Computerworld Security: February 14, 2014
===============================================================
IE10 under attack as hackers exploit zero-day bug
FireEye today said it had discovered that attackers are actively exploiting a
new, unpatched vulnerability in Internet Explorer 10.
http://cwonline.computerworld.com/t/8857504/823929835/656737/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~
Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would
like to invite you to register for CSO Magazine's spring 2014 conference – CSO40
Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta,
Georgia.
http://cwonline.computerworld.com/t/8857504/823929835/649203/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Hackers circulate thousands of FTP credentials; New York Times among those hit
http://cwonline.computerworld.com/t/8857504/823929835/656738/19/
2. Greg Lambert: Microsoft Patch Tuesday for February 2014
http://cwonline.computerworld.com/t/8857504/823929835/656739/20/
3. Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites
http://cwonline.computerworld.com/t/8857504/823929835/656740/21/
4. Ford exec says automaker doesn't collect or share car location data
http://cwonline.computerworld.com/t/8857504/823929835/656741/28/
5. Nicholas D. Evans: Retail's chess game with point-of-sale malware
http://cwonline.computerworld.com/t/8857504/823929835/656742/29/
6. Attack on US veterans website may have been aimed at military members
http://cwonline.computerworld.com/t/8857504/823929835/656743/30/
7. Federal smartphone kill-switch legislation proposed
http://cwonline.computerworld.com/t/8857504/823929835/656744/31/
8. NIST framework released to widespread praise, but what happens next?
http://cwonline.computerworld.com/t/8857504/823929835/656745/32/
~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~
Druva inSync: Endpoint Data Protection & Governance
75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.
http://cwonline.computerworld.com/t/8857504/823929835/656746/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=36696f3c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hackers circulate thousands of FTP credentials; New York Times among those hit
Hackers are circulating credentials for thousands of FTP sites and appear to
have compromised file transfer servers at The New York Times and other
organizations, according to a security expert.
http://cwonline.computerworld.com/t/8857504/823929835/656738/34/
Greg Lambert: Microsoft Patch Tuesday for February 2014
With this February Patch Tuesday release from Microsoft, we see 7 security
bulletins with four updates rated as Critical by Microsoft and the remaining
four bulletins rated as Important.
http://cwonline.computerworld.com/t/8857504/823929835/656739/35/
Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites
Dozens of self-signed SSL certificates created to impersonate banking,
e-commerce and social networking websites have been found on the Web. The
certificates don't pose a big threat to browser users, but could be used to
launch man-in-the-middle attacks against users of many mobile apps, according to
researchers from Internet services firm Netcraft who found the certificates.
http://cwonline.computerworld.com/t/8857504/823929835/656740/36/
Ford exec says automaker doesn't collect or share car location data
A Ford executive told U.S. Sen. Al Franken (D-Minn.) that the automaker does not
collect or share location data from cars without the operator's explicit
permission.
http://cwonline.computerworld.com/t/8857504/823929835/656741/37/
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~
Solving the Big Data Challenge of Sensor Data
This webcast will focus on sensor data applications and IBM's differentiated
offering to solve the IT challenges of sensor data for better business insight
and competitive advantage. Highlights include unique attributes of sensor data
and the big data challenges they present.
http://cwonline.computerworld.com/t/8857504/823929835/656747/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0619c395
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Nicholas D. Evans: Retail's chess game with point-of-sale malware
http://cwonline.computerworld.com/t/8857504/823929835/656742/39/
Attack on US veterans website may have been aimed at military members
A cyberattack against the Veteran of Foreign Wars website, believed to have been
initiated in China, may have sought to spy on U.S. military members, security
company FireEye said Thursday.
http://cwonline.computerworld.com/t/8857504/823929835/656743/40/
Federal smartphone kill-switch legislation proposed
Pressure on the cellphone industry to introduce technology that could disable
stolen smartphones has intensified with the introduction of proposed federal
legislation that would mandate such a system.
http://cwonline.computerworld.com/t/8857504/823929835/656744/41/
NIST framework released to widespread praise, but what happens next?
Following a solid year of intensive work, the National Institute of Standards
and Technology (NIST) released yesterday its "final" framework for improving
critical infrastructure cybersecurity as mandated under a February 2013
executive order by President Obama. The 41-page document closely tracks, with
some notable changes, the preliminary framework released by NIST in November.
http://cwonline.computerworld.com/t/8857504/823929835/656745/42/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8857504/823929835/641183/43/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8857504/823929835/643300/44/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8857504/823929835/604375/45/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8857504/823929835/598565/46/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?
http://cwonline.computerworld.com/t/8857504/823929835/656068/47/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8857504/823929835/156832/48/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8857504/823929835/311619/49/
Facebook: http://cwonline.computerworld.com/t/8857504/823929835/311620/50/
Twitter: http://cwonline.computerworld.com/t/8857504/823929835/311621/51/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8857504/823929835/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODU3NTA0&x=facaee08
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8857504/823929835/72510/53/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8857504/823929835/231613/54/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8857504/823929835/72509/55/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, February 14, 2014
IE10 under attack as hackers exploit zero-day bug
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:11 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment