Wednesday, November 20, 2013

Hackers exploit JBoss vulnerability to compromise servers

Computerworld Security: November 20, 2013
===============================================================

Hackers exploit JBoss vulnerability to compromise servers

Attackers are actively exploiting a known vulnerability to compromise JBoss Java
EE application servers that expose the HTTP Invoker service to the Internet in
an insecure manner.
http://cwonline.computerworld.com/t/8795219/823929835/643248/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CDW~~~~~~~~~~~~~~~~~~~~~

Defense in Depth Matures

Over the last few years, security risks have grown exponentially. Hackers,
attackers and a motley crew of cyber thieves have enlisted far more
sophisticated attack methods to put computers and entire networks at risk.
Security threats are growing and evolving.

http://cwonline.computerworld.com/t/8795219/823929835/643249/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=36e97981

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Supreme Court declines to review NSA phone spying case
http://cwonline.computerworld.com/t/8795219/823929835/643250/19/

2. Supreme Court refusal to block NSA data collection not surprising
http://cwonline.computerworld.com/t/8795219/823929835/643251/20/

3. Why network security is the foundation for cyber strategy
http://cwonline.computerworld.com/t/8795219/823929835/643252/21/

4. Warning! Targeted Internet misdirection on the rise
http://cwonline.computerworld.com/t/8795219/823929835/643253/28/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Google Enterprise~~~~~~~~~~~~~~~~~~~~~

Say Good-bye to the Constant Cycle of Microsoft Upgrades

If your organization has yet to complete its Windows XP migration, read Google's
guide for pointers on improving security during the migration process and
advantages of cloud-based solutions. Learn about Chrome browser's extended
support for XP and why businesses are switching to Google Apps for Business and
Chromebooks.

http://cwonline.computerworld.com/t/8795219/823929835/643254/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=607d61ac

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Supreme Court declines to review NSA phone spying case

The U.S. Supreme CourtA has denied the Electronic Privacy Information Center's
petition for it to review a National Security Agency (NSA) phone record data
collection program.
http://cwonline.computerworld.com/t/8795219/823929835/643250/30/

Supreme Court refusal to block NSA data collection not surprising

Privacy rights advocates and legal experts this week said they were disappointed
but not surprised with the U.S. Supreme Court's denial of a petition
challenging the legality of the National Security Agency's phone metadata
collection program.
http://cwonline.computerworld.com/t/8795219/823929835/643251/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

The 10 "Must-Haves" for Secure Enterprise Mobility.

While enterprise mobility brings opportunity for your users and organization, it
also invites risk. Users should view this whitepaper as a mobile security
framework for their enterprises and a checklist for evaluating enterprise
mobility vendors. Download the whitepaper.

http://cwonline.computerworld.com/t/8795219/823929835/643255/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=31a6edae

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Why network security is the foundation for cyber strategy

As government organizations continue to deal with an increasing number of cyber
threats, one thing has become clear to those who protect our digital assets:
there is no silver bullet.
http://cwonline.computerworld.com/t/8795219/823929835/643252/33/

Warning! Targeted Internet misdirection on the rise

Unknown attackers have successfully hijacked and redirected Internet traffic
belonging to financial services companies, VoIP providers and governments many
times over the past year.
http://cwonline.computerworld.com/t/8795219/823929835/643253/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8795219/823929835/641183/35/


COMPUTERWORLD'S 2014 SALARY SURVEY

How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.

Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8795219/823929835/637847/36/


DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8795219/823929835/631622/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3a86cf03

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8795219/823929835/604375/38/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8795219/823929835/598565/39/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey shows that 90% of drivers would consider using an autonomous car
if it would cut their insurance rates. Are you one of them?

http://cwonline.computerworld.com/t/8795219/823929835/640997/40/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8795219/823929835/156832/41/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8795219/823929835/311619/42/

Facebook: http://cwonline.computerworld.com/t/8795219/823929835/311620/43/

Twitter: http://cwonline.computerworld.com/t/8795219/823929835/311621/44/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8795219/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04Nzk1MjE5&x=cb2cf0a3

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8795219/823929835/72510/46/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8795219/823929835/231613/47/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8795219/823929835/72509/48/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive