Friday, January 17, 2014

Starbucks vows to beef up security on its iPhone app

Computerworld Security: January 17, 2014
===============================================================

Starbucks vows to beef up security on its iPhone app

Starbucks today promised to update its iOS app to calm a storm of interest in a
report this week that claimed criminals could easily nab the app's credentials
from a stolen iPhone.
http://cwonline.computerworld.com/t/8837913/823929835/652235/17/

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

IBM Intelligent Investigation Manager: Online Product Demo

Intelligent Investigation Manager optimizes fraud investigation and analysis and
it dynamically coordinates and reports on cases, provides analysis and
visualization, and enables more efficient and effective investigations.

http://cwonline.computerworld.com/t/8837913/823929835/652236/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5861af63

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security firm IDs malware used in Target attack
http://cwonline.computerworld.com/t/8837913/823929835/652237/19/

2. Security researchers sometimes get it wrong
http://cwonline.computerworld.com/t/8837913/823929835/652238/20/

3. Spy agencies around the world use radio signals to tap data from targeted systems
http://cwonline.computerworld.com/t/8837913/823929835/652239/21/

4. Fujitsu Labs makes tech for batch searches of encrypted data
http://cwonline.computerworld.com/t/8837913/823929835/652240/28/

5. Spammers target Snapchat, Bitly and Kik Messenger
http://cwonline.computerworld.com/t/8837913/823929835/652241/29/

6. Cisco fixes remote access flaws in its Secure Access Control System
http://cwonline.computerworld.com/t/8837913/823929835/652242/30/

7. A year after Swartz suicide, reform of anti-hacking law remains elusive
http://cwonline.computerworld.com/t/8837913/823929835/652243/31/

8. HealthCare.gov still has major security problems, experts say
http://cwonline.computerworld.com/t/8837913/823929835/652244/32/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon Wireless~~~~~~~~~~~~~~~~~~~~~

Simplifying Security in a Changing Landscape

This piece from Verizon highlights some of the key data security challenges
today and how a managed security service provider can help you keep your
business safe.

http://cwonline.computerworld.com/t/8837913/823929835/652245/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=707b1fbd

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security firm IDs malware used in Target attack

A security company that worked with the U.S. Secret Service to investigate the
data breach at Target identified the malware used in the attack as a
sophisticated derivative of a previously known Trojan.
http://cwonline.computerworld.com/t/8837913/823929835/652237/34/

Security researchers sometimes get it wrong

Google and Samsung have challenged university researchers who claimed to have
found a major flaw in Knox, Samsung's Android security platform.
http://cwonline.computerworld.com/t/8837913/823929835/652238/35/

Spy agencies around the world use radio signals to tap data from targeted systems

Reports this week that the National Security Agency uses radio signals to
collect data from tens of thousands of non-U.S. computers, some not connected to
the Internet, is sure to fuel more acrimony towards the U.S. spy agency.
http://cwonline.computerworld.com/t/8837913/823929835/652239/36/

Fujitsu Labs makes tech for batch searches of encrypted data

If snooping by the U.S. National Security Agency isn't enough to make you worry
about your privacy, Fujitsu Laboratories has developed a fast method to perform
secret searches of data that is encrypted.
http://cwonline.computerworld.com/t/8837913/823929835/652240/37/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel®~~~~~~~~~~~~~~~~~~~~~

Five Cloud Security Concerns You Must Address

Security for the cloud era should be information centric, built in, adaptive,
and proactive. How can you respond to the new threat landscape and efficiently
deal with the new security dynamics? This paper specifically explains what it
takes to protect both your physical and virtual assets, as well as in the cloud.

http://cwonline.computerworld.com/t/8837913/823929835/652246/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ac6057b3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Spammers target Snapchat, Bitly and Kik Messenger

You have to give spammers credit for effort: Symantec found a spam campaign that
manages to abuse three Web services at the same time.
http://cwonline.computerworld.com/t/8837913/823929835/652241/39/

Cisco fixes remote access flaws in its Secure Access Control System

Cisco Systems has released software updates for its Cisco Secure Access Control
System (ACS) in order to patch three vulnerabilities that could give remote
attackers administrative access to the platform and allow them to execute
OS-level commands without authorization.
http://cwonline.computerworld.com/t/8837913/823929835/652242/40/

A year after Swartz suicide, reform of anti-hacking law remains elusive

Internet activist Aaron Swartz's suicide last January galvanized calls for an
overhaul of the Computer Fraud and Abuse Act, used widely by the government to
prosecute misdeeds that critics say the law was never intended to address. Yet,
one year after Swartz's death, efforts to reform the law have made little
headway.
http://cwonline.computerworld.com/t/8837913/823929835/652243/41/

HealthCare.gov still has major security problems, experts say

HealthCare.gov remains riddled with security vulnerabilities and is ripe for ID
theft three and a half months after its launch, two cybersecurity experts told
U.S. lawmakers Thursday.
http://cwonline.computerworld.com/t/8837913/823929835/652244/42/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8837913/823929835/641183/43/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8837913/823929835/643300/44/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8837913/823929835/604375/45/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8837913/823929835/598565/46/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Who will be Microsoft's new CEO? What's next in wearable computing? 2014
promises to be exciting. What do you think will be the biggest tech story of the
coming year?

http://cwonline.computerworld.com/t/8837913/823929835/649864/47/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8837913/823929835/156832/48/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8837913/823929835/311619/49/

Facebook: http://cwonline.computerworld.com/t/8837913/823929835/311620/50/

Twitter: http://cwonline.computerworld.com/t/8837913/823929835/311621/51/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8837913/823929835/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODM3OTEz&x=86569824

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8837913/823929835/72510/53/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8837913/823929835/231613/54/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8837913/823929835/72509/55/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive