Wednesday, November 20, 2013

Warning! Targeted Internet misdirection on the rise

Computerworld Security: Issues and Trends: November 20, 2013
===============================================================

Warning! Targeted Internet misdirection on the rise

Unknown attackers have successfully hijacked and redirected Internet traffic
belonging to financial services companies, VoIP providers and governments many
times over the past year.
http://cwonline.computerworld.com/t/8795325/823929840/643285/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Google Enterprise~~~~~~~~~~~~~~~~~~~~~

Facing your OS's end of life? Google can help.

If your organization has yet to complete its Windows XP migration, read Google's
guide for pointers on improving security during the migration process and
advantages of cloud-based solutions. Learn about Chrome browser's extended
support for XP and why businesses are switching to Google Apps for Business and
Chromebooks.

http://cwonline.computerworld.com/t/8795325/823929840/643286/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2160ccb6

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security Manager's Journal: Time to tweak the security policies
http://cwonline.computerworld.com/t/8795325/823929840/643287/19/

2. Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms
http://cwonline.computerworld.com/t/8795325/823929840/643288/20/

3. Thornton May: Caught between mobility's rock and hard place
http://cwonline.computerworld.com/t/8795325/823929840/643289/21/

4. INSIDER: The best data security offense is a good defense
http://cwonline.computerworld.com/t/8795325/823929840/643290/28/

5. Facebook forces some users to reset passwords because of Adobe data breach
http://cwonline.computerworld.com/t/8795325/823929840/643291/29/

6. NSA spying prompts open TrueCrypt encryption software audit to go viral
http://cwonline.computerworld.com/t/8795325/823929840/643292/30/

7. Google says users deserve to know more about surge in gov't data requests
http://cwonline.computerworld.com/t/8795325/823929840/643293/31/

8. Researchers reveal IE zero-days after hackers set 'watering hole' traps
http://cwonline.computerworld.com/t/8795325/823929840/643294/32/

9. Security researchers laud Microsoft, Facebook bug bounty programs
http://cwonline.computerworld.com/t/8795325/823929840/643295/33/

10. Let's put a brake on the real snoopers
http://cwonline.computerworld.com/t/8795325/823929840/643296/34/

11. Payment card industry gets updated security standard with new requirements
http://cwonline.computerworld.com/t/8795325/823929840/643297/35/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: SAS~~~~~~~~~~~~~~~~~~~~~

How Social Media Can Shape Perceptions of Product Quality

Descriptive statistics, text analytics and social network analysis provide a way
for to determine how customers purchasing decisions are affected by what they
see on the Internet. This paper describes how analytics can be applied to social
media for monitoring and addressing perceptual quality.

http://cwonline.computerworld.com/t/8795325/823929840/643298/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=92d4e01c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security Manager's Journal: Time to tweak the security policies

No policy, no matter how well crafted, is immune from periodic review. Fall is
when our manager tackles that.
http://cwonline.computerworld.com/t/8795325/823929840/643287/37/

Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms

Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer
and Office, but also urged customers to stop using the aging RC4 cipher and
SHA-1 hashing function in their systems and services.
http://cwonline.computerworld.com/t/8795325/823929840/643288/38/

Thornton May: Caught between mobility's rock and hard place

The rock: Users want to use their smartphones for work. The hard place: Security
is deficient. All CIOs are caught between the two.
http://cwonline.computerworld.com/t/8795325/823929840/643289/39/

INSIDER: The best data security offense is a good defense

After several missed security audits, the IT team at the Pennsylvania Department
of Public Welfare built an ambitious security risk framework so audit reports
could be prepared in a timely fashion. Insider; free registration
required.
http://cwonline.computerworld.com/t/8795325/823929840/643290/40/

Facebook forces some users to reset passwords because of Adobe data breach

Facebook locked some users out of their accounts after determining that their
log-in credentials were exposed as a result of a security breach at Adobe. The
company is asking users who used the same log-in credentials for Adobe's online
services and Facebook to verify their identity and change their password.
http://cwonline.computerworld.com/t/8795325/823929840/643291/41/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Exablox~~~~~~~~~~~~~~~~~~~~~

How to Leverage New Storage Strategies

This ebook covers some of the key challenges organizations are encountering with
storage management, data protection and cost containment. It also shows how IT
organizations can effectively address these difficulties while getting the most
out of their valuable information assets.

http://cwonline.computerworld.com/t/8795325/823929840/643299/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ac112218

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

NSA spying prompts open TrueCrypt encryption software audit to go viral

A unique effort to crowdsource a security audit of the popular TrueCrypt open
source encryption software appears to be going viral three weeks after it was
launched by two U.S. based researchers in response to concerns that the National
Security Agency may have tampered with it.
http://cwonline.computerworld.com/t/8795325/823929840/643292/43/

Google says users deserve to know more about surge in gov't data requests

The number of government requests for user information received by Google has
doubled since 2010, not including requests made under the U.S. Foreign
Intelligence Surveillance Act, which the company is not allowed to disclose.
http://cwonline.computerworld.com/t/8795325/823929840/643293/44/

Researchers reveal IE zero-days after hackers set 'watering hole' traps

Security researchers have uncovered two unpatched vulnerabilities in Internet
Explorer that have been exploited by attackers in an unusual "watering hole"
campaign launched from a U.S.-based website that specializes in domestic and
international security policy.
http://cwonline.computerworld.com/t/8795325/823929840/643294/45/

Security researchers laud Microsoft, Facebook bug bounty programs

Facebook and Microsoft are winning plaudits from security researchers for
launching an initiative to offer bounties to bug hunters who discover and report
vulnerabilities in widely used products.
http://cwonline.computerworld.com/t/8795325/823929840/643295/46/

Let's put a brake on the real snoopers

The outcry over the NSA/GCHQ Internet surveillance scandal can't hide the fact
that huge corporations won't say what they know.
http://cwonline.computerworld.com/t/8795325/823929840/643296/47/

Payment card industry gets updated security standard with new requirements

The PCI Security Standards Council updated its security standard, adding new
requirements and guidance for payment-card industry organizations, including
merchants, payment processors, financial institutions and service providers.
http://cwonline.computerworld.com/t/8795325/823929840/643297/48/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8795325/823929840/641183/49/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8795325/823929840/643300/50/

2014 BEST PLACES TO WORK IN IT: CALL FOR NOMINATIONS

Is your IT department a great place to work? Our 21st annual Best Places to Work
in IT list and special report will honor 100 organizations that offer great
benefits, salaries and opportunities for training and advancement, as well as
interesting projects and a flexible and diverse work environment.

Nominate a company now through Dec. 13:
http://cwonline.computerworld.com/t/8795325/823929840/640766/51/

COMPUTERWORLD'S 2014 SALARY SURVEY

How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.

Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8795325/823929840/637847/52/


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8795325/823929840/604375/53/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8795325/823929840/598565/54/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey shows that 90% of drivers would consider using an autonomous car
if it would cut their insurance rates. Are you one of them?

http://cwonline.computerworld.com/t/8795325/823929840/640997/55/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8795325/823929840/156832/56/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8795325/823929840/311619/57/

Facebook: http://cwonline.computerworld.com/t/8795325/823929840/311620/58/

Twitter: http://cwonline.computerworld.com/t/8795325/823929840/311621/59/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8795325/823929840/131135/60/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODc5NTMyNQ%3d%3d&x=dfc6af1c

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8795325/823929840/72510/61/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8795325/823929840/231613/62/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8795325/823929840/72509/63/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:05 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive