Computerworld Security: October 02, 2013
===============================================================
Public release of IE exploit could spark widespread attacks
An exploit for a vulnerability that affects all versions of Internet Explorer
and has yet to be patched by Microsoft has been integrated into the open-source
Metasploit penetration testing tool, a move that might spur an increasing number
of attacks targeting the flaw.
http://cwonline.computerworld.com/t/8748244/823929835/634351/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Neustar~~~~~~~~~~~~~~~~~~~~~
Hoping DDoS will go away? Wish you had a strategy?
Knowing is half the battle. Learn from experts in:
• Government
• Industry
• Research & analysis
Join us for DDoS Awareness Day
From Hope to Strategy
A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013
http://cwonline.computerworld.com/t/8748244/823929835/634352/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Jonny Evans: Anonymous claim Apple's Touch ID is linked to US surveillance
http://cwonline.computerworld.com/t/8748244/823929835/634353/19/
2. More NSA leaks to come, Guardian says
http://cwonline.computerworld.com/t/8748244/823929835/634354/20/
3. SAP seeks an edge from NSA surveillance worries
http://cwonline.computerworld.com/t/8748244/823929835/634355/21/
4. Darlene Storm: Hacking the Internet of Things at DerbyCon: Weaponizing your coffee pot
http://cwonline.computerworld.com/t/8748244/823929835/634356/28/
5. NSA encryption-defeating efforts will backfire, privacy advocates say
http://cwonline.computerworld.com/t/8748244/823929835/634357/29/
6. Antone Gonsalves: Why we fear the mobile wallet
http://cwonline.computerworld.com/t/8748244/823929835/634358/30/
~~~~~~~~~~~~~~~~~~~WEBCAST: Dell VMware~~~~~~~~~~~~~~~~~~~~~
An End-to-End Approach to Data Protection
Traditional approaches to data protection are no longer enough. Why not? Because
data volumes are exploding. Because there's little or no tolerance for data loss
and downtime.
http://cwonline.computerworld.com/t/8748244/823929835/634359/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=dcdbf454
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jonny Evans: Anonymous claim Apple's Touch ID is linked to US surveillance
Anonymous have some big claims concerning Apple Touch ID system, claiming
a connection between the technology and the US defense industry to claim it's
just another step forward for state surveillance.
http://cwonline.computerworld.com/t/8748244/823929835/634353/32/
More NSA leaks to come, Guardian says
The flood of stories on government spying will not be slowing soon -- in fact
the majority of the most important documents detailing how the U.S. National
Security Agency collects personal data have not been published yet, journalists
from U.K. newspaper The Guardian said on Tuesday.
http://cwonline.computerworld.com/t/8748244/823929835/634354/33/
SAP seeks an edge from NSA surveillance worries
SAP may build a second data center in Australia in order to meet customer demand
for locally delivered cloud services in the wake of revelations over the U.S.
National Security Agency's Prism surveillance program.
http://cwonline.computerworld.com/t/8748244/823929835/634355/34/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: ServiceNow~~~~~~~~~~~~~~~~~~~~~
Making IT Support Social
When IT organizations utilize social media, it can efficiently help more people
inside and outside the data center quickly access more services and knowledge.
http://cwonline.computerworld.com/t/8748244/823929835/634360/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=69210bd0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Hacking the Internet of Things at DerbyCon: Weaponizing your coffee pot
If you are not a morning person, then you might be a bit brain-dead until you
have serious doses of caffeine. So if your high-tech coffee pot connected to the
Internet of Things had been hijacked by a bad guy, how would you even know if
it, or another of your connected appliances, were being used against
you? At the security conference DerbyCon 3.0, Daniel Buentello gave a
very interesting presentation titled "Weaponizing your coffee pot."
http://cwonline.computerworld.com/t/8748244/823929835/634356/36/
NSA encryption-defeating efforts will backfire, privacy advocates say
The U.S. National Security Agency's efforts to defeat encryption will backfire
by eroding trust in U.S.-based Internet services and in the agency's own efforts
to aid U.S. companies with cybersecurity, a group of privacy advocates said
Tuesday.
http://cwonline.computerworld.com/t/8748244/823929835/634357/37/
Antone Gonsalves: Why we fear the mobile wallet
Despite advances in technology, people still trust their back pockets to keep
their credit cards safe more than their smartphones.
http://cwonline.computerworld.com/t/8748244/823929835/634358/38/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8748244/823929835/631622/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fcbe39a6
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8748244/823929835/604375/40/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8748244/823929835/598565/41/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?
http://cwonline.computerworld.com/t/8748244/823929835/630384/42/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8748244/823929835/156832/43/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8748244/823929835/311619/44/
Facebook: http://cwonline.computerworld.com/t/8748244/823929835/311620/45/
Twitter: http://cwonline.computerworld.com/t/8748244/823929835/311621/46/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8748244/823929835/131135/47/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzQ4MjQ0&x=8b955892
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8748244/823929835/72510/48/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8748244/823929835/231613/49/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8748244/823929835/72509/50/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, October 2, 2013
Public release of IE exploit could spark widespread attacks
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:34 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment