Computerworld Security: Issues and Trends: January 29, 2014
===============================================================
Fujitsu Labs makes tech for batch searches of encrypted data
If snooping by the U.S. National Security Agency isn't enough to make you worry
about your privacy, Fujitsu Laboratories has developed a fast method to perform
secret searches of data that is encrypted.
http://cwonline.computerworld.com/t/8846096/823929840/653985/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~
Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would
like to invite you to register for CSO Magazine's spring 2014 conference – CSO40
Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta,
Georgia.
http://cwonline.computerworld.com/t/8846096/823929840/649203/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Location-based services: Controversy at every level
http://cwonline.computerworld.com/t/8846096/823929840/653986/19/
2. Perspective: Payment system security needs less talk, more action
http://cwonline.computerworld.com/t/8846096/823929840/653987/20/
3. Franken presses Ford on location data collection practices
http://cwonline.computerworld.com/t/8846096/823929840/653988/21/
4. Evan Schuman: App testing and sins of omission
http://cwonline.computerworld.com/t/8846096/823929840/653989/28/
5. Authentication bypass bug exposes Foscam webcams to unauthorized access
http://cwonline.computerworld.com/t/8846096/823929840/653990/29/
6. CSO 2.0: How to take your security program to the next level
http://cwonline.computerworld.com/t/8846096/823929840/653991/30/
7. A year after Swartz suicide, reform of anti-hacking law remains elusive
http://cwonline.computerworld.com/t/8846096/823929840/653992/31/
8. Spy agencies around the world use radio signals to tap data from targeted systems
http://cwonline.computerworld.com/t/8846096/823929840/653993/32/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mitel Networks~~~~~~~~~~~~~~~~~~~~~
How to Choose the Right Unified Communications Solution
When it comes to unified communications, there's a lot of confusion in the
marketplace. The term itself can be confusing, as are the various features
within its scope—encompassing any and every aspect of the communications
continuum. .
http://cwonline.computerworld.com/t/8846096/823929840/653994/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=89bdc805
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Location-based services: Controversy at every level
Your smartphone can be a beacon telling the world where you are, with increasing
precision. Is that good commerce or bad privacy, or maybe a bit of both?
http://cwonline.computerworld.com/t/8846096/823929840/653986/34/
Perspective: Payment system security needs less talk, more action
Retailers and banks must move quickly to figure out who should be responsible
for better securing the payments system network or risk having Congress decide
for them.
http://cwonline.computerworld.com/t/8846096/823929840/653987/35/
Franken presses Ford on location data collection practices
A U.S. Senator pressed Ford for information on its in-car data collection
practices, citing recent boasts by an executive at the automaker that it can
monitor drivers via integrated navigation system.
http://cwonline.computerworld.com/t/8846096/823929840/653988/36/
Evan Schuman: App testing and sins of omission
Starbucks released a mobile app that stored passwords in clear text. There's a
good chance that a lot of other companies just don't know whether they could
find themselves in the same situation.
http://cwonline.computerworld.com/t/8846096/823929840/653989/37/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM Corporation~~~~~~~~~~~~~~~~~~~~~
A Giant Leap Forward in Delivering Data Services
Today's users expect instantaneous response and 100 percent up-time. At the same
time, we are in the midst of the Big Data era where the volume , velocity and
variety of data being generated on a daily basis is creating unprecedented
information management challenges.
http://cwonline.computerworld.com/t/8846096/823929840/653995/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=45d72571
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Authentication bypass bug exposes Foscam webcams to unauthorized access
The software used by many wireless IP cameras manufactured by Foscam Digital
Technologies have a vulnerability that allows remote users to access their video
streams and take snapshots without proper authentication.
http://cwonline.computerworld.com/t/8846096/823929840/653990/39/
CSO 2.0: How to take your security program to the next level
Security is all about the big picture now. Here are some pointers from George
Viegas on how the "CSO 2.0" can take a more effective approach to security in
2014 and the future.
http://cwonline.computerworld.com/t/8846096/823929840/653991/40/
A year after Swartz suicide, reform of anti-hacking law remains elusive
Internet activist Aaron Swartz's suicide last January galvanized calls for an
overhaul of the Computer Fraud and Abuse Act, used widely by the government to
prosecute misdeeds that critics say the law was never intended to address. Yet,
one year after Swartz's death, efforts to reform the law have made little
headway.
http://cwonline.computerworld.com/t/8846096/823929840/653992/41/
Spy agencies around the world use radio signals to tap data from targeted systems
Reports that the National Security Agency uses radio signals to collect data
from tens of thousands of non-U.S. computers, some not connected to the
Internet, is sure to fuel more acrimony towards the U.S. spy agency.
http://cwonline.computerworld.com/t/8846096/823929840/653993/42/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8846096/823929840/641183/43/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8846096/823929840/643300/44/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8846096/823929840/604375/45/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8846096/823929840/598565/46/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
There is no shortage of tablet options on the market, and consumers have their
choice of size. Which size tablet are you most likely to buy next?
http://cwonline.computerworld.com/t/8846096/823929840/652926/47/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8846096/823929840/156832/48/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8846096/823929840/311619/49/
Facebook: http://cwonline.computerworld.com/t/8846096/823929840/311620/50/
Twitter: http://cwonline.computerworld.com/t/8846096/823929840/311621/51/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8846096/823929840/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODg0NjA5Ng%3d%3d&x=3b1821af
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8846096/823929840/72510/53/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8846096/823929840/231613/54/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8846096/823929840/72509/55/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, January 29, 2014
Fujitsu Labs makes tech for batch searches of encrypted data
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:17 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment