Monday, January 6, 2014

Facebook made of Teflon when it comes to privacy

Computerworld Security: January 06, 2014
===============================================================

Facebook made of Teflon when it comes to privacy

Facebook is being sued for allegedly intercepting users' private messages,
following links and sharing the information with advertisers and marketers, but
analysts doubt the accusations will be enough to make users abandon the social
networking site.
http://cwonline.computerworld.com/t/8829548/823929835/650101/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5 Networks~~~~~~~~~~~~~~~~~~~~~

The DDoS Threat Spectrum

Bolstered by favorable economics, today's global botnets are using distributed
denial-of-service (DDoS) attacks to target firewalls, web services, and
applications, often simultaneously. This DDoS threat spectrum includes
conventional network attacks, HTTP and SSL floods, and an emerging wave of
low-bandwidth threats.

http://cwonline.computerworld.com/t/8829548/823929835/650102/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0b747951

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 4 key elements for proactive application security
http://cwonline.computerworld.com/t/8829548/823929835/650103/19/

2. Darlene Storm: 17 exploits the NSA uses to hack PCs, routers and servers for surveillance
http://cwonline.computerworld.com/t/8829548/823929835/650104/20/

3. DOJ will appeal judge's ruling against NSA phone program
http://cwonline.computerworld.com/t/8829548/823929835/650105/21/

4. Costs of NSA phone records collection program outweigh the benefits
http://cwonline.computerworld.com/t/8829548/823929835/650106/28/

5. Malware delivered to thousands via Yahoo.com ads
http://cwonline.computerworld.com/t/8829548/823929835/650107/29/

6. Malware from Yahoo ads did not affect US and Mac and mobile users
http://cwonline.computerworld.com/t/8829548/823929835/650108/30/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP ArcSight~~~~~~~~~~~~~~~~~~~~~

Big Security for Big Data

In order to meet current security problems, a new paradigm shift needs to occur.
Businesses need the ability to secure data, collect it, and aggregate into an
intelligent format, so that real-time alerting and reporting can take place.
This white paper will give you the information you need to get started.

http://cwonline.computerworld.com/t/8829548/823929835/650109/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=45afc2a3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

4 key elements for proactive application security

We most often hear of the security breaches due to cross site scripting and SQL
injection attacks, after the related vulnerabilities have been successfully
exploited. But what could we do to prevent such attacks occurring in the first
place?
http://cwonline.computerworld.com/t/8829548/823929835/650103/32/

Darlene Storm: 17 exploits the NSA uses to hack PCs, routers and servers for surveillance


Here are 17 NSA ANT exploits targeting PCs, routers and servers listed among 50
in the catalog that target almost every major software, hardware and firmware
product.
http://cwonline.computerworld.com/t/8829548/823929835/650104/33/

DOJ will appeal judge's ruling against NSA phone program

The U.S. Department of Justice will appeal a district judge's opinion saying a
phone records collection program at the National Security Agency likely violates
the U.S. Constitution.
http://cwonline.computerworld.com/t/8829548/823929835/650105/34/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon Wireless~~~~~~~~~~~~~~~~~~~~~

Managing the Complexity of Connected Machines

M2M, or machine to machine, technology is revolutionizing business today. But IT
professionals who have deployed or are piloting M2M solutions report a variety
of integration challenges.

http://cwonline.computerworld.com/t/8829548/823929835/650110/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=27457b5a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Costs of NSA phone records collection program outweigh the benefits

An analysis of the NSA's controversial bulk telephone records collection
initiative suggests that the cost of running and maintaining the effort may far
outweigh any benefits.
http://cwonline.computerworld.com/t/8829548/823929835/650106/36/

Malware delivered to thousands via Yahoo.com ads

Malicious ads served through Yahoo's ad network delivered malware to thousands
of site visitors, according to researchers at Fox-IT, but Yahoo subsequently
blocked the attack.
http://cwonline.computerworld.com/t/8829548/823929835/650107/37/

Malware from Yahoo ads did not affect US and Mac and mobile users

Yahoo said that malware spread by advertisements served by its European websites
had not affected users in North America, Asia Pacific and Latin America as
people in these locations were not served the advertisements.
http://cwonline.computerworld.com/t/8829548/823929835/650108/38/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8829548/823929835/641183/39/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8829548/823929835/643300/40/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8829548/823929835/604375/41/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8829548/823929835/598565/42/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Who will be Microsoft's new CEO? What's next in wearable computing? 2014
promises to be exciting. What do you think will be the biggest tech story of the
coming year?

http://cwonline.computerworld.com/t/8829548/823929835/649864/43/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8829548/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8829548/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/8829548/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/8829548/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8829548/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODI5NTQ4&x=42856349

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8829548/823929835/72510/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8829548/823929835/231613/50/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8829548/823929835/72509/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:09 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive