/823929835/311619/42/
Facebook: http://cwonline.computerworld.com/t/8742709/823929835/311620/43/
Twitter: http://cwonline.computerworld.com/t/8742709/823929835/311621/44/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8742709/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzQyNzA5&x=25d438fc
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8742709/823929835/72510/46/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8742709/823929835/231613/47/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8742709/823929835/72509/48/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Thursday, September 26, 2013
'Viceroi' algorithm eases detection of click fraud
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:19 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment