Thursday, February 13, 2014

Ira Winkler: 6 failures that led to Target hack

Computerworld Security: February 13, 2014
===============================================================

Ira Winkler: 6 failures that led to Target hack

The storyline that a single point of failure allowed a sophisticated attacker to
steal millions of card numbers from Target just doesn't hold up.
http://cwonline.computerworld.com/t/8856669/823929835/656553/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

DDoS Attacks used to Influence Stock Price and Limit Trading

White paper: DDoS Attacks Against Global Markets – PLXsert provides an in-depth
review of 10 DDoS attack campaigns and explains how they were used to try to
influence share prices, disrupt trading and interfere with exchange platforms.

http://cwonline.computerworld.com/t/8856669/823929835/656554/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Darlene Storm: Slick, sick nation-state espionage malware The Mask: Mother of future cyber weapons?
http://cwonline.computerworld.com/t/8856669/823929835/656555/19/

2. White House pushes cybersecurity framework for critical infrastructure
http://cwonline.computerworld.com/t/8856669/823929835/656556/20/

3. Banks push for tokenization standard to secure credit card payments
http://cwonline.computerworld.com/t/8856669/823929835/656557/21/

4. Sen. Paul files lawsuit challenging NSA surveillance
http://cwonline.computerworld.com/t/8856669/823929835/656558/28/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Druva~~~~~~~~~~~~~~~~~~~~~

Top 10 Endpoint Backup Mistakes

When considering endpoint backup options, be sure you're making the right
decisions. Protecting data on endpoints has become more challenging because of
recent trends like exponential data growth, the rise in endpoints, BYOD, and
SaaS applications.

http://cwonline.computerworld.com/t/8856669/823929835/656559/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=392495bc

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Slick, sick nation-state espionage malware The Mask: Mother of future cyber weapons?


The newly discovered nation-state espionage malware "The Mask"
managed to go undetected for seven years and includes such very sophisticated
hacking tools, capable of pwning any OS, that some security experts expect
it's the mother model of future cyber weapons for advanced persistent
threat (APT) campaigns.
http://cwonline.computerworld.com/t/8856669/823929835/656555/30/

White House pushes cybersecurity framework for critical infrastructure

A new cybersecurity framework released Wednesday by U.S. President Barack
Obama's administration aims to help operators of critical infrastructure develop
comprehensive cybersecurity programs.
http://cwonline.computerworld.com/t/8856669/823929835/656556/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

Extreme Warehouse Speed for Fast Business Decisions

Informix ebook highlighting benefits of making decisions 'at the speed of
business'; and discusses optimizing warehouse performance; and simplifying
resources

http://cwonline.computerworld.com/t/8856669/823929835/656560/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2167c089

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Banks push for tokenization standard to secure credit card payments

A group representing 22 of the world's largest banks is pushing for broad
adoption in the U.S. of payment card technology called tokenization, citing
shortcomings in the planned migration to the Europay MasterCard Visa smartcard
standard over the next two years.
http://cwonline.computerworld.com/t/8856669/823929835/656557/33/

Sen. Paul files lawsuit challenging NSA surveillance

U.S. Senator Rand Paul has delivered on promises to file a lawsuit challenging
the U.S. National Security Agency's authority to engage in mass surveillance.
http://cwonline.computerworld.com/t/8856669/823929835/656558/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8856669/823929835/641183/35/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8856669/823929835/643300/36/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8856669/823929835/604375/37/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8856669/823929835/598565/38/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?

http://cwonline.computerworld.com/t/8856669/823929835/656068/39/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8856669/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8856669/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/8856669/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/8856669/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8856669/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODU2NjY5&x=1fb73e14

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8856669/823929835/72510/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8856669/823929835/231613/46/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8856669/823929835/72509/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:57 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive