Friday, January 24, 2014

Windows malware tries to infect Android devices connected to PCs

Computerworld Security: January 24, 2014
===============================================================

Windows malware tries to infect Android devices connected to PCs

A new computer Trojan program attempts to install mobile banking malware on
Android devices when they're connected to infected PCs, according to researchers
from Symantec.
http://cwonline.computerworld.com/t/8842828/823929835/653267/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Absolute Software~~~~~~~~~~~~~~~~~~~~~

Hands-On Teams: Computrace Protects

The Intelligrated IT Department was concerned about potential laptop theft, and
needed a solution that would allow them to track and secure laptops in the
field. After researching available options, they chose Absolute Computrace.

http://cwonline.computerworld.com/t/8842828/823929835/653268/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ee646458

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Why I did it: Former hacker Mitchell Frost explains his motivation
http://cwonline.computerworld.com/t/8842828/823929835/653269/19/

2. Group charges Google+ plan violates privacy pact in complaint with FTC
http://cwonline.computerworld.com/t/8842828/823929835/653270/20/

3. As Target breach unfolds, information vanishes from Web
http://cwonline.computerworld.com/t/8842828/823929835/653271/21/

4. Google dismisses eavesdropping threat in Chrome
http://cwonline.computerworld.com/t/8842828/823929835/653272/28/

5. U.S. watchdog calls for NSA to end phone records program
http://cwonline.computerworld.com/t/8842828/823929835/653273/29/

6. Target breach shows payment system security needs less talk, more action
http://cwonline.computerworld.com/t/8842828/823929835/653274/30/

7. U.S. privacy watchdog: NSA phone records program is illegal
http://cwonline.computerworld.com/t/8842828/823929835/653275/31/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

Big Data, Big Opportunity

New platforms like Hadoop are being used to gain a competitive advantage through
big data.

http://cwonline.computerworld.com/t/8842828/823929835/653276/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4a8a92ff

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Why I did it: Former hacker Mitchell Frost explains his motivation

In 2006, Mitchell Frost, then a 19-year-old college student at the University of
Akron, used the school's computer network to control the botnets he had created.
Authorities say between August 2006 and March 2007, Frost launched a series of
denial of service (DDOS) attacks against several conservative web sites,
including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site,
Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as
well as disrupting the University of Akron's network during a DDOS attack Frost
allegedly launched on a gaming server hosted by the university.
http://cwonline.computerworld.com/t/8842828/823929835/653269/33/

Group charges Google+ plan violates privacy pact in complaint with FTC

Google, through its plan to link Gmail addresses to its Google+ social network,
is violating a privacy agreement the company made with the U.S. Federal Trade
Commission, a long-time critic of the company's privacy practices said in a
complaint to the agency.
http://cwonline.computerworld.com/t/8842828/823929835/653270/34/

As Target breach unfolds, information vanishes from Web

At least three security companies have scrubbed information related to Target
from the Web, highlighting the ongoing sensitivity around one of the
largest-ever data breaches.
http://cwonline.computerworld.com/t/8842828/823929835/653271/35/

~~~~~~~~~~~~~~~~~~~WEBCAST: Egnyte~~~~~~~~~~~~~~~~~~~~~

Consider Hybrid Approach to File-Sharing

Security. Scalability. Control. These are just some of the many benefits of
enterprise cloud file-sharing that you'll discover in this KnowledgeVault,
packed with short videos, white papers and demos.

http://cwonline.computerworld.com/t/8842828/823929835/653277/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0751cd8e

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Google dismisses eavesdropping threat in Chrome

Google said there's no threat from a speech recognition feature in its Chrome
browser that a developer said could be used to listen in on users.
http://cwonline.computerworld.com/t/8842828/823929835/653272/37/

U.S. watchdog calls for NSA to end phone records program

In a report to be released Thursday, the U.S. Privacy and Civil Liberties board
says the National Security Agency's bulk collection of phone records is illegal
and should stop, according to the New York Times and the Washington Post, which
received advance copies of the document.
http://cwonline.computerworld.com/t/8842828/823929835/653273/38/

Target breach shows payment system security needs less talk, more action

Retailers and banks must move quickly to figure out who should be responsible
for better securing the payments system network or risk having Congress decide
for them.
http://cwonline.computerworld.com/t/8842828/823929835/653274/39/

U.S. privacy watchdog: NSA phone records program is illegal

The U.S. National Security Agency should abandon its collection of U.S.
telephone records because the surveillance program is illegal, a government
privacy oversight board said.
http://cwonline.computerworld.com/t/8842828/823929835/653275/40/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8842828/823929835/641183/41/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8842828/823929835/643300/42/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8842828/823929835/604375/43/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8842828/823929835/598565/44/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

There is no shortage of tablet options on the market, and consumers have their
choice of size. Which size tablet are you most likely to buy next?

http://cwonline.computerworld.com/t/8842828/823929835/652926/45/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8842828/823929835/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8842828/823929835/311619/47/

Facebook: http://cwonline.computerworld.com/t/8842828/823929835/311620/48/

Twitter: http://cwonline.computerworld.com/t/8842828/823929835/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8842828/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODQyODI4&x=b9d05069

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8842828/823929835/72510/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8842828/823929835/231613/52/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8842828/823929835/72509/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:27 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive