Wednesday, December 4, 2013

D-Link issues fixes for firmware backdoor in routers

Computerworld Security: December 04, 2013
===============================================================

D-Link issues fixes for firmware backdoor in routers

D-Link published patches on Monday for a firmware coding goof that could allow
attackers to remotely change the settings of several of its router models.
http://cwonline.computerworld.com/t/8807566/823929835/645511/17/

~~~~~~~~~~~~~~~~~~~WEBCAST: HP Vertica~~~~~~~~~~~~~~~~~~~~~

Shine a Light on your Dark Data with HP Vertica 7

With the HP Vertica Analytics Platform 7 "Crane," you can finally derive value
from all your "Dark Data" with simplified exploration and analysis based on
disruptive, patent-pending technology and core platform enhancements. Only HP
Vertica 7 has the richest open SQL on Hadoop, Java for big data, bullet-proof
security and more.

http://cwonline.computerworld.com/t/8807566/823929835/645512/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ffd48fcd

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Kenneth van Wyk: Enjoy your trip, but protect the data you take with you
http://cwonline.computerworld.com/t/8807566/823929835/645513/19/

2. Salesforce.com completes hackathon review, awards second $1M prize
http://cwonline.computerworld.com/t/8807566/823929835/645514/20/

3. Experimental malware uses inaudible sound to defeat network air gaps
http://cwonline.computerworld.com/t/8807566/823929835/645515/21/

4. Tips to avoid being bit by CryptoLocker (and what to do if you are)
http://cwonline.computerworld.com/t/8807566/823929835/645516/28/

5. Darlene Storm: Healthcare.gov more vulnerable to hacking & privacy breaches after 'fix'
http://cwonline.computerworld.com/t/8807566/823929835/645517/29/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5 Networks~~~~~~~~~~~~~~~~~~~~~

Strategic Solutions for Government IT

The U.S. government wants to transform its IT organization to streamline
operations and smooth the transition to the data center of the future. To this
end, it is moving an increasing number of applications to the cloud; minimizing
duplicated IT efforts; and improving the dialogue between federal providers and
contracting personnel.

http://cwonline.computerworld.com/t/8807566/823929835/645518/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2c47ed9f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Kenneth van Wyk: Enjoy your trip, but protect the data you take with you

International travel can require some pretty strong security measures if your
devices contain sensitive information.
http://cwonline.computerworld.com/t/8807566/823929835/645513/31/

Salesforce.com completes hackathon review, awards second $1M prize

Salesforce.com has completed a review of the judging process for the hackathon
it held at last month's Dreamforce conference, and as a result it will award a
second $1 million prize to the initial runner-up.
http://cwonline.computerworld.com/t/8807566/823929835/645514/32/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Exablox~~~~~~~~~~~~~~~~~~~~~

ESG Report: Exablox Re-Imagines File Storage

Exablox emerged from stealth mode with a new platform (OneBlox) designed for
midsized enterprises with content-intensive applications. Its scale-out system
leverages commodity hardware, and has some interesting data protection features.

http://cwonline.computerworld.com/t/8807566/823929835/645519/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1f705c7d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Experimental malware uses inaudible sound to defeat network air gaps

In a development likely to concern those who believe that a system that's not
connected to a network is safe from surveillance, researchers have demonstrated
that microphones and speakers built into laptops can be used to covertly
transmit and receive data through inaudible audio signals
http://cwonline.computerworld.com/t/8807566/823929835/645515/34/

Tips to avoid being bit by CryptoLocker (and what to do if you are)

As early as 2007, if not earlier, Windows users encountered the very first rogue
antivirus programs. Even today, end users are easily fooled by this vicious type
of malware.
http://cwonline.computerworld.com/t/8807566/823929835/645516/35/

Darlene Storm: Healthcare.gov more vulnerable to hacking & privacy breaches after 'fix'


For the love of Jiminy Cricket, how much cybersecurity incompetence are
American citizens expected to accept and excuse while also footing the $660
million bill? Online security experts say the "new and improved"
Healthcare.gov site may actually be more insecure now than before it
was fixed!
http://cwonline.computerworld.com/t/8807566/823929835/645517/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8807566/823929835/641183/37/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8807566/823929835/643300/38/

2014 BEST PLACES TO WORK IN IT: CALL FOR NOMINATIONS

Is your IT department a great place to work? Our 21st annual Best Places to Work
in IT list and special report will honor 100 organizations that offer great
benefits, salaries and opportunities for training and advancement, as well as
interesting projects and a flexible and diverse work environment.

Nominate a company now through Dec. 13:
http://cwonline.computerworld.com/t/8807566/823929835/640766/39/

CALLING ALL SECURITY PROS

For an upcoming article on the "blurred lines" created by BYOD, please tell us:
Has malware ever been introduced into your organization by users viewing or
downloading pornography or other NSFW material?

Features Editor Tracy Mayor is interested in your experiences/solutions. All
replies held in strict confidence.
mailto:tmayor@computerworld.com


COMPUTERWORLD'S 2014 SALARY SURVEY

How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.

Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8807566/823929835/637847/40/


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8807566/823929835/604375/41/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8807566/823929835/598565/42/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Three and a half years after the launch of the original Apple iPad, consumers
have many choices for great tablet computers. What tablet is at the top of your
holiday wish list this year?

http://cwonline.computerworld.com/t/8807566/823929835/645268/43/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8807566/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8807566/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/8807566/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/8807566/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8807566/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODA3NTY2&x=1210a038

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8807566/823929835/72510/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8807566/823929835/231613/50/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8807566/823929835/72509/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:31 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive