Computerworld Security: January 17, 2014
===============================================================
Starbucks vows to beef up security on its iPhone app
Starbucks today promised to update its iOS app to calm a storm of interest in a
report this week that claimed criminals could easily nab the app's credentials
from a stolen iPhone.
http://cwonline.computerworld.com/t/8837913/823929835/652235/17/
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~
IBM Intelligent Investigation Manager: Online Product Demo
Intelligent Investigation Manager optimizes fraud investigation and analysis and
it dynamically coordinates and reports on cases, provides analysis and
visualization, and enables more efficient and effective investigations.
http://cwonline.computerworld.com/t/8837913/823929835/652236/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5861af63
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Security firm IDs malware used in Target attack
http://cwonline.computerworld.com/t/8837913/823929835/652237/19/
2. Security researchers sometimes get it wrong
http://cwonline.computerworld.com/t/8837913/823929835/652238/20/
3. Spy agencies around the world use radio signals to tap data from targeted systems
http://cwonline.computerworld.com/t/8837913/823929835/652239/21/
4. Fujitsu Labs makes tech for batch searches of encrypted data
http://cwonline.computerworld.com/t/8837913/823929835/652240/28/
5. Spammers target Snapchat, Bitly and Kik Messenger
http://cwonline.computerworld.com/t/8837913/823929835/652241/29/
6. Cisco fixes remote access flaws in its Secure Access Control System
http://cwonline.computerworld.com/t/8837913/823929835/652242/30/
7. A year after Swartz suicide, reform of anti-hacking law remains elusive
http://cwonline.computerworld.com/t/8837913/823929835/652243/31/
8. HealthCare.gov still has major security problems, experts say
http://cwonline.computerworld.com/t/8837913/823929835/652244/32/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon Wireless~~~~~~~~~~~~~~~~~~~~~
Simplifying Security in a Changing Landscape
This piece from Verizon highlights some of the key data security challenges
today and how a managed security service provider can help you keep your
business safe.
http://cwonline.computerworld.com/t/8837913/823929835/652245/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=707b1fbd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security firm IDs malware used in Target attack
A security company that worked with the U.S. Secret Service to investigate the
data breach at Target identified the malware used in the attack as a
sophisticated derivative of a previously known Trojan.
http://cwonline.computerworld.com/t/8837913/823929835/652237/34/
Security researchers sometimes get it wrong
Google and Samsung have challenged university researchers who claimed to have
found a major flaw in Knox, Samsung's Android security platform.
http://cwonline.computerworld.com/t/8837913/823929835/652238/35/
Spy agencies around the world use radio signals to tap data from targeted systems
Reports this week that the National Security Agency uses radio signals to
collect data from tens of thousands of non-U.S. computers, some not connected to
the Internet, is sure to fuel more acrimony towards the U.S. spy agency.
http://cwonline.computerworld.com/t/8837913/823929835/652239/36/
Fujitsu Labs makes tech for batch searches of encrypted data
If snooping by the U.S. National Security Agency isn't enough to make you worry
about your privacy, Fujitsu Laboratories has developed a fast method to perform
secret searches of data that is encrypted.
http://cwonline.computerworld.com/t/8837913/823929835/652240/37/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel®~~~~~~~~~~~~~~~~~~~~~
Five Cloud Security Concerns You Must Address
Security for the cloud era should be information centric, built in, adaptive,
and proactive. How can you respond to the new threat landscape and efficiently
deal with the new security dynamics? This paper specifically explains what it
takes to protect both your physical and virtual assets, as well as in the cloud.
http://cwonline.computerworld.com/t/8837913/823929835/652246/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ac6057b3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Spammers target Snapchat, Bitly and Kik Messenger
You have to give spammers credit for effort: Symantec found a spam campaign that
manages to abuse three Web services at the same time.
http://cwonline.computerworld.com/t/8837913/823929835/652241/39/
Cisco fixes remote access flaws in its Secure Access Control System
Cisco Systems has released software updates for its Cisco Secure Access Control
System (ACS) in order to patch three vulnerabilities that could give remote
attackers administrative access to the platform and allow them to execute
OS-level commands without authorization.
http://cwonline.computerworld.com/t/8837913/823929835/652242/40/
A year after Swartz suicide, reform of anti-hacking law remains elusive
Internet activist Aaron Swartz's suicide last January galvanized calls for an
overhaul of the Computer Fraud and Abuse Act, used widely by the government to
prosecute misdeeds that critics say the law was never intended to address. Yet,
one year after Swartz's death, efforts to reform the law have made little
headway.
http://cwonline.computerworld.com/t/8837913/823929835/652243/41/
HealthCare.gov still has major security problems, experts say
HealthCare.gov remains riddled with security vulnerabilities and is ripe for ID
theft three and a half months after its launch, two cybersecurity experts told
U.S. lawmakers Thursday.
http://cwonline.computerworld.com/t/8837913/823929835/652244/42/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8837913/823929835/641183/43/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8837913/823929835/643300/44/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8837913/823929835/604375/45/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8837913/823929835/598565/46/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Who will be Microsoft's new CEO? What's next in wearable computing? 2014
promises to be exciting. What do you think will be the biggest tech story of the
coming year?
http://cwonline.computerworld.com/t/8837913/823929835/649864/47/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8837913/823929835/156832/48/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8837913/823929835/311619/49/
Facebook: http://cwonline.computerworld.com/t/8837913/823929835/311620/50/
Twitter: http://cwonline.computerworld.com/t/8837913/823929835/311621/51/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8837913/823929835/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODM3OTEz&x=86569824
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8837913/823929835/72510/53/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8837913/823929835/231613/54/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8837913/823929835/72509/55/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, January 17, 2014
Starbucks vows to beef up security on its iPhone app
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment