Computerworld Security: February 19, 2014
===============================================================
Researcher claims two hacker gangs exploiting unpatched IE bug
Two different hacker groups are exploiting the same still-unpatched
vulnerability in Internet Explorer (IE) with almost-identical attack code, a
security researcher said Tuesday.
http://cwonline.computerworld.com/t/8859744/823929835/657255/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Premier 100 IT Leadership Conference~~~~~~~~~~~~~~~~~~~~~
Gain huge insights and enjoy huge savings.
Imagine downloading unique insights from the world's top IT leaders in just two
days. Explore a breakthrough a new leadership model that transforms the way
C-suite teams innovate, transform and collaborate. Brainstorm innovative IT
strategies that deliver real value for your enterprise. Network with Premier 100
IT Award winners and your peers.
http://cwonline.computerworld.com/t/8859744/823929835/652989/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Evan Schuman: Your data exposed -- Delta, Facebook, others latest to fall into mobile app trap
http://cwonline.computerworld.com/t/8859744/823929835/657256/19/
2. Jay Cline: U.S. takes the gold in doling out privacy fines
http://cwonline.computerworld.com/t/8859744/823929835/657257/20/
3. Zeus banking malware hides a crucial file in a photo
http://cwonline.computerworld.com/t/8859744/823929835/657258/21/
4. Darlene Storm: Don't look now but the LED light fixtures are spying on you
http://cwonline.computerworld.com/t/8859744/823929835/657259/28/
5. EMV smartcards offer security benefits even without PIN, Visa says
http://cwonline.computerworld.com/t/8859744/823929835/657260/29/
6. Founders of security firm SlickLogin join Google
http://cwonline.computerworld.com/t/8859744/823929835/657261/30/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Druva~~~~~~~~~~~~~~~~~~~~~
Narrow Down Your Endpoint Backup Shortlist
With this complimentary report you can:
- Discover the critical product capabilities that matter
- Learn about the unique backup needs of the mobile and office-centric
workforces
- See how the top backup vendors compare
http://cwonline.computerworld.com/t/8859744/823929835/657262/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=741b06dc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Evan Schuman: Your data exposed -- Delta, Facebook, others latest to fall into mobile app trap
Match.com and eHarmony also among those now saying, 'We didn't know our mobile
apps did that.'
http://cwonline.computerworld.com/t/8859744/823929835/657256/32/
Jay Cline: U.S. takes the gold in doling out privacy fines
EU privacy regulators say U.S. privacy laws are too weak to protect EU personal
data. But a new analysis of 358 privacy-enforcement actions paints the opposite
picture.
http://cwonline.computerworld.com/t/8859744/823929835/657257/33/
Zeus banking malware hides a crucial file in a photo
A newly discovered variant of the notorious Zeus banking trojan is disguising a
crucial configuration code in a digital photo, a technique known as
steganography.
http://cwonline.computerworld.com/t/8859744/823929835/657258/34/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: ExtraHop Networks~~~~~~~~~~~~~~~~~~~~~
10 Ways Wire Data Helps Conquer IT Complexity
This whitepaper explains the value of wire data in practical, simple to
understand terms. With a robust wire data analytics solution, IT can
automatically detect problems across the entire IT environment, spot data theft
by flagging queries from untrusted sources, select unique pieces of transaction
payloads to send to any big data source, and more
http://cwonline.computerworld.com/t/8859744/823929835/657263/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d3c04122
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Don't look now but the LED light fixtures are spying on you
If you feel like you're being watched at Terminal B in the Newark Liberty
International Airport, then that's real and not paranoia. It's not the TSA this
time, but covert airport surveillance via LED light fixtures capable of taking
video, identifying suspicious activity, as well as collecting and data-mining
mountains of data about 'ordinary citizens.'
http://cwonline.computerworld.com/t/8859744/823929835/657259/36/
EMV smartcards offer security benefits even without PIN, Visa says
A senior executive from Visa Inc. dismissed concerns over the manner in which
the Europay MasterCard Visa (EMV) chip card standard is being implemented in the
U.S. and insisted the move will yield significant security benefits for
retailers, consumers and banks.
http://cwonline.computerworld.com/t/8859744/823929835/657260/37/
Founders of security firm SlickLogin join Google
The team at SlickLogin, a company working on technology for online
authentication using sounds from a mobile phone, said it has joined Google.
http://cwonline.computerworld.com/t/8859744/823929835/657261/38/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8859744/823929835/641183/39/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8859744/823929835/643300/40/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8859744/823929835/604375/41/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8859744/823929835/598565/42/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?
http://cwonline.computerworld.com/t/8859744/823929835/656068/43/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8859744/823929835/156832/44/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8859744/823929835/311619/45/
Facebook: http://cwonline.computerworld.com/t/8859744/823929835/311620/46/
Twitter: http://cwonline.computerworld.com/t/8859744/823929835/311621/47/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8859744/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODU5NzQ0&x=5c04bae6
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8859744/823929835/72510/49/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8859744/823929835/231613/50/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8859744/823929835/72509/51/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, February 19, 2014
Researcher claims two hacker gangs exploiting unpatched IE bug
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:15 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment