Computerworld Security: Issues and Trends: January 15, 2014
===============================================================
Tech support scammers are targeting mobile users, researchers say
Scammers have devised new ways to trick users into revealing personal
information, hand over control of computers and pay for unnecessary software and
tech support services, security experts warn.
http://cwonline.computerworld.com/t/8836146/823929840/651824/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: GlobalLogic~~~~~~~~~~~~~~~~~~~~~
An Introduction to Information Security & Secure Products
As trends such as M2M connectivity, smart devices, social networks and cloud
migration progress, there is a growing concern around the compromise of privacy
and data security. Not only will the demand for security-related products in the
market rise, but B2C and B2B products will need to be designed with security in
mind.
http://cwonline.computerworld.com/t/8836146/823929840/651825/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Ira Winkler: The RSA Conference boycott is nonsense
http://cwonline.computerworld.com/t/8836146/823929840/651826/19/
2. Security Manager's Journal: Siccing MDM on personal mobile devices
http://cwonline.computerworld.com/t/8836146/823929840/651827/20/
3. Target to invest $5M in cybersecurity ed program
http://cwonline.computerworld.com/t/8836146/823929840/651828/21/
4. McAfee security report suggests 2014 will be a rough year
http://cwonline.computerworld.com/t/8836146/823929840/651829/28/
5. Security Manager's Journal: Target breach unleashes fresh scams
http://cwonline.computerworld.com/t/8836146/823929840/651830/29/
6. NSA looks to crack all encryption with quantum computer, report says
http://cwonline.computerworld.com/t/8836146/823929840/651831/30/
7. Cloud computing 2014: Moving to a zero-trust security model
http://cwonline.computerworld.com/t/8836146/823929840/651832/31/
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~
Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM
optimizes the investigation of fraud for customers across many industries in
both the commercial and public sector space.
http://cwonline.computerworld.com/t/8836146/823929840/651833/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1895463
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ira Winkler: The RSA Conference boycott is nonsense
The outrage is more about media hype, hypocrisy and grandstanding than firm
principles.
http://cwonline.computerworld.com/t/8836146/823929840/651826/33/
Security Manager's Journal: Siccing MDM on personal mobile devices
The use of personal devices on the network has gotten out of control. Mobile
device management could help, and it will play well with newly deployed NAC.
http://cwonline.computerworld.com/t/8836146/823929840/651827/34/
Target to invest $5M in cybersecurity ed program
Target said it is investing $5 million in a multi-year campaign to educate the
public on the dangers of scams, after the company disclosed that up to 110
million people may have been affected by a data breach at the retailer's U.S.
stores.
http://cwonline.computerworld.com/t/8836146/823929840/651828/35/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon Wireless~~~~~~~~~~~~~~~~~~~~~
Managing the Complexity of Connected Machines
M2M, or machine to machine, technology is revolutionizing business today. But IT
professionals who have deployed or are piloting M2M solutions report a variety
of integration challenges.
http://cwonline.computerworld.com/t/8836146/823929840/651834/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=16872bc7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
McAfee security report suggests 2014 will be a rough year
Smartphones, social networks, PCs, servers, cloud services, governments and
national infrastructure all face security risks in 2014, according to the latest
McAfee security report. Oh, and virtual currencies are being used to fund
serious crimes.
http://cwonline.computerworld.com/t/8836146/823929840/651829/37/
Security Manager's Journal: Target breach unleashes fresh scams
Scammers are nothing if not innovative. It just goes to show that the best
defense is an educated workforce.
http://cwonline.computerworld.com/t/8836146/823929840/651830/38/
NSA looks to crack all encryption with quantum computer, report says
The U.S. National Security Agency is attempting to build a new breed of
supercomputer that theoretically could make short work of cracking most keys
used for encrypted communications.
http://cwonline.computerworld.com/t/8836146/823929840/651831/39/
Cloud computing 2014: Moving to a zero-trust security model
Instead of scaring businesses away from using hosted services, as some experts
predicted, the leaking of classified documents detailing NSA data collection
activities are driving some long overdue changes in enterprise and service
provider security and privacy concerns.
http://cwonline.computerworld.com/t/8836146/823929840/651832/40/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8836146/823929840/641183/41/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8836146/823929840/643300/42/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8836146/823929840/604375/43/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8836146/823929840/598565/44/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Who will be Microsoft's new CEO? What's next in wearable computing? 2014
promises to be exciting. What do you think will be the biggest tech story of the
coming year?
http://cwonline.computerworld.com/t/8836146/823929840/649864/45/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8836146/823929840/156832/46/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8836146/823929840/311619/47/
Facebook: http://cwonline.computerworld.com/t/8836146/823929840/311620/48/
Twitter: http://cwonline.computerworld.com/t/8836146/823929840/311621/49/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8836146/823929840/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODgzNjE0Ng%3d%3d&x=5abd70c8
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8836146/823929840/72510/51/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8836146/823929840/231613/52/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8836146/823929840/72509/53/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, January 15, 2014
Tech support scammers are targeting mobile users
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:46 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment